From 68e78e9271407c5a9dddf365ac99d5098348b719 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 19 Dec 2021 23:48:54 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- core/k8s-gateway/{4.0.24 => 4.0.25}/CONFIG.md | 0 .../k8s-gateway/4.0.25}/Chart.lock | 2 +- .../k8s-gateway/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- core/k8s-gateway/{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../{4.0.24 => 4.0.25}/security.md | 0 .../templates/_configmap.tpl | 0 .../{4.0.24 => 4.0.25}/templates/common.yaml | 0 .../{4.0.24 => 4.0.25}/values.yaml | 0 core/metallb/{1.0.2 => 1.0.3}/CHANGELOG.md | 10 + core/metallb/{1.0.2 => 1.0.3}/CONFIG.md | 0 core/metallb/{1.0.2 => 1.0.3}/Chart.lock | 2 +- core/metallb/{1.0.2 => 1.0.3}/Chart.yaml | 4 +- core/metallb/{1.0.2 => 1.0.3}/README.md | 0 core/metallb/{1.0.2 => 1.0.3}/app-readme.md | 0 .../charts/metallb-0.11.0.tgz | Bin core/metallb/{1.0.2 => 1.0.3}/helm-values.md | 0 core/metallb/{1.0.2 => 1.0.3}/ix_values.yaml | 0 core/metallb/{1.0.2 => 1.0.3}/questions.yaml | 0 core/metallb/{1.0.2 => 1.0.3}/security.md | 0 core/metallb/{1.0.2 => 1.0.3}/values.yaml | 0 core/metallb/item.yaml | 2 +- .../{1.1.22 => 1.1.23}/CHANGELOG.md | 18 +- core/prometheus/{1.1.22 => 1.1.23}/CONFIG.md | 0 core/prometheus/{1.1.22 => 1.1.23}/Chart.lock | 2 +- core/prometheus/{1.1.22 => 1.1.23}/Chart.yaml | 2 +- core/prometheus/{1.1.22 => 1.1.23}/README.md | 0 .../{1.1.22 => 1.1.23}/app-readme.md | 0 .../charts/common-8.9.24.tgz | Bin .../charts/kube-state-metrics-2.1.19.tgz | Bin .../charts/node-exporter-2.3.17.tgz | Bin .../crds/crd-alertmanager-config.yaml | 0 .../crds/crd-alertmanager.yaml | 0 .../crds/crd-podmonitor.yaml | 0 .../{1.1.22 => 1.1.23}/crds/crd-probes.yaml | 0 .../crds/crd-prometheus.yaml | 0 .../crds/crd-prometheusrules.yaml | 0 .../crds/crd-servicemonitor.yaml | 0 .../crds/crd-thanosrulers.yaml | 0 .../{1.1.22 => 1.1.23}/helm-values.md | 0 .../{1.1.22 => 1.1.23}/ix_values.yaml | 0 .../{1.1.22 => 1.1.23}/questions.yaml | 0 .../prometheus/{1.1.22 => 1.1.23}/security.md | 0 .../{1.1.22 => 1.1.23}/templates/_helpers.tpl | 0 .../templates/alertmanager/_alertmanager.tpl | 0 .../templates/alertmanager/secrets.yaml | 0 .../alertmanager/serviceaccount.yaml | 0 .../alertmanager/servicemonitor.yaml | 0 .../{1.1.22 => 1.1.23}/templates/common.yaml | 0 .../templates/exporters/core-dns/service.yaml | 0 .../exporters/core-dns/servicemonitor.yaml | 0 .../kube-apiserver/servicemonitor.yaml | 0 .../kube-controller-manager/endpoints.yaml | 0 .../kube-controller-manager/service.yaml | 0 .../servicemonitor.yaml | 0 .../exporters/kube-scheduler/endpoints.yaml | 0 .../exporters/kube-scheduler/service.yaml | 0 .../kube-scheduler/servicemonitor.yaml | 0 .../exporters/kubelet/servicemonitor.yaml | 0 .../templates/operator/_args.tpl | 0 .../templates/operator/configmap.yaml | 0 .../templates/operator/servicemonitor.yaml | 0 .../prometheus/_additionalPrometheusRules.tpl | 0 .../prometheus/_additionalScrapeJobs.tpl | 0 .../templates/prometheus/_prometheus.tpl | 0 .../templates/prometheus/_servicemonitor.tpl | 0 .../templates/prometheus/clusterrole.yaml | 0 .../prometheus/clusterrolebinding.yaml | 0 .../templates/prometheus/serviceaccount.yaml | 0 .../prometheus/{1.1.22 => 1.1.23}/values.yaml | 0 core/traefik/10.0.28/CHANGELOG.md | 99 + .../1.0.37 => core/traefik/10.0.28}/CONFIG.md | 0 .../4.0.24 => traefik/10.0.28}/Chart.lock | 2 +- core/traefik/10.0.28/Chart.yaml | 30 + core/traefik/10.0.28/README.md | 39 + core/traefik/10.0.28/app-readme.md | 3 + .../traefik/10.0.28}/charts/common-8.9.24.tgz | Bin core/traefik/10.0.28/crds/ingressroute.yaml | 198 ++ .../traefik/10.0.28/crds/ingressroutetcp.yaml | 160 ++ .../traefik/10.0.28/crds/ingressrouteudp.yaml | 84 + core/traefik/10.0.28/crds/middlewares.yaml | 563 ++++ core/traefik/10.0.28/crds/middlewarestcp.yaml | 59 + .../10.0.28/crds/serverstransports.yaml | 101 + core/traefik/10.0.28/crds/tlsoptions.yaml | 87 + core/traefik/10.0.28/crds/tlsstores.yaml | 64 + .../traefik/10.0.28/crds/traefikservices.yaml | 270 ++ core/traefik/10.0.28/helm-values.md | 48 + core/traefik/10.0.28/ix_values.yaml | 309 +++ core/traefik/10.0.28/questions.yaml | 2006 ++++++++++++++ core/traefik/10.0.28/security.md | 104 + core/traefik/10.0.28/templates/_args.tpl | 141 + core/traefik/10.0.28/templates/_helpers.tpl | 22 + .../10.0.28/templates/_ingressclass.tpl | 24 + .../10.0.28/templates/_ingressroute.tpl | 25 + .../traefik/10.0.28/templates/_portalhook.tpl | 26 + .../traefik/10.0.28/templates/_tlsoptions.tpl | 12 + core/traefik/10.0.28/templates/common.yaml | 24 + .../middlewares/basic-middleware.yaml | 65 + .../templates/middlewares/basicauth.yaml | 34 + .../10.0.28/templates/middlewares/chain.yaml | 21 + .../templates/middlewares/forwardauth.yaml | 30 + .../templates/middlewares/ipwhitelist.yaml | 33 + .../templates/middlewares/ratelimit.yaml | 19 + .../templates/middlewares/redirectScheme.yaml | 19 + .../templates/middlewares/redirectregex.yaml | 20 + .../templates/middlewares/tc-nextcloud.yaml | 25 + .../traefik/10.0.28}/values.yaml | 0 .../mariadb/{1.0.37 => 1.0.38}/CHANGELOG.md | 20 +- .../1.0.36 => mariadb/1.0.38}/CONFIG.md | 0 .../6.0.34 => mariadb/1.0.38}/Chart.lock | 2 +- .../mariadb/{1.0.37 => 1.0.38}/Chart.yaml | 2 +- .../mariadb/{1.0.37 => 1.0.38}/README.md | 0 .../mariadb/{1.0.37 => 1.0.38}/app-readme.md | 0 .../1.0.38}/charts/common-8.9.24.tgz | Bin .../mariadb/{1.0.37 => 1.0.38}/helm-values.md | 0 .../mariadb/{1.0.37 => 1.0.38}/ix_values.yaml | 0 .../mariadb/{1.0.37 => 1.0.38}/questions.yaml | 1 - .../mariadb/{1.0.37 => 1.0.38}/security.md | 0 .../{1.0.37 => 1.0.38}/templates/common.yaml | 0 .../{1.0.37 => 1.0.38}/templates/secret.yaml | 0 .../1.0.36 => mariadb/1.0.38}/values.yaml | 0 .../memcached/{1.0.36 => 1.0.37}/CHANGELOG.md | 20 +- .../6.0.34 => memcached/1.0.37}/CONFIG.md | 0 .../{mariadb => memcached}/1.0.37/Chart.lock | 2 +- .../memcached/{1.0.36 => 1.0.37}/Chart.yaml | 2 +- .../memcached/{1.0.36 => 1.0.37}/README.md | 0 .../{1.0.36 => 1.0.37}/app-readme.md | 0 .../1.0.37}/charts/common-8.9.24.tgz | Bin .../{1.0.36 => 1.0.37}/helm-values.md | 0 .../{1.0.36 => 1.0.37}/ix_values.yaml | 0 .../{1.0.36 => 1.0.37}/questions.yaml | 1 - .../memcached/{1.0.36 => 1.0.37}/security.md | 0 .../{1.0.36 => 1.0.37}/templates/common.yaml | 0 .../6.0.34 => memcached/1.0.37}/values.yaml | 0 .../{6.0.34 => 6.0.35}/CHANGELOG.md | 20 +- .../1.0.15 => postgresql/6.0.35}/CONFIG.md | 0 dependency/postgresql/6.0.35/Chart.lock | 6 + .../postgresql/{6.0.34 => 6.0.35}/Chart.yaml | 2 +- .../postgresql/{6.0.34 => 6.0.35}/README.md | 0 .../{6.0.34 => 6.0.35}/app-readme.md | 0 .../6.0.35}/charts/common-8.9.24.tgz | Bin .../{6.0.34 => 6.0.35}/helm-values.md | 0 .../{6.0.34 => 6.0.35}/ix_values.yaml | 0 .../{6.0.34 => 6.0.35}/questions.yaml | 1 - .../postgresql/{6.0.34 => 6.0.35}/security.md | 0 .../templates/backup-postgres-config.yaml | 0 .../{6.0.34 => 6.0.35}/templates/common.yaml | 0 .../{6.0.34 => 6.0.35}/templates/secret.yaml | 0 .../upgrade-backup-postgres-hook.yaml | 0 .../1.0.15 => postgresql/6.0.35}/values.yaml | 0 dependency/promtail/1.0.15/Chart.lock | 6 - .../promtail/{1.0.15 => 1.0.16}/CHANGELOG.md | 18 +- .../1.0.39 => promtail/1.0.16}/CONFIG.md | 0 dependency/promtail/1.0.16/Chart.lock | 6 + .../promtail/{1.0.15 => 1.0.16}/Chart.yaml | 2 +- .../promtail/{1.0.15 => 1.0.16}/README.md | 0 .../promtail/{1.0.15 => 1.0.16}/app-readme.md | 0 .../1.0.16}/charts/common-8.9.24.tgz | Bin .../{1.0.15 => 1.0.16}/helm-values.md | 0 .../{1.0.15 => 1.0.16}/ix_values.yaml | 0 .../{1.0.15 => 1.0.16}/questions.yaml | 0 .../promtail/{1.0.15 => 1.0.16}/security.md | 0 .../{1.0.15 => 1.0.16}/templates/common.yaml | 0 .../{1.0.15 => 1.0.16}/templates/secret.yaml | 0 .../templates/servicemonitor.yaml | 0 .../1.0.39 => promtail/1.0.16}/values.yaml | 0 dependency/redis/1.0.39/Chart.lock | 6 - .../redis/{1.0.39 => 1.0.40}/CHANGELOG.md | 20 +- .../redis/1.0.40}/CONFIG.md | 0 dependency/redis/1.0.40/Chart.lock | 6 + .../redis/{1.0.39 => 1.0.40}/Chart.yaml | 2 +- dependency/redis/{1.0.39 => 1.0.40}/README.md | 0 .../redis/{1.0.39 => 1.0.40}/app-readme.md | 0 .../redis/1.0.40}/charts/common-8.9.24.tgz | Bin .../redis/{1.0.39 => 1.0.40}/helm-values.md | 0 .../redis/{1.0.39 => 1.0.40}/ix_values.yaml | 0 .../redis/{1.0.39 => 1.0.40}/questions.yaml | 1 - .../redis/{1.0.39 => 1.0.40}/security.md | 0 .../{1.0.39 => 1.0.40}/templates/common.yaml | 0 .../templates/health-configmap.yaml | 0 .../{1.0.39 => 1.0.40}/templates/secret.yaml | 0 .../redis/1.0.40}/values.yaml | 0 incubator/omada-controller/4.0.34/Chart.lock | 6 - .../{4.0.34 => 4.0.35}/CHANGELOG.md | 20 +- .../4.0.35}/CONFIG.md | 0 incubator/omada-controller/4.0.35/Chart.lock | 6 + .../{4.0.34 => 4.0.35}/Chart.yaml | 2 +- .../{4.0.34 => 4.0.35}/README.md | 0 .../{4.0.34 => 4.0.35}/app-readme.md | 0 .../4.0.35}/charts/common-8.9.24.tgz | Bin .../{4.0.34 => 4.0.35}/helm-values.md | 0 .../{4.0.34 => 4.0.35}/ix_values.yaml | 0 .../{4.0.34 => 4.0.35}/questions.yaml | 1 - .../{4.0.34 => 4.0.35}/security.md | 4 +- .../{4.0.34 => 4.0.35}/templates/common.yaml | 0 .../4.0.35}/values.yaml | 0 incubator/tdarr-node/1.0.28/Chart.lock | 6 - .../{1.0.28 => 1.0.29}/CHANGELOG.md | 22 +- .../1.0.28 => tdarr-node/1.0.29}/CONFIG.md | 0 .../tdarr-node/1.0.29}/Chart.lock | 2 +- .../tdarr-node/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- .../tdarr-node/{1.0.28 => 1.0.29}/README.md | 0 .../{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../{1.0.28 => 1.0.29}/helm-values.md | 0 .../{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../{1.0.28 => 1.0.29}/questions.yaml | 9 - .../tdarr-node/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../1.0.28 => tdarr-node/1.0.29}/values.yaml | 0 incubator/tdarr/1.0.28/Chart.lock | 6 - .../tdarr/{1.0.28 => 1.0.29}/CHANGELOG.md | 24 +- .../tdarr/1.0.29}/CONFIG.md | 0 incubator/tdarr/1.0.29/Chart.lock | 6 + incubator/tdarr/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- incubator/tdarr/{1.0.28 => 1.0.29}/README.md | 0 .../tdarr/{1.0.28 => 1.0.29}/app-readme.md | 0 .../tdarr/1.0.29}/charts/common-8.9.24.tgz | Bin .../tdarr/{1.0.28 => 1.0.29}/helm-values.md | 0 .../tdarr/{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../tdarr/{1.0.28 => 1.0.29}/questions.yaml | 32 - .../tdarr/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../tdarr/1.0.29}/values.yaml | 0 stable/airsonic/4.0.26/Chart.lock | 6 - .../airsonic/{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../2.0.26 => airsonic/4.0.27}/CONFIG.md | 0 stable/airsonic/4.0.27/Chart.lock | 6 + stable/airsonic/{4.0.26 => 4.0.27}/Chart.yaml | 2 +- stable/airsonic/{4.0.26 => 4.0.27}/README.md | 0 .../airsonic/{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../airsonic/{4.0.26 => 4.0.27}/security.md | 0 .../{4.0.26 => 4.0.27}/templates/common.yaml | 0 .../2.0.26 => airsonic/4.0.27}/values.yaml | 0 stable/amcrest2mqtt/2.0.26/Chart.lock | 6 - .../{2.0.26 => 2.0.27}/CHANGELOG.md | 18 +- .../6.0.16 => amcrest2mqtt/2.0.27}/CONFIG.md | 0 stable/amcrest2mqtt/2.0.27/Chart.lock | 6 + .../{2.0.26 => 2.0.27}/Chart.yaml | 2 +- .../amcrest2mqtt/{2.0.26 => 2.0.27}/README.md | 0 .../{2.0.26 => 2.0.27}/app-readme.md | 0 .../2.0.27}/charts/common-8.9.24.tgz | Bin .../{2.0.26 => 2.0.27}/helm-values.md | 0 .../{2.0.26 => 2.0.27}/ix_values.yaml | 0 .../{2.0.26 => 2.0.27}/questions.yaml | 0 .../{2.0.26 => 2.0.27}/security.md | 0 .../{2.0.26 => 2.0.27}/templates/common.yaml | 0 .../2.0.27}/values.yaml | 0 .../anonaddy/{6.0.16 => 6.0.17}/CHANGELOG.md | 18 +- .../2.0.24 => anonaddy/6.0.17}/CONFIG.md | 0 stable/anonaddy/{6.0.16 => 6.0.17}/Chart.lock | 2 +- stable/anonaddy/{6.0.16 => 6.0.17}/Chart.yaml | 2 +- stable/anonaddy/{6.0.16 => 6.0.17}/README.md | 0 .../anonaddy/{6.0.16 => 6.0.17}/app-readme.md | 0 .../6.0.17}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../charts/redis-1.0.39.tgz | Bin .../{6.0.16 => 6.0.17}/helm-values.md | 0 .../{6.0.16 => 6.0.17}/ix_values.yaml | 0 .../{6.0.16 => 6.0.17}/questions.yaml | 0 .../anonaddy/{6.0.16 => 6.0.17}/security.md | 0 .../{6.0.16 => 6.0.17}/templates/_appkey.tpl | 0 .../{6.0.16 => 6.0.17}/templates/common.yaml | 0 .../2.0.24 => anonaddy/6.0.17}/values.yaml | 0 stable/apache-musicindex/2.0.24/Chart.lock | 6 - .../{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../2.0.25}/CONFIG.md | 0 .../2.0.25}/Chart.lock | 2 +- .../{2.0.24 => 2.0.25}/Chart.yaml | 2 +- .../{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../2.0.25}/values.yaml | 0 stable/appdaemon/7.0.5/Chart.lock | 6 - .../appdaemon/{7.0.5 => 7.0.6}/CHANGELOG.md | 20 +- .../3.0.5 => appdaemon/7.0.6}/CONFIG.md | 0 stable/appdaemon/7.0.6/Chart.lock | 6 + stable/appdaemon/{7.0.5 => 7.0.6}/Chart.yaml | 2 +- stable/appdaemon/{7.0.5 => 7.0.6}/README.md | 0 .../appdaemon/{7.0.5 => 7.0.6}/app-readme.md | 0 .../7.0.6}/charts/common-8.9.24.tgz | Bin .../appdaemon/{7.0.5 => 7.0.6}/helm-values.md | 0 .../appdaemon/{7.0.5 => 7.0.6}/ix_values.yaml | 0 .../appdaemon/{7.0.5 => 7.0.6}/questions.yaml | 1 - stable/appdaemon/{7.0.5 => 7.0.6}/security.md | 0 .../{7.0.5 => 7.0.6}/templates/common.yaml | 0 .../3.0.5 => appdaemon/7.0.6}/values.yaml | 0 stable/aria2/3.0.5/Chart.lock | 6 - stable/aria2/{3.0.5 => 3.0.6}/CHANGELOG.md | 24 +- .../2.0.24 => aria2/3.0.6}/CONFIG.md | 0 stable/aria2/3.0.6/Chart.lock | 6 + stable/aria2/{3.0.5 => 3.0.6}/Chart.yaml | 2 +- stable/aria2/{3.0.5 => 3.0.6}/README.md | 0 stable/aria2/{3.0.5 => 3.0.6}/app-readme.md | 0 .../3.0.6}/charts/common-8.9.24.tgz | Bin stable/aria2/{3.0.5 => 3.0.6}/helm-values.md | 0 stable/aria2/{3.0.5 => 3.0.6}/ix_values.yaml | 0 stable/aria2/{3.0.5 => 3.0.6}/questions.yaml | 15 - stable/aria2/{3.0.5 => 3.0.6}/security.md | 0 .../{3.0.5 => 3.0.6}/templates/common.yaml | 0 .../2.0.24 => aria2/3.0.6}/values.yaml | 0 stable/audacity/2.0.24/Chart.lock | 6 - .../audacity/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../8.0.19 => audacity/2.0.25}/CONFIG.md | 0 stable/audacity/2.0.25/Chart.lock | 6 + stable/audacity/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/audacity/{2.0.24 => 2.0.25}/README.md | 0 .../audacity/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../audacity/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../8.0.19 => audacity/2.0.25}/values.yaml | 0 .../authelia/{8.0.19 => 8.0.20}/CHANGELOG.md | 22 +- .../5.0.20 => authelia/8.0.20}/CONFIG.md | 0 stable/authelia/{8.0.19 => 8.0.20}/Chart.lock | 2 +- stable/authelia/{8.0.19 => 8.0.20}/Chart.yaml | 2 +- stable/authelia/{8.0.19 => 8.0.20}/README.md | 0 .../authelia/{8.0.19 => 8.0.20}/app-readme.md | 0 .../8.0.20}/charts/common-8.9.24.tgz | Bin .../charts/postgresql-6.0.34.tgz | Bin .../charts/redis-1.0.39.tgz | Bin .../{8.0.19 => 8.0.20}/helm-values.md | 0 .../{8.0.19 => 8.0.20}/ix_values.yaml | 0 .../{8.0.19 => 8.0.20}/questions.yaml | 7 - .../authelia/{8.0.19 => 8.0.20}/security.md | 0 .../templates/_configmap.tpl | 0 .../{8.0.19 => 8.0.20}/templates/_secrets.tpl | 0 .../{8.0.19 => 8.0.20}/templates/common.yaml | 0 .../5.0.20 => authelia/8.0.20}/values.yaml | 0 .../babybuddy/{5.0.20 => 5.0.21}/CHANGELOG.md | 22 +- .../9.0.26 => babybuddy/5.0.21}/CONFIG.md | 0 .../5.0.14 => babybuddy/5.0.21}/Chart.lock | 2 +- .../babybuddy/{5.0.20 => 5.0.21}/Chart.yaml | 2 +- stable/babybuddy/{5.0.20 => 5.0.21}/README.md | 0 .../{5.0.20 => 5.0.21}/app-readme.md | 0 .../5.0.21}/charts/common-8.9.24.tgz | Bin .../charts/postgresql-6.0.34.tgz | Bin .../{5.0.20 => 5.0.21}/helm-values.md | 9 +- .../{5.0.20 => 5.0.21}/ix_values.yaml | 5 +- .../{5.0.20 => 5.0.21}/questions.yaml | 1 - .../babybuddy/{5.0.20 => 5.0.21}/security.md | 0 .../{5.0.20 => 5.0.21}/templates/common.yaml | 0 .../9.0.26 => babybuddy/5.0.21}/values.yaml | 0 stable/bazarr/9.0.26/Chart.lock | 6 - stable/bazarr/{9.0.26 => 9.0.27}/CHANGELOG.md | 20 +- .../{beets/2.0.27 => bazarr/9.0.27}/CONFIG.md | 0 stable/bazarr/9.0.27/Chart.lock | 6 + stable/bazarr/{9.0.26 => 9.0.27}/Chart.yaml | 2 +- stable/bazarr/{9.0.26 => 9.0.27}/README.md | 0 .../bazarr/{9.0.26 => 9.0.27}/app-readme.md | 0 .../9.0.27}/charts/common-8.9.24.tgz | Bin .../bazarr/{9.0.26 => 9.0.27}/helm-values.md | 0 .../bazarr/{9.0.26 => 9.0.27}/ix_values.yaml | 0 .../bazarr/{9.0.26 => 9.0.27}/questions.yaml | 1 - stable/bazarr/{9.0.26 => 9.0.27}/security.md | 0 .../{9.0.26 => 9.0.27}/templates/common.yaml | 0 .../2.0.27 => bazarr/9.0.27}/values.yaml | 0 stable/beets/2.0.27/Chart.lock | 6 - stable/beets/{2.0.27 => 2.0.28}/CHANGELOG.md | 20 +- .../{blog/0.0.14 => beets/2.0.28}/CONFIG.md | 0 stable/beets/2.0.28/Chart.lock | 6 + stable/beets/{2.0.27 => 2.0.28}/Chart.yaml | 2 +- stable/beets/{2.0.27 => 2.0.28}/README.md | 0 stable/beets/{2.0.27 => 2.0.28}/app-readme.md | 0 .../2.0.28}/charts/common-8.9.24.tgz | Bin .../beets/{2.0.27 => 2.0.28}/helm-values.md | 0 .../beets/{2.0.27 => 2.0.28}/ix_values.yaml | 0 .../beets/{2.0.27 => 2.0.28}/questions.yaml | 1 - stable/beets/{2.0.27 => 2.0.28}/security.md | 0 .../{2.0.27 => 2.0.28}/templates/common.yaml | 0 .../{blog/0.0.14 => beets/2.0.28}/values.yaml | 0 stable/blog/{0.0.14 => 0.0.15}/CHANGELOG.md | 18 +- stable/{boinc/0.0.5 => blog/0.0.15}/CONFIG.md | 0 .../5.0.15 => blog/0.0.15}/Chart.lock | 2 +- stable/blog/{0.0.14 => 0.0.15}/Chart.yaml | 2 +- stable/blog/{0.0.14 => 0.0.15}/README.md | 0 stable/blog/{0.0.14 => 0.0.15}/app-readme.md | 0 .../0.0.15}/charts/common-8.9.24.tgz | Bin .../charts/postgresql-6.0.34.tgz | Bin stable/blog/{0.0.14 => 0.0.15}/helm-values.md | 0 stable/blog/{0.0.14 => 0.0.15}/ix_values.yaml | 0 stable/blog/{0.0.14 => 0.0.15}/questions.yaml | 0 stable/blog/{0.0.14 => 0.0.15}/security.md | 0 .../{0.0.14 => 0.0.15}/templates/common.yaml | 0 .../{boinc/0.0.5 => blog/0.0.15}/values.yaml | 0 stable/boinc/0.0.5/Chart.lock | 6 - stable/boinc/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.26 => boinc/0.0.6}/CONFIG.md | 0 stable/boinc/0.0.6/Chart.lock | 6 + stable/boinc/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/boinc/{0.0.5 => 0.0.6}/README.md | 0 stable/boinc/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin stable/boinc/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/boinc/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/boinc/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/boinc/{0.0.5 => 0.0.6}/security.md | 0 .../{0.0.5 => 0.0.6}/templates/common.yaml | 0 .../4.0.26 => boinc/0.0.6}/values.yaml | 0 stable/booksonic-air/4.0.26/Chart.lock | 6 - .../{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../0.0.14 => booksonic-air/4.0.27}/CONFIG.md | 0 stable/booksonic-air/4.0.27/Chart.lock | 6 + .../{4.0.26 => 4.0.27}/Chart.yaml | 2 +- .../{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../{4.0.26 => 4.0.27}/security.md | 2 +- .../{4.0.26 => 4.0.27}/templates/common.yaml | 0 .../4.0.27}/values.yaml | 0 .../bookstack/{0.0.14 => 0.0.15}/CHANGELOG.md | 18 +- .../9.0.24 => bookstack/0.0.15}/CONFIG.md | 0 .../bookstack/{0.0.14 => 0.0.15}/Chart.lock | 2 +- .../bookstack/{0.0.14 => 0.0.15}/Chart.yaml | 2 +- stable/bookstack/{0.0.14 => 0.0.15}/README.md | 0 .../{0.0.14 => 0.0.15}/app-readme.md | 0 .../0.0.15}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../{0.0.14 => 0.0.15}/helm-values.md | 0 .../{0.0.14 => 0.0.15}/ix_values.yaml | 0 .../{0.0.14 => 0.0.15}/questions.yaml | 0 .../bookstack/{0.0.14 => 0.0.15}/security.md | 2 +- .../{0.0.14 => 0.0.15}/templates/common.yaml | 0 .../9.0.24 => bookstack/0.0.15}/values.yaml | 0 stable/calibre-web/9.0.24/Chart.lock | 6 - .../{9.0.24 => 9.0.25}/CHANGELOG.md | 20 +- .../5.0.5 => calibre-web/9.0.25}/CONFIG.md | 0 stable/calibre-web/9.0.25/Chart.lock | 6 + .../calibre-web/{9.0.24 => 9.0.25}/Chart.yaml | 2 +- .../calibre-web/{9.0.24 => 9.0.25}/README.md | 0 .../{9.0.24 => 9.0.25}/app-readme.md | 0 .../9.0.25}/charts/common-8.9.24.tgz | Bin .../{9.0.24 => 9.0.25}/helm-values.md | 0 .../{9.0.24 => 9.0.25}/ix_values.yaml | 0 .../{9.0.24 => 9.0.25}/questions.yaml | 1 - .../{9.0.24 => 9.0.25}/security.md | 0 .../{9.0.24 => 9.0.25}/templates/common.yaml | 0 .../5.0.5 => calibre-web/9.0.25}/values.yaml | 0 stable/calibre/5.0.5/Chart.lock | 6 - stable/calibre/{5.0.5 => 5.0.6}/CHANGELOG.md | 22 +- .../0.0.6 => calibre/5.0.6}/CONFIG.md | 0 stable/calibre/5.0.6/Chart.lock | 6 + stable/calibre/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- stable/calibre/{5.0.5 => 5.0.6}/README.md | 0 stable/calibre/{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../calibre/{5.0.5 => 5.0.6}/helm-values.md | 0 .../calibre/{5.0.5 => 5.0.6}/ix_values.yaml | 0 .../calibre/{5.0.5 => 5.0.6}/questions.yaml | 8 - stable/calibre/{5.0.5 => 5.0.6}/security.md | 0 .../{5.0.5 => 5.0.6}/templates/common.yaml | 0 .../0.0.6 => calibre/5.0.6}/values.yaml | 0 .../chevereto/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../0.0.15 => chevereto/0.0.7}/CONFIG.md | 0 stable/chevereto/{0.0.6 => 0.0.7}/Chart.lock | 2 +- stable/chevereto/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/chevereto/{0.0.6 => 0.0.7}/README.md | 0 .../chevereto/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../chevereto/{0.0.6 => 0.0.7}/helm-values.md | 0 .../chevereto/{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../chevereto/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/chevereto/{0.0.6 => 0.0.7}/security.md | 0 .../{0.0.6 => 0.0.7}/templates/common.yaml | 0 .../0.0.15 => chevereto/0.0.7}/values.yaml | 0 .../clarkson/{0.0.15 => 0.0.16}/CHANGELOG.md | 18 +- .../2.0.27 => clarkson/0.0.16}/CONFIG.md | 0 stable/clarkson/{0.0.15 => 0.0.16}/Chart.lock | 2 +- stable/clarkson/{0.0.15 => 0.0.16}/Chart.yaml | 2 +- stable/clarkson/{0.0.15 => 0.0.16}/README.md | 0 .../clarkson/{0.0.15 => 0.0.16}/app-readme.md | 0 .../0.0.16}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../{0.0.15 => 0.0.16}/helm-values.md | 0 .../{0.0.15 => 0.0.16}/ix_values.yaml | 0 .../{0.0.15 => 0.0.16}/questions.yaml | 0 .../clarkson/{0.0.15 => 0.0.16}/security.md | 0 .../{0.0.15 => 0.0.16}/templates/common.yaml | 0 .../2.0.27 => clarkson/0.0.16}/values.yaml | 0 stable/cloud9/2.0.27/Chart.lock | 6 - stable/cloud9/{2.0.27 => 2.0.28}/CHANGELOG.md | 20 +- .../2.1.7 => cloud9/2.0.28}/CONFIG.md | 0 stable/cloud9/2.0.28/Chart.lock | 6 + stable/cloud9/{2.0.27 => 2.0.28}/Chart.yaml | 2 +- stable/cloud9/{2.0.27 => 2.0.28}/README.md | 0 .../cloud9/{2.0.27 => 2.0.28}/app-readme.md | 0 .../2.0.28}/charts/common-8.9.24.tgz | Bin .../cloud9/{2.0.27 => 2.0.28}/helm-values.md | 0 .../cloud9/{2.0.27 => 2.0.28}/ix_values.yaml | 0 .../cloud9/{2.0.27 => 2.0.28}/questions.yaml | 1 - stable/cloud9/{2.0.27 => 2.0.28}/security.md | 0 .../{2.0.27 => 2.0.28}/templates/common.yaml | 0 .../2.1.7 => cloud9/2.0.28}/values.yaml | 0 stable/code-server/2.1.7/Chart.lock | 6 - .../code-server/{2.1.7 => 2.1.8}/CHANGELOG.md | 20 +- .../0.0.5 => code-server/2.1.8}/CONFIG.md | 0 stable/code-server/2.1.8/Chart.lock | 6 + .../code-server/{2.1.7 => 2.1.8}/Chart.yaml | 2 +- stable/code-server/{2.1.7 => 2.1.8}/README.md | 0 .../{2.1.7 => 2.1.8}/app-readme.md | 0 .../2.1.8}/charts/common-8.9.24.tgz | Bin .../{2.1.7 => 2.1.8}/helm-values.md | 0 .../{2.1.7 => 2.1.8}/ix_values.yaml | 0 .../{2.1.7 => 2.1.8}/questions.yaml | 1 - .../code-server/{2.1.7 => 2.1.8}/security.md | 0 .../{2.1.7 => 2.1.8}/templates/common.yaml | 0 .../0.0.5 => code-server/2.1.8}/values.yaml | 0 stable/collabora-online/10.0.6/CHANGELOG.md | 99 + .../10.0.6}/CONFIG.md | 0 stable/collabora-online/10.0.6/Chart.lock | 6 + stable/collabora-online/10.0.6/Chart.yaml | 32 + stable/collabora-online/10.0.6/README.md | 39 + stable/collabora-online/10.0.6/app-readme.md | 3 + .../10.0.6}/charts/common-8.9.24.tgz | Bin stable/collabora-online/10.0.6/helm-values.md | 31 + stable/collabora-online/10.0.6/ix_values.yaml | 28 + stable/collabora-online/10.0.6/questions.yaml | 1711 ++++++++++++ stable/collabora-online/10.0.6/security.md | 224 ++ .../10.0.6}/templates/common.yaml | 0 .../10.0.6}/values.yaml | 0 .../couchpotato/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../3.0.42 => couchpotato/0.0.6}/CONFIG.md | 0 stable/couchpotato/0.0.6/Chart.lock | 6 + .../couchpotato/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/couchpotato/{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../couchpotato/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../3.0.42 => couchpotato/0.0.6}/values.yaml | 0 stable/cryptofolio/2.0.24/Chart.lock | 6 - .../{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../0.0.5 => cryptofolio/2.0.25}/CONFIG.md | 0 stable/cryptofolio/2.0.25/Chart.lock | 6 + .../cryptofolio/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- .../cryptofolio/{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../{2.0.24 => 2.0.25}/security.md | 0 .../2.0.25}/templates/common.yaml | 0 .../0.0.5 => cryptofolio/2.0.25}/values.yaml | 0 stable/custom-app/3.0.42/Chart.lock | 6 - .../{3.0.42 => 3.0.43}/CHANGELOG.md | 18 +- .../2.0.24 => custom-app/3.0.43}/CONFIG.md | 0 stable/custom-app/3.0.43/Chart.lock | 6 + .../custom-app/{3.0.42 => 3.0.43}/Chart.yaml | 2 +- .../custom-app/{3.0.42 => 3.0.43}/README.md | 0 .../{3.0.42 => 3.0.43}/app-readme.md | 0 .../3.0.43}/charts/common-8.9.24.tgz | Bin .../{3.0.42 => 3.0.43}/ci/test-values.yaml | 0 .../{3.0.42 => 3.0.43}/helm-values.md | 0 .../{3.0.42 => 3.0.43}/ix_values.yaml | 0 .../{3.0.42 => 3.0.43}/questions.yaml | 0 .../custom-app/{3.0.42 => 3.0.43}/security.md | 0 .../3.0.43}/templates/common.yaml | 0 .../2.0.24 => custom-app/3.0.43}/values.yaml | 0 stable/darktable/0.0.5/Chart.lock | 6 - .../darktable/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.5 => darktable/0.0.6}/CONFIG.md | 0 stable/darktable/0.0.6/Chart.lock | 6 + stable/darktable/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/darktable/{0.0.5 => 0.0.6}/README.md | 0 .../darktable/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../darktable/{0.0.5 => 0.0.6}/helm-values.md | 0 .../darktable/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../darktable/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/darktable/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.5 => darktable/0.0.6}/values.yaml | 0 stable/davos/2.0.24/Chart.lock | 6 - stable/davos/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../{deconz/6.0.5 => davos/2.0.25}/CONFIG.md | 0 stable/davos/2.0.25/Chart.lock | 6 + stable/davos/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/davos/{2.0.24 => 2.0.25}/README.md | 0 stable/davos/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../davos/{2.0.24 => 2.0.25}/helm-values.md | 0 .../davos/{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../davos/{2.0.24 => 2.0.25}/questions.yaml | 1 - stable/davos/{2.0.24 => 2.0.25}/security.md | 4 +- .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../6.0.5 => davos/2.0.25}/values.yaml | 0 stable/ddclient/0.0.5/Chart.lock | 6 - stable/ddclient/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../8.0.6 => ddclient/0.0.6}/CONFIG.md | 0 stable/ddclient/0.0.6/Chart.lock | 6 + stable/ddclient/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/ddclient/{0.0.5 => 0.0.6}/README.md | 0 .../ddclient/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../ddclient/{0.0.5 => 0.0.6}/helm-values.md | 0 .../ddclient/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../ddclient/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/ddclient/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../8.0.6 => ddclient/0.0.6}/values.yaml | 0 stable/deconz/6.0.5/Chart.lock | 6 - stable/deconz/{6.0.5 => 6.0.6}/CHANGELOG.md | 22 +- .../3.0.6 => deconz/6.0.6}/CONFIG.md | 0 stable/deconz/6.0.6/Chart.lock | 6 + stable/deconz/{6.0.5 => 6.0.6}/Chart.yaml | 2 +- stable/deconz/{6.0.5 => 6.0.6}/README.md | 0 stable/deconz/{6.0.5 => 6.0.6}/app-readme.md | 0 .../6.0.6}/charts/common-8.9.24.tgz | Bin .../{6.0.5 => 6.0.6}/ci/test-values.yaml | 0 stable/deconz/{6.0.5 => 6.0.6}/helm-values.md | 0 stable/deconz/{6.0.5 => 6.0.6}/ix_values.yaml | 0 stable/deconz/{6.0.5 => 6.0.6}/questions.yaml | 15 - stable/deconz/{6.0.5 => 6.0.6}/security.md | 0 .../6.0.6}/templates/common.yaml | 0 .../3.0.6 => deconz/6.0.6}/values.yaml | 0 stable/deepstack-cpu/8.0.6/Chart.lock | 6 - .../{8.0.6 => 8.0.7}/CHANGELOG.md | 22 +- .../9.0.25 => deepstack-cpu/8.0.7}/CONFIG.md | 0 stable/deepstack-cpu/8.0.7/Chart.lock | 6 + .../deepstack-cpu/{8.0.6 => 8.0.7}/Chart.yaml | 2 +- .../deepstack-cpu/{8.0.6 => 8.0.7}/README.md | 0 .../{8.0.6 => 8.0.7}/app-readme.md | 0 .../8.0.7}/charts/common-8.9.24.tgz | Bin .../{8.0.6 => 8.0.7}/helm-values.md | 2 +- .../{8.0.6 => 8.0.7}/ix_values.yaml | 7 +- .../{8.0.6 => 8.0.7}/questions.yaml | 1 - .../{8.0.6 => 8.0.7}/security.md | 0 .../8.0.7}/templates/common.yaml | 0 .../8.0.7}/values.yaml | 0 stable/deepstack-gpu/3.0.6/Chart.lock | 6 - .../{3.0.6 => 3.0.7}/CHANGELOG.md | 22 +- .../2.0.26 => deepstack-gpu/3.0.7}/CONFIG.md | 0 stable/deepstack-gpu/3.0.7/Chart.lock | 6 + .../deepstack-gpu/{3.0.6 => 3.0.7}/Chart.yaml | 2 +- .../deepstack-gpu/{3.0.6 => 3.0.7}/README.md | 0 .../{3.0.6 => 3.0.7}/app-readme.md | 0 .../3.0.7}/charts/common-8.9.24.tgz | Bin .../{3.0.6 => 3.0.7}/helm-values.md | 2 +- .../{3.0.6 => 3.0.7}/ix_values.yaml | 7 +- .../{3.0.6 => 3.0.7}/questions.yaml | 1 - .../{3.0.6 => 3.0.7}/security.md | 0 .../3.0.7}/templates/common.yaml | 0 .../3.0.7}/values.yaml | 0 stable/deluge/9.0.25/Chart.lock | 6 - stable/deluge/{9.0.25 => 9.0.26}/CHANGELOG.md | 22 +- .../0.0.5 => deluge/9.0.26}/CONFIG.md | 0 stable/deluge/9.0.26/Chart.lock | 6 + stable/deluge/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/deluge/{9.0.25 => 9.0.26}/README.md | 0 .../deluge/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../deluge/{9.0.25 => 9.0.26}/helm-values.md | 0 .../deluge/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../deluge/{9.0.25 => 9.0.26}/questions.yaml | 15 - stable/deluge/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../0.0.5 => deluge/9.0.26}/values.yaml | 0 stable/digikam/2.0.26/Chart.lock | 6 - .../digikam/{2.0.26 => 2.0.27}/CHANGELOG.md | 20 +- .../5.0.5 => digikam/2.0.27}/CONFIG.md | 0 stable/digikam/2.0.27/Chart.lock | 6 + stable/digikam/{2.0.26 => 2.0.27}/Chart.yaml | 2 +- stable/digikam/{2.0.26 => 2.0.27}/README.md | 0 .../digikam/{2.0.26 => 2.0.27}/app-readme.md | 0 .../2.0.27}/charts/common-8.9.24.tgz | Bin .../digikam/{2.0.26 => 2.0.27}/helm-values.md | 0 .../digikam/{2.0.26 => 2.0.27}/ix_values.yaml | 0 .../digikam/{2.0.26 => 2.0.27}/questions.yaml | 1 - stable/digikam/{2.0.26 => 2.0.27}/security.md | 0 .../{2.0.26 => 2.0.27}/templates/common.yaml | 0 .../5.0.5 => digikam/2.0.27}/values.yaml | 0 .../dillinger/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.5 => dillinger/0.0.6}/CONFIG.md | 0 stable/dillinger/0.0.6/Chart.lock | 6 + stable/dillinger/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/dillinger/{0.0.5 => 0.0.6}/README.md | 0 .../dillinger/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../dillinger/{0.0.5 => 0.0.6}/helm-values.md | 0 .../dillinger/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../dillinger/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/dillinger/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.5 => dillinger/0.0.6}/values.yaml | 0 stable/dizquetv/{5.0.5 => 5.0.6}/CHANGELOG.md | 20 +- .../0.0.7 => dizquetv/5.0.6}/CONFIG.md | 0 stable/dizquetv/5.0.6/Chart.lock | 6 + stable/dizquetv/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- stable/dizquetv/{5.0.5 => 5.0.6}/README.md | 0 .../dizquetv/{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../dizquetv/{5.0.5 => 5.0.6}/helm-values.md | 0 .../dizquetv/{5.0.5 => 5.0.6}/ix_values.yaml | 0 .../dizquetv/{5.0.5 => 5.0.6}/questions.yaml | 1 - stable/dizquetv/{5.0.5 => 5.0.6}/security.md | 0 .../5.0.6}/templates/common.yaml | 0 .../0.0.7 => dizquetv/5.0.6}/values.yaml | 0 stable/dokuwiki/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../2.0.27 => dokuwiki/0.0.6}/CONFIG.md | 0 stable/dokuwiki/0.0.6/Chart.lock | 6 + stable/dokuwiki/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/dokuwiki/{0.0.5 => 0.0.6}/README.md | 0 .../dokuwiki/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../dokuwiki/{0.0.5 => 0.0.6}/helm-values.md | 0 .../dokuwiki/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../dokuwiki/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/dokuwiki/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../2.0.27 => dokuwiki/0.0.6}/values.yaml | 0 stable/domoticz/0.0.7/Chart.lock | 6 - stable/domoticz/{0.0.7 => 0.0.8}/CHANGELOG.md | 9 + .../5.0.14 => domoticz/0.0.8}/CONFIG.md | 0 stable/domoticz/0.0.8/Chart.lock | 6 + stable/domoticz/{0.0.7 => 0.0.8}/Chart.yaml | 2 +- stable/domoticz/{0.0.7 => 0.0.8}/README.md | 0 .../domoticz/{0.0.7 => 0.0.8}/app-readme.md | 0 .../0.0.8}/charts/common-8.9.24.tgz | Bin .../domoticz/{0.0.7 => 0.0.8}/helm-values.md | 0 .../domoticz/{0.0.7 => 0.0.8}/ix_values.yaml | 0 .../domoticz/{0.0.7 => 0.0.8}/questions.yaml | 0 stable/domoticz/{0.0.7 => 0.0.8}/security.md | 0 .../0.0.8}/templates/common.yaml | 0 .../5.0.14 => domoticz/0.0.8}/values.yaml | 0 stable/doublecommander/2.0.27/Chart.lock | 6 - .../{2.0.27 => 2.0.28}/CHANGELOG.md | 20 +- .../2.0.28}/CONFIG.md | 0 stable/doublecommander/2.0.28/Chart.lock | 6 + .../{2.0.27 => 2.0.28}/Chart.yaml | 2 +- .../{2.0.27 => 2.0.28}/README.md | 0 .../{2.0.27 => 2.0.28}/app-readme.md | 0 .../2.0.28}/charts/common-8.9.24.tgz | Bin .../{2.0.27 => 2.0.28}/helm-values.md | 0 .../{2.0.27 => 2.0.28}/ix_values.yaml | 0 .../{2.0.27 => 2.0.28}/questions.yaml | 1 - .../{2.0.27 => 2.0.28}/security.md | 0 .../{2.0.27 => 2.0.28}/templates/common.yaml | 0 .../2.0.28}/values.yaml | 0 .../{5.0.14 => 5.0.15}/CHANGELOG.md | 22 +- .../4.0.24 => dsmr-reader/5.0.15}/CONFIG.md | 0 .../5.0.20 => dsmr-reader/5.0.15}/Chart.lock | 2 +- .../dsmr-reader/{5.0.14 => 5.0.15}/Chart.yaml | 2 +- .../dsmr-reader/{5.0.14 => 5.0.15}/README.md | 0 .../{5.0.14 => 5.0.15}/app-readme.md | 0 .../5.0.15}/charts/common-8.9.24.tgz | Bin .../charts/postgresql-6.0.34.tgz | Bin .../{5.0.14 => 5.0.15}/helm-values.md | 5 - .../{5.0.14 => 5.0.15}/ix_values.yaml | 12 +- .../{5.0.14 => 5.0.15}/questions.yaml | 1 - .../{5.0.14 => 5.0.15}/security.md | 0 .../5.0.15}/templates/common.yaml | 0 .../4.0.24 => dsmr-reader/5.0.15}/values.yaml | 0 stable/duckdns/0.0.5/Chart.lock | 6 - stable/duckdns/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../{emby/9.0.26 => duckdns/0.0.6}/CONFIG.md | 0 stable/duckdns/0.0.6/Chart.lock | 6 + stable/duckdns/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/duckdns/{0.0.5 => 0.0.6}/README.md | 0 stable/duckdns/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../duckdns/{0.0.5 => 0.0.6}/helm-values.md | 0 .../duckdns/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../duckdns/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/duckdns/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../9.0.26 => duckdns/0.0.6}/values.yaml | 0 stable/duplicati/4.0.24/Chart.lock | 6 - .../duplicati/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../0.0.5 => duplicati/4.0.25}/CONFIG.md | 0 stable/duplicati/4.0.25/Chart.lock | 6 + .../duplicati/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/duplicati/{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../duplicati/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../0.0.5 => duplicati/4.0.25}/values.yaml | 0 stable/emby/9.0.26/Chart.lock | 6 - stable/emby/{9.0.26 => 9.0.27}/CHANGELOG.md | 20 +- .../0.0.6 => emby/9.0.27}/CONFIG.md | 0 stable/emby/9.0.27/Chart.lock | 6 + stable/emby/{9.0.26 => 9.0.27}/Chart.yaml | 2 +- stable/emby/{9.0.26 => 9.0.27}/README.md | 0 stable/emby/{9.0.26 => 9.0.27}/app-readme.md | 0 .../9.0.27}/charts/common-8.9.24.tgz | Bin stable/emby/{9.0.26 => 9.0.27}/helm-values.md | 0 stable/emby/{9.0.26 => 9.0.27}/ix_values.yaml | 0 stable/emby/{9.0.26 => 9.0.27}/questions.yaml | 1 - stable/emby/{9.0.26 => 9.0.27}/security.md | 0 .../9.0.27}/templates/common.yaml | 0 .../0.0.6 => emby/9.0.27}/values.yaml | 0 stable/embystat/0.0.5/Chart.lock | 6 - stable/embystat/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.5 => embystat/0.0.6}/CONFIG.md | 0 stable/embystat/0.0.6/Chart.lock | 6 + stable/embystat/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/embystat/{0.0.5 => 0.0.6}/README.md | 0 .../embystat/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../embystat/{0.0.5 => 0.0.6}/helm-values.md | 0 .../embystat/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../embystat/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/embystat/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6/templates/common.yaml | 0 .../0.0.5 => embystat/0.0.6}/values.yaml | 0 stable/emulatorjs/0.0.6/Chart.lock | 6 - .../emulatorjs/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../9.0.29 => emulatorjs/0.0.7}/CONFIG.md | 0 stable/emulatorjs/0.0.7/Chart.lock | 6 + stable/emulatorjs/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/emulatorjs/{0.0.6 => 0.0.7}/README.md | 0 .../emulatorjs/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../emulatorjs/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../9.0.29 => emulatorjs/0.0.7}/values.yaml | 0 stable/endlessh/0.0.5/Chart.lock | 6 - stable/endlessh/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../5.0.15 => endlessh/0.0.6}/CONFIG.md | 0 stable/endlessh/0.0.6/Chart.lock | 6 + stable/endlessh/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/endlessh/{0.0.5 => 0.0.6}/README.md | 0 .../endlessh/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../endlessh/{0.0.5 => 0.0.6}/helm-values.md | 0 .../endlessh/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../endlessh/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/endlessh/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../5.0.15 => endlessh/0.0.6}/values.yaml | 0 stable/esphome/9.0.29/Chart.lock | 6 - .../esphome/{9.0.29 => 9.0.30}/CHANGELOG.md | 20 +- .../4.0.23 => esphome/9.0.30}/CONFIG.md | 0 stable/esphome/9.0.30/Chart.lock | 6 + stable/esphome/{9.0.29 => 9.0.30}/Chart.yaml | 2 +- stable/esphome/{9.0.29 => 9.0.30}/README.md | 0 .../esphome/{9.0.29 => 9.0.30}/app-readme.md | 0 .../9.0.30}/charts/common-8.9.24.tgz | Bin .../esphome/{9.0.29 => 9.0.30}/helm-values.md | 0 .../esphome/{9.0.29 => 9.0.30}/ix_values.yaml | 0 .../esphome/{9.0.29 => 9.0.30}/questions.yaml | 1 - stable/esphome/{9.0.29 => 9.0.30}/security.md | 0 .../9.0.30}/templates/common.yaml | 0 .../4.0.23 => esphome/9.0.30}/values.yaml | 0 .../etherpad/{5.0.15 => 5.0.16}/CHANGELOG.md | 22 +- .../2.0.24 => etherpad/5.0.16}/CONFIG.md | 0 .../0.0.14 => etherpad/5.0.16}/Chart.lock | 2 +- stable/etherpad/{5.0.15 => 5.0.16}/Chart.yaml | 2 +- stable/etherpad/{5.0.15 => 5.0.16}/README.md | 0 .../etherpad/{5.0.15 => 5.0.16}/app-readme.md | 0 .../5.0.16}/charts/common-8.9.24.tgz | Bin .../charts/postgresql-6.0.34.tgz | Bin .../{5.0.15 => 5.0.16}/helm-values.md | 9 +- .../{5.0.15 => 5.0.16}/ix_values.yaml | 4 +- .../{5.0.15 => 5.0.16}/questions.yaml | 1 - .../etherpad/{5.0.15 => 5.0.16}/security.md | 0 .../5.0.16}/templates/common.yaml | 0 .../2.0.24 => etherpad/5.0.16}/values.yaml | 0 stable/external-service/4.0.23/Chart.lock | 6 - .../{4.0.23 => 4.0.24}/CHANGELOG.md | 18 +- .../4.0.24}/CONFIG.md | 0 stable/external-service/4.0.24/Chart.lock | 6 + .../{4.0.23 => 4.0.24}/Chart.yaml | 2 +- .../{4.0.23 => 4.0.24}/README.md | 0 .../{4.0.23 => 4.0.24}/app-readme.md | 0 .../4.0.24}/charts/common-8.9.24.tgz | Bin .../{4.0.23 => 4.0.24}/helm-values.md | 0 .../{4.0.23 => 4.0.24}/ix_values.yaml | 0 .../{4.0.23 => 4.0.24}/questions.yaml | 0 .../{4.0.23 => 4.0.24}/security.md | 0 .../4.0.24}/templates/common.yaml | 0 .../4.0.24}/values.yaml | 0 stable/filezilla/2.0.24/Chart.lock | 6 - .../filezilla/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../0.0.5 => filezilla/2.0.25}/CONFIG.md | 0 stable/filezilla/2.0.25/Chart.lock | 6 + .../filezilla/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/filezilla/{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../filezilla/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../0.0.5 => filezilla/2.0.25}/values.yaml | 0 stable/fireflyiii/13.1.7/CHANGELOG.md | 99 + .../4.0.26 => fireflyiii/13.1.7}/CONFIG.md | 0 .../1.0.3 => fireflyiii/13.1.7}/Chart.lock | 2 +- stable/fireflyiii/13.1.7/Chart.yaml | 36 + stable/fireflyiii/13.1.7/README.md | 39 + stable/fireflyiii/13.1.7/app-readme.md | 3 + .../13.1.7}/charts/common-8.9.24.tgz | Bin .../13.1.7}/charts/postgresql-6.0.34.tgz | Bin .../13.1.7}/charts/redis-1.0.39.tgz | Bin stable/fireflyiii/13.1.7/helm-values.md | 61 + stable/fireflyiii/13.1.7/ix_values.yaml | 90 + stable/fireflyiii/13.1.7/questions.yaml | 1827 +++++++++++++ stable/fireflyiii/13.1.7/security.md | 1522 +++++++++++ .../fireflyiii/13.1.7/templates/_cronjob.tpl | 54 + .../fireflyiii/13.1.7/templates/_secrets.tpl | 24 + .../fireflyiii/13.1.7/templates/common.yaml | 11 + .../4.0.26 => fireflyiii/13.1.7}/values.yaml | 0 stable/firefox-syncserver/5.0.15/Chart.lock | 9 - .../{5.0.15 => 5.0.16}/CHANGELOG.md | 20 +- .../5.0.16}/CONFIG.md | 0 stable/firefox-syncserver/5.0.16/Chart.lock | 9 + .../{5.0.15 => 5.0.16}/Chart.yaml | 2 +- .../{5.0.15 => 5.0.16}/README.md | 0 .../{5.0.15 => 5.0.16}/app-readme.md | 0 .../5.0.16}/charts/common-8.9.24.tgz | Bin .../5.0.16}/charts/postgresql-6.0.34.tgz | Bin .../{5.0.15 => 5.0.16}/helm-values.md | 0 .../{5.0.15 => 5.0.16}/ix_values.yaml | 0 .../{5.0.15 => 5.0.16}/questions.yaml | 1 - .../{5.0.15 => 5.0.16}/security.md | 0 .../5.0.16}/templates/common.yaml | 0 .../5.0.16}/values.yaml | 0 stable/firefox/0.0.5/Chart.lock | 6 - stable/firefox/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../{flood/4.0.24 => firefox/0.0.6}/CONFIG.md | 0 stable/firefox/0.0.6/Chart.lock | 6 + stable/firefox/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/firefox/{0.0.5 => 0.0.6}/README.md | 0 stable/firefox/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../firefox/{0.0.5 => 0.0.6}/helm-values.md | 0 .../firefox/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../firefox/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/firefox/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../4.0.24 => firefox/0.0.6}/values.yaml | 0 stable/flaresolverr/4.0.26/Chart.lock | 6 - .../{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../4.0.25 => flaresolverr/4.0.27}/CONFIG.md | 0 .../5.0.5 => flaresolverr/4.0.27}/Chart.lock | 2 +- .../{4.0.26 => 4.0.27}/Chart.yaml | 2 +- .../flaresolverr/{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../{4.0.26 => 4.0.27}/security.md | 0 .../4.0.27}/templates/common.yaml | 0 .../4.0.27}/values.yaml | 0 stable/fleet/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../{foldingathome => fleet}/0.0.6/CONFIG.md | 0 stable/fleet/0.0.6/Chart.lock | 9 + stable/fleet/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/fleet/{0.0.5 => 0.0.6}/README.md | 0 stable/fleet/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin stable/fleet/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/fleet/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/fleet/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/fleet/{0.0.5 => 0.0.6}/security.md | 4 +- .../0.0.6}/templates/common.yaml | 0 .../0.0.6/values.yaml | 0 stable/flood/4.0.24/Chart.lock | 6 - stable/flood/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../{fossil/2.0.24 => flood/4.0.25}/CONFIG.md | 0 stable/flood/4.0.25/Chart.lock | 6 + stable/flood/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/flood/{4.0.24 => 4.0.25}/README.md | 0 stable/flood/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/ci/ct-values.yaml | 0 .../flood/{4.0.24 => 4.0.25}/helm-values.md | 0 .../flood/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../flood/{4.0.24 => 4.0.25}/questions.yaml | 1 - stable/flood/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25/templates/common.yaml | 0 .../2.0.24 => flood/4.0.25}/values.yaml | 0 stable/focalboard/4.0.25/Chart.lock | 6 - .../{4.0.25 => 4.0.26}/CHANGELOG.md | 20 +- .../4.0.27 => focalboard/4.0.26}/CONFIG.md | 0 stable/focalboard/4.0.26/Chart.lock | 6 + .../focalboard/{4.0.25 => 4.0.26}/Chart.yaml | 2 +- .../focalboard/{4.0.25 => 4.0.26}/README.md | 0 .../{4.0.25 => 4.0.26}/app-readme.md | 0 .../4.0.26}/charts/common-8.9.24.tgz | Bin .../{4.0.25 => 4.0.26}/helm-values.md | 0 .../{4.0.25 => 4.0.26}/ix_values.yaml | 0 .../{4.0.25 => 4.0.26}/questions.yaml | 1 - .../focalboard/{4.0.25 => 4.0.26}/security.md | 0 .../4.0.26}/templates/common.yaml | 0 .../4.0.27 => focalboard/4.0.26}/values.yaml | 0 stable/foldingathome/0.0.6/Chart.lock | 6 - .../{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../9.0.28 => foldingathome/0.0.7}/CONFIG.md | 0 stable/foldingathome/0.0.7/Chart.lock | 6 + .../foldingathome/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- .../foldingathome/{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../0.0.7}/values.yaml | 0 stable/fossil/2.0.24/Chart.lock | 6 - stable/fossil/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../0.0.16 => fossil/2.0.25}/CONFIG.md | 0 stable/fossil/2.0.25/Chart.lock | 6 + stable/fossil/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/fossil/{2.0.24 => 2.0.25}/README.md | 0 .../fossil/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../fossil/{2.0.24 => 2.0.25}/helm-values.md | 0 .../fossil/{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../fossil/{2.0.24 => 2.0.25}/questions.yaml | 1 - stable/fossil/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../0.0.16 => fossil/2.0.25}/values.yaml | 0 stable/freeradius/4.0.27/Chart.lock | 6 - .../{4.0.27 => 4.0.28}/CHANGELOG.md | 20 +- .../9.0.25 => freeradius/4.0.28}/CONFIG.md | 0 .../0.0.5 => freeradius/4.0.28}/Chart.lock | 2 +- .../freeradius/{4.0.27 => 4.0.28}/Chart.yaml | 2 +- .../freeradius/{4.0.27 => 4.0.28}/README.md | 0 .../{4.0.27 => 4.0.28}/app-readme.md | 0 .../4.0.28}/charts/common-8.9.24.tgz | Bin .../{4.0.27 => 4.0.28}/helm-values.md | 0 .../{4.0.27 => 4.0.28}/ix_values.yaml | 0 .../{4.0.27 => 4.0.28}/questions.yaml | 2 - .../freeradius/{4.0.27 => 4.0.28}/security.md | 0 .../{4.0.27 => 4.0.28}/templates/common.yaml | 0 .../9.0.25 => freeradius/4.0.28}/values.yaml | 0 stable/freshrss/9.0.28/Chart.lock | 6 - .../freshrss/{9.0.28 => 9.0.29}/CHANGELOG.md | 20 +- .../5.0.18 => freshrss/9.0.29}/CONFIG.md | 0 stable/freshrss/9.0.29/Chart.lock | 6 + stable/freshrss/{9.0.28 => 9.0.29}/Chart.yaml | 2 +- stable/freshrss/{9.0.28 => 9.0.29}/README.md | 0 .../freshrss/{9.0.28 => 9.0.29}/app-readme.md | 0 .../9.0.29}/charts/common-8.9.24.tgz | Bin .../{9.0.28 => 9.0.29}/helm-values.md | 0 .../{9.0.28 => 9.0.29}/ix_values.yaml | 0 .../{9.0.28 => 9.0.29}/questions.yaml | 1 - .../freshrss/{9.0.28 => 9.0.29}/security.md | 0 .../9.0.29}/templates/common.yaml | 0 .../5.0.18 => freshrss/9.0.29}/values.yaml | 0 .../friendica/{0.0.16 => 0.0.17}/CHANGELOG.md | 18 +- .../2.0.24 => friendica/0.0.17}/CONFIG.md | 0 .../friendica/{0.0.16 => 0.0.17}/Chart.lock | 2 +- .../friendica/{0.0.16 => 0.0.17}/Chart.yaml | 2 +- stable/friendica/{0.0.16 => 0.0.17}/README.md | 0 .../{0.0.16 => 0.0.17}/app-readme.md | 0 .../0.0.17}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../0.0.17}/charts/redis-1.0.39.tgz | Bin .../{0.0.16 => 0.0.17}/helm-values.md | 0 .../{0.0.16 => 0.0.17}/ix_values.yaml | 0 .../{0.0.16 => 0.0.17}/questions.yaml | 0 .../friendica/{0.0.16 => 0.0.17}/security.md | 0 .../{0.0.16 => 0.0.17}/templates/common.yaml | 0 .../2.0.24 => friendica/0.0.17}/values.yaml | 0 stable/gaps/9.0.25/Chart.lock | 6 - stable/gaps/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../{gonic/4.0.24 => gaps/9.0.26}/CONFIG.md | 0 stable/gaps/9.0.26/Chart.lock | 6 + stable/gaps/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/gaps/{9.0.25 => 9.0.26}/README.md | 0 stable/gaps/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin stable/gaps/{9.0.25 => 9.0.26}/helm-values.md | 0 stable/gaps/{9.0.25 => 9.0.26}/ix_values.yaml | 0 stable/gaps/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/gaps/{9.0.25 => 9.0.26}/security.md | 2 +- .../9.0.26}/templates/common.yaml | 0 .../{gonic/4.0.24 => gaps/9.0.26}/values.yaml | 0 stable/gitea/{5.0.18 => 5.0.19}/CHANGELOG.md | 20 +- .../{gotify/5.0.16 => gitea/5.0.19}/CONFIG.md | 0 stable/gitea/{5.0.18 => 5.0.19}/Chart.lock | 2 +- stable/gitea/{5.0.18 => 5.0.19}/Chart.yaml | 2 +- stable/gitea/{5.0.18 => 5.0.19}/README.md | 0 stable/gitea/{5.0.18 => 5.0.19}/app-readme.md | 0 .../5.0.19}/charts/common-8.9.24.tgz | Bin .../charts/memcached-1.0.36.tgz | Bin .../5.0.19}/charts/postgresql-6.0.34.tgz | Bin .../{5.0.18 => 5.0.19}/ci/basic-values.yaml | 0 .../{5.0.18 => 5.0.19}/ci/ingress-values.yaml | 0 .../gitea/{5.0.18 => 5.0.19}/helm-values.md | 0 .../gitea/{5.0.18 => 5.0.19}/ix_values.yaml | 0 .../gitea/{5.0.18 => 5.0.19}/questions.yaml | 2 - stable/gitea/{5.0.18 => 5.0.19}/security.md | 0 .../templates/_configmap.tpl | 0 .../{5.0.18 => 5.0.19}/templates/_secrets.tpl | 0 .../{5.0.18 => 5.0.19}/templates/common.yaml | 0 .../5.0.16 => gitea/5.0.19}/values.yaml | 0 stable/golinks/2.0.24/Chart.lock | 6 - .../golinks/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../2.0.8 => golinks/2.0.25}/CONFIG.md | 0 stable/golinks/2.0.25/Chart.lock | 6 + stable/golinks/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/golinks/{2.0.24 => 2.0.25}/README.md | 0 .../golinks/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../golinks/{2.0.24 => 2.0.25}/helm-values.md | 0 .../golinks/{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../golinks/{2.0.24 => 2.0.25}/questions.yaml | 1 - stable/golinks/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../2.0.8 => golinks/2.0.25}/values.yaml | 0 stable/gonic/4.0.24/Chart.lock | 6 - stable/gonic/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../{grav/2.0.24 => gonic/4.0.25}/CONFIG.md | 0 stable/gonic/4.0.25/Chart.lock | 6 + stable/gonic/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/gonic/{4.0.24 => 4.0.25}/README.md | 0 stable/gonic/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/ci/ct-values.yaml | 0 .../gonic/{4.0.24 => 4.0.25}/helm-values.md | 0 .../gonic/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../gonic/{4.0.24 => 4.0.25}/questions.yaml | 1 - stable/gonic/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../{grav/2.0.24 => gonic/4.0.25}/values.yaml | 0 stable/gotify/{5.0.16 => 5.0.17}/CHANGELOG.md | 22 +- .../{grocy/9.0.25 => gotify/5.0.17}/CONFIG.md | 0 stable/gotify/5.0.17/Chart.lock | 9 + stable/gotify/{5.0.16 => 5.0.17}/Chart.yaml | 2 +- stable/gotify/{5.0.16 => 5.0.17}/README.md | 0 .../gotify/{5.0.16 => 5.0.17}/app-readme.md | 0 .../5.0.17}/charts/common-8.9.24.tgz | Bin .../5.0.17}/charts/postgresql-6.0.34.tgz | Bin .../gotify/{5.0.16 => 5.0.17}/helm-values.md | 0 .../gotify/{5.0.16 => 5.0.17}/ix_values.yaml | 0 .../gotify/{5.0.16 => 5.0.17}/questions.yaml | 9 - stable/gotify/{5.0.16 => 5.0.17}/security.md | 0 .../templates/_configmap.tpl | 0 .../{5.0.16 => 5.0.17}/templates/common.yaml | 0 .../9.0.25 => gotify/5.0.17}/values.yaml | 0 stable/grafana/2.0.8/Chart.lock | 6 - stable/grafana/{2.0.8 => 2.0.9}/CHANGELOG.md | 18 +- .../{guacd/0.0.5 => grafana/2.0.9}/CONFIG.md | 0 stable/grafana/2.0.9/Chart.lock | 6 + stable/grafana/{2.0.8 => 2.0.9}/Chart.yaml | 2 +- stable/grafana/{2.0.8 => 2.0.9}/README.md | 0 stable/grafana/{2.0.8 => 2.0.9}/app-readme.md | 0 .../2.0.9}/charts/common-8.9.24.tgz | Bin .../grafana/{2.0.8 => 2.0.9}/helm-values.md | 0 .../grafana/{2.0.8 => 2.0.9}/ix_values.yaml | 0 .../grafana/{2.0.8 => 2.0.9}/questions.yaml | 0 stable/grafana/{2.0.8 => 2.0.9}/security.md | 0 .../2.0.9}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../0.0.5 => grafana/2.0.9}/values.yaml | 0 stable/grav/2.0.24/Chart.lock | 6 - stable/grav/{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../{habridge/0.0.6 => grav/2.0.25}/CONFIG.md | 0 stable/grav/2.0.25/Chart.lock | 6 + stable/grav/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/grav/{2.0.24 => 2.0.25}/README.md | 0 stable/grav/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin stable/grav/{2.0.24 => 2.0.25}/helm-values.md | 0 stable/grav/{2.0.24 => 2.0.25}/ix_values.yaml | 0 stable/grav/{2.0.24 => 2.0.25}/questions.yaml | 1 - stable/grav/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../0.0.6 => grav/2.0.25}/values.yaml | 0 stable/grocy/9.0.25/Chart.lock | 6 - stable/grocy/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.24 => grocy/9.0.26}/CONFIG.md | 0 stable/grocy/9.0.26/Chart.lock | 6 + stable/grocy/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/grocy/{9.0.25 => 9.0.26}/README.md | 0 stable/grocy/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../grocy/{9.0.25 => 9.0.26}/helm-values.md | 0 .../grocy/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../grocy/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/grocy/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.24 => grocy/9.0.26}/values.yaml | 0 stable/guacd/0.0.5/Chart.lock | 6 - stable/guacd/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../2.0.24 => guacd/0.0.6}/CONFIG.md | 0 stable/guacd/0.0.6/Chart.lock | 6 + stable/guacd/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/guacd/{0.0.5 => 0.0.6}/README.md | 0 stable/guacd/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin stable/guacd/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/guacd/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/guacd/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/guacd/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6/templates/common.yaml | 0 .../2.0.24 => guacd/0.0.6}/values.yaml | 0 stable/habridge/0.0.6/Chart.lock | 6 - stable/habridge/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../5.0.5 => habridge/0.0.7}/CONFIG.md | 0 stable/habridge/0.0.7/Chart.lock | 6 + stable/habridge/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/habridge/{0.0.6 => 0.0.7}/README.md | 0 .../habridge/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../habridge/{0.0.6 => 0.0.7}/helm-values.md | 0 .../habridge/{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../habridge/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/habridge/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../5.0.5 => habridge/0.0.7}/values.yaml | 0 stable/handbrake/10.0.6/CHANGELOG.md | 99 + .../0.0.5 => handbrake/10.0.6}/CONFIG.md | 0 stable/handbrake/10.0.6/Chart.lock | 6 + stable/handbrake/10.0.6/Chart.yaml | 32 + stable/handbrake/10.0.6/README.md | 39 + stable/handbrake/10.0.6/app-readme.md | 3 + .../10.0.6}/charts/common-8.9.24.tgz | Bin stable/handbrake/10.0.6/helm-values.md | 42 + stable/handbrake/10.0.6/ix_values.yaml | 50 + stable/handbrake/10.0.6/questions.yaml | 2010 ++++++++++++++ stable/handbrake/10.0.6/security.md | 119 + .../10.0.6}/templates/common.yaml | 0 .../0.0.5 => handbrake/10.0.6}/values.yaml | 0 stable/haste-server/4.0.24/Chart.lock | 6 - .../{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../9.0.29 => haste-server/4.0.25}/CONFIG.md | 0 stable/haste-server/4.0.25/Chart.lock | 6 + .../{4.0.24 => 4.0.25}/Chart.yaml | 2 +- .../haste-server/{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../4.0.25}/values.yaml | 0 stable/headphones/2.0.24/Chart.lock | 6 - .../{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../0.0.5 => headphones/2.0.25}/CONFIG.md | 0 stable/headphones/2.0.25/Chart.lock | 6 + .../headphones/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- .../headphones/{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../headphones/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../0.0.5 => headphones/2.0.25}/values.yaml | 0 stable/healthchecks/5.0.5/Chart.lock | 6 - .../{5.0.5 => 5.0.6}/CHANGELOG.md | 20 +- .../4.0.27 => healthchecks/5.0.6}/CONFIG.md | 0 stable/healthchecks/5.0.6/Chart.lock | 6 + .../healthchecks/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- .../healthchecks/{5.0.5 => 5.0.6}/README.md | 0 .../{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../{5.0.5 => 5.0.6}/helm-values.md | 0 .../{5.0.5 => 5.0.6}/ix_values.yaml | 0 .../{5.0.5 => 5.0.6}/questions.yaml | 1 - .../healthchecks/{5.0.5 => 5.0.6}/security.md | 0 .../5.0.6}/templates/common.yaml | 0 .../4.0.27 => healthchecks/5.0.6}/values.yaml | 0 stable/hedgedoc/0.0.5/Chart.lock | 9 - stable/hedgedoc/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../2.0.24 => hedgedoc/0.0.6}/CONFIG.md | 0 stable/hedgedoc/0.0.6/Chart.lock | 9 + stable/hedgedoc/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/hedgedoc/{0.0.5 => 0.0.6}/README.md | 0 .../hedgedoc/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../hedgedoc/{0.0.5 => 0.0.6}/helm-values.md | 0 .../hedgedoc/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../hedgedoc/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/hedgedoc/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../2.0.24 => hedgedoc/0.0.6}/values.yaml | 0 stable/heimdall/9.0.29/Chart.lock | 6 - .../heimdall/{9.0.29 => 9.0.30}/CHANGELOG.md | 20 +- .../0.0.13 => heimdall/9.0.30}/CONFIG.md | 0 stable/heimdall/9.0.30/Chart.lock | 6 + stable/heimdall/{9.0.29 => 9.0.30}/Chart.yaml | 2 +- stable/heimdall/{9.0.29 => 9.0.30}/README.md | 0 .../heimdall/{9.0.29 => 9.0.30}/app-readme.md | 0 .../9.0.30}/charts/common-8.9.24.tgz | Bin .../{9.0.29 => 9.0.30}/helm-values.md | 0 .../{9.0.29 => 9.0.30}/ix_values.yaml | 0 .../{9.0.29 => 9.0.30}/questions.yaml | 1 - .../heimdall/{9.0.29 => 9.0.30}/security.md | 0 .../9.0.30}/templates/common.yaml | 0 .../0.0.13 => heimdall/9.0.30}/values.yaml | 0 stable/home-assistant/12.0.21/CHANGELOG.md | 99 + .../12.0.21}/CONFIG.md | 0 stable/home-assistant/12.0.21/Chart.lock | 9 + stable/home-assistant/12.0.21/Chart.yaml | 34 + stable/home-assistant/12.0.21/README.md | 39 + stable/home-assistant/12.0.21/app-readme.md | 3 + .../12.0.21}/charts/common-8.9.24.tgz | Bin .../12.0.21}/charts/postgresql-6.0.34.tgz | Bin stable/home-assistant/12.0.21/helm-values.md | 42 + stable/home-assistant/12.0.21/ix_values.yaml | 79 + stable/home-assistant/12.0.21/questions.yaml | 1848 +++++++++++++ stable/home-assistant/12.0.21/security.md | 671 +++++ .../12.0.21/templates/_configmap.tpl | 90 + .../12.0.21/templates/common.yaml | 22 + .../12.0.21/templates/secret.yaml | 15 + .../12.0.21}/values.yaml | 0 stable/htpcmanager/0.0.5/Chart.lock | 6 - .../htpcmanager/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../9.0.51 => htpcmanager/0.0.6}/CONFIG.md | 0 stable/htpcmanager/0.0.6/Chart.lock | 6 + .../htpcmanager/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/htpcmanager/{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../htpcmanager/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../9.0.51 => htpcmanager/0.0.6}/values.yaml | 0 stable/hyperion-ng/4.0.27/Chart.lock | 6 - .../{4.0.27 => 4.0.28}/CHANGELOG.md | 20 +- .../5.0.5 => hyperion-ng/4.0.28}/CONFIG.md | 0 stable/hyperion-ng/4.0.28/Chart.lock | 6 + .../hyperion-ng/{4.0.27 => 4.0.28}/Chart.yaml | 2 +- .../hyperion-ng/{4.0.27 => 4.0.28}/README.md | 0 .../{4.0.27 => 4.0.28}/app-readme.md | 0 .../4.0.28}/charts/common-8.9.24.tgz | Bin .../{4.0.27 => 4.0.28}/helm-values.md | 0 .../{4.0.27 => 4.0.28}/ix_values.yaml | 0 .../{4.0.27 => 4.0.28}/questions.yaml | 4 - .../{4.0.27 => 4.0.28}/security.md | 0 .../4.0.28}/templates/common.yaml | 0 .../5.0.5 => hyperion-ng/4.0.28}/values.yaml | 0 .../2.0.24/Chart.lock | 6 - .../{2.0.24 => 2.0.25}/CHANGELOG.md | 20 +- .../2.0.25}/CONFIG.md | 0 .../2.0.25/Chart.lock | 6 + .../{2.0.24 => 2.0.25}/Chart.yaml | 2 +- .../{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 1 - .../{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../templates/configmap.yaml | 0 .../2.0.25}/values.yaml | 0 stable/icinga2/0.0.13/Chart.lock | 9 - .../icinga2/{0.0.13 => 0.0.14}/CHANGELOG.md | 18 +- .../5.0.15 => icinga2/0.0.14}/CONFIG.md | 0 stable/icinga2/0.0.14/Chart.lock | 9 + stable/icinga2/{0.0.13 => 0.0.14}/Chart.yaml | 2 +- stable/icinga2/{0.0.13 => 0.0.14}/README.md | 0 .../icinga2/{0.0.13 => 0.0.14}/app-readme.md | 0 .../0.0.14}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../icinga2/{0.0.13 => 0.0.14}/helm-values.md | 0 .../icinga2/{0.0.13 => 0.0.14}/ix_values.yaml | 0 .../icinga2/{0.0.13 => 0.0.14}/questions.yaml | 0 stable/icinga2/{0.0.13 => 0.0.14}/security.md | 0 .../0.0.14}/templates/common.yaml | 0 .../5.0.15 => icinga2/0.0.14}/values.yaml | 0 stable/ipfs/0.0.6/Chart.lock | 6 - stable/ipfs/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../{kanboard/5.0.16 => ipfs/0.0.7}/CONFIG.md | 0 stable/ipfs/0.0.7/Chart.lock | 6 + stable/ipfs/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/ipfs/{0.0.6 => 0.0.7}/README.md | 0 stable/ipfs/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin stable/ipfs/{0.0.6 => 0.0.7}/helm-values.md | 0 stable/ipfs/{0.0.6 => 0.0.7}/ix_values.yaml | 0 stable/ipfs/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/ipfs/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../5.0.16 => ipfs/0.0.7}/values.yaml | 0 stable/jackett/9.0.51/Chart.lock | 6 - .../jackett/{9.0.51 => 9.0.52}/CHANGELOG.md | 18 +- .../{kms/9.0.29 => jackett/9.0.52}/CONFIG.md | 0 stable/jackett/9.0.52/Chart.lock | 6 + stable/jackett/{9.0.51 => 9.0.52}/Chart.yaml | 2 +- stable/jackett/{9.0.51 => 9.0.52}/README.md | 0 .../jackett/{9.0.51 => 9.0.52}/app-readme.md | 0 .../9.0.52}/charts/common-8.9.24.tgz | Bin .../jackett/{9.0.51 => 9.0.52}/helm-values.md | 0 .../jackett/{9.0.51 => 9.0.52}/ix_values.yaml | 0 .../jackett/{9.0.51 => 9.0.52}/questions.yaml | 0 stable/jackett/{9.0.51 => 9.0.52}/security.md | 0 .../9.0.52}/templates/common.yaml | 0 .../9.0.29 => jackett/9.0.52}/values.yaml | 0 .../{5.0.5 => 5.0.6}/CHANGELOG.md | 22 +- .../0.0.6 => jdownloader2/5.0.6}/CONFIG.md | 0 stable/jdownloader2/5.0.6/Chart.lock | 6 + .../jdownloader2/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- .../jdownloader2/{5.0.5 => 5.0.6}/README.md | 0 .../{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../{5.0.5 => 5.0.6}/helm-values.md | 2 +- .../{5.0.5 => 5.0.6}/ix_values.yaml | 5 +- .../{5.0.5 => 5.0.6}/questions.yaml | 3 - .../jdownloader2/{5.0.5 => 5.0.6}/security.md | 0 .../5.0.6}/templates/common.yaml | 0 .../0.0.6 => jdownloader2/5.0.6}/values.yaml | 0 stable/jellyfin/9.0.25/Chart.lock | 6 - .../jellyfin/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.32 => jellyfin/9.0.26}/CONFIG.md | 0 stable/jellyfin/9.0.26/Chart.lock | 6 + stable/jellyfin/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/jellyfin/{9.0.25 => 9.0.26}/README.md | 0 .../jellyfin/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../{9.0.25 => 9.0.26}/helm-values.md | 0 .../{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../{9.0.25 => 9.0.26}/questions.yaml | 1 - .../jellyfin/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.32 => jellyfin/9.0.26}/values.yaml | 0 stable/joplin-server/5.0.15/Chart.lock | 9 - .../{5.0.15 => 5.0.16}/CHANGELOG.md | 24 +- .../9.0.32 => joplin-server/5.0.16}/CONFIG.md | 0 stable/joplin-server/5.0.16/Chart.lock | 9 + .../{5.0.15 => 5.0.16}/Chart.yaml | 2 +- .../{5.0.15 => 5.0.16}/README.md | 0 .../{5.0.15 => 5.0.16}/app-readme.md | 0 .../5.0.16}/charts/common-8.9.24.tgz | Bin .../5.0.16}/charts/postgresql-6.0.34.tgz | Bin .../{5.0.15 => 5.0.16}/helm-values.md | 4 - .../{5.0.15 => 5.0.16}/ix_values.yaml | 2 - .../{5.0.15 => 5.0.16}/questions.yaml | 9 - .../{5.0.15 => 5.0.16}/security.md | 0 .../5.0.16}/templates/common.yaml | 0 .../5.0.16}/values.yaml | 0 stable/kanboard/5.0.16/Chart.lock | 9 - .../kanboard/{5.0.16 => 5.0.17}/CHANGELOG.md | 22 +- .../2.0.24 => kanboard/5.0.17}/CONFIG.md | 0 .../5.0.16 => kanboard/5.0.17}/Chart.lock | 2 +- stable/kanboard/{5.0.16 => 5.0.17}/Chart.yaml | 2 +- stable/kanboard/{5.0.16 => 5.0.17}/README.md | 0 .../kanboard/{5.0.16 => 5.0.17}/app-readme.md | 0 .../5.0.17}/charts/common-8.9.24.tgz | Bin .../5.0.17}/charts/postgresql-6.0.34.tgz | Bin .../{5.0.16 => 5.0.17}/helm-values.md | 4 - .../{5.0.16 => 5.0.17}/ix_values.yaml | 2 - .../{5.0.16 => 5.0.17}/questions.yaml | 1 - .../kanboard/{5.0.16 => 5.0.17}/security.md | 0 .../5.0.17}/templates/common.yaml | 0 .../2.0.24 => kanboard/5.0.17}/values.yaml | 0 stable/kms/9.0.29/Chart.lock | 6 - stable/kms/{9.0.29 => 9.0.30}/CHANGELOG.md | 20 +- .../{leantime/1.0.1 => kms/9.0.30}/CONFIG.md | 0 stable/kms/9.0.30/Chart.lock | 6 + stable/kms/{9.0.29 => 9.0.30}/Chart.yaml | 2 +- stable/kms/{9.0.29 => 9.0.30}/README.md | 0 stable/kms/{9.0.29 => 9.0.30}/app-readme.md | 0 .../9.0.30}/charts/common-8.9.24.tgz | Bin stable/kms/{9.0.29 => 9.0.30}/helm-values.md | 0 stable/kms/{9.0.29 => 9.0.30}/ix_values.yaml | 0 stable/kms/{9.0.29 => 9.0.30}/questions.yaml | 1 - stable/kms/{9.0.29 => 9.0.30}/security.md | 0 .../9.0.30}/templates/common.yaml | 0 .../1.0.1 => kms/9.0.30}/values.yaml | 0 stable/kodi-headless/0.0.6/Chart.lock | 6 - .../{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../0.0.5 => kodi-headless/0.0.7}/CONFIG.md | 0 stable/kodi-headless/0.0.7/Chart.lock | 6 + .../kodi-headless/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- .../kodi-headless/{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../0.0.5 => kodi-headless/0.0.7}/values.yaml | 0 stable/komga/4.0.32/Chart.lock | 6 - stable/komga/{4.0.32 => 4.0.33}/CHANGELOG.md | 20 +- .../4.0.28 => komga/4.0.33}/CONFIG.md | 0 stable/komga/4.0.33/Chart.lock | 6 + stable/komga/{4.0.32 => 4.0.33}/Chart.yaml | 2 +- stable/komga/{4.0.32 => 4.0.33}/README.md | 0 stable/komga/{4.0.32 => 4.0.33}/app-readme.md | 0 .../4.0.33}/charts/common-8.9.24.tgz | Bin .../komga/{4.0.32 => 4.0.33}/helm-values.md | 0 .../komga/{4.0.32 => 4.0.33}/ix_values.yaml | 0 .../komga/{4.0.32 => 4.0.33}/questions.yaml | 1 - stable/komga/{4.0.32 => 4.0.33}/security.md | 2 +- .../4.0.33}/templates/common.yaml | 0 .../4.0.28 => komga/4.0.33}/values.yaml | 0 stable/lazylibrarian/9.0.32/Chart.lock | 6 - .../{9.0.32 => 9.0.33}/CHANGELOG.md | 20 +- .../9.0.26 => lazylibrarian/9.0.33}/CONFIG.md | 0 stable/lazylibrarian/9.0.33/Chart.lock | 6 + .../{9.0.32 => 9.0.33}/Chart.yaml | 2 +- .../{9.0.32 => 9.0.33}/README.md | 0 .../{9.0.32 => 9.0.33}/app-readme.md | 0 .../9.0.33}/charts/common-8.9.24.tgz | Bin .../{9.0.32 => 9.0.33}/helm-values.md | 0 .../{9.0.32 => 9.0.33}/ix_values.yaml | 0 .../{9.0.32 => 9.0.33}/questions.yaml | 1 - .../{9.0.32 => 9.0.33}/security.md | 0 .../9.0.33}/templates/common.yaml | 0 .../9.0.33}/values.yaml | 0 stable/leaf2mqtt/2.0.24/Chart.lock | 6 - .../leaf2mqtt/{2.0.24 => 2.0.25}/CHANGELOG.md | 18 +- .../4.0.38 => leaf2mqtt/2.0.25}/CONFIG.md | 0 stable/leaf2mqtt/2.0.25/Chart.lock | 6 + .../leaf2mqtt/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- stable/leaf2mqtt/{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 0 .../{2.0.24 => 2.0.25}/questions.yaml | 0 .../leaf2mqtt/{2.0.24 => 2.0.25}/security.md | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../4.0.38 => leaf2mqtt/2.0.25}/values.yaml | 0 stable/leantime/1.0.1/Chart.lock | 9 - stable/leantime/{1.0.1 => 1.0.2}/CHANGELOG.md | 18 +- .../2.0.35 => leantime/1.0.2}/CONFIG.md | 0 stable/leantime/1.0.2/Chart.lock | 9 + stable/leantime/{1.0.1 => 1.0.2}/Chart.yaml | 2 +- stable/leantime/{1.0.1 => 1.0.2}/README.md | 0 .../leantime/{1.0.1 => 1.0.2}/app-readme.md | 0 .../1.0.2}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../leantime/{1.0.1 => 1.0.2}/helm-values.md | 0 .../leantime/{1.0.1 => 1.0.2}/ix_values.yaml | 0 .../leantime/{1.0.1 => 1.0.2}/questions.yaml | 0 stable/leantime/{1.0.1 => 1.0.2}/security.md | 0 .../{1.0.1 => 1.0.2}/templates/_secrets.tpl | 0 .../{1.0.1 => 1.0.2}/templates/common.yaml | 0 .../2.0.35 => leantime/1.0.2}/values.yaml | 0 stable/libreoffice/0.0.5/Chart.lock | 6 - .../libreoffice/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../2.0.12 => libreoffice/0.0.6}/CONFIG.md | 0 stable/libreoffice/0.0.6/Chart.lock | 6 + .../libreoffice/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/libreoffice/{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../libreoffice/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../2.0.12 => libreoffice/0.0.6}/values.yaml | 0 stable/librespeed/4.0.28/Chart.lock | 6 - .../{4.0.28 => 4.0.29}/CHANGELOG.md | 20 +- .../9.0.25 => librespeed/4.0.29}/CONFIG.md | 0 stable/librespeed/4.0.29/Chart.lock | 6 + .../librespeed/{4.0.28 => 4.0.29}/Chart.yaml | 2 +- .../librespeed/{4.0.28 => 4.0.29}/README.md | 0 .../{4.0.28 => 4.0.29}/app-readme.md | 0 .../4.0.29}/charts/common-8.9.24.tgz | Bin .../{4.0.28 => 4.0.29}/ci/ct-values.yaml | 0 .../{4.0.28 => 4.0.29}/helm-values.md | 0 .../{4.0.28 => 4.0.29}/ix_values.yaml | 0 .../{4.0.28 => 4.0.29}/questions.yaml | 1 - .../librespeed/{4.0.28 => 4.0.29}/security.md | 0 .../4.0.29}/templates/common.yaml | 0 .../9.0.25 => librespeed/4.0.29}/values.yaml | 0 stable/lidarr/9.0.26/Chart.lock | 6 - stable/lidarr/{9.0.26 => 9.0.27}/CHANGELOG.md | 20 +- .../{mealie/5.0.6 => lidarr/9.0.27}/CONFIG.md | 0 stable/lidarr/9.0.27/Chart.lock | 6 + stable/lidarr/{9.0.26 => 9.0.27}/Chart.yaml | 2 +- stable/lidarr/{9.0.26 => 9.0.27}/README.md | 0 .../lidarr/{9.0.26 => 9.0.27}/app-readme.md | 0 .../9.0.27}/charts/common-8.9.24.tgz | Bin .../lidarr/{9.0.26 => 9.0.27}/helm-values.md | 0 .../lidarr/{9.0.26 => 9.0.27}/ix_values.yaml | 0 .../lidarr/{9.0.26 => 9.0.27}/questions.yaml | 1 - stable/lidarr/{9.0.26 => 9.0.27}/security.md | 0 .../9.0.27}/templates/common.yaml | 0 .../5.0.6 => lidarr/9.0.27}/values.yaml | 0 stable/littlelink/4.0.38/Chart.lock | 6 - .../{4.0.38 => 4.0.39}/CHANGELOG.md | 20 +- .../1.0.28 => littlelink/4.0.39}/CONFIG.md | 0 stable/littlelink/4.0.39/Chart.lock | 6 + .../littlelink/{4.0.38 => 4.0.39}/Chart.yaml | 2 +- .../littlelink/{4.0.38 => 4.0.39}/README.md | 0 .../{4.0.38 => 4.0.39}/app-readme.md | 0 .../4.0.39}/charts/common-8.9.24.tgz | Bin .../{4.0.38 => 4.0.39}/helm-values.md | 0 .../{4.0.38 => 4.0.39}/ix_values.yaml | 0 .../{4.0.38 => 4.0.39}/questions.yaml | 1 - .../littlelink/{4.0.38 => 4.0.39}/security.md | 0 .../templates/_configmap.tpl | 0 .../{4.0.38 => 4.0.39}/templates/common.yaml | 0 .../1.0.28 => littlelink/4.0.39}/values.yaml | 0 .../logitech-media-server/2.0.35/Chart.lock | 6 - .../{2.0.35 => 2.0.36}/CHANGELOG.md | 24 +- .../2.0.36}/CONFIG.md | 0 .../logitech-media-server/2.0.36/Chart.lock | 6 + .../{2.0.35 => 2.0.36}/Chart.yaml | 2 +- .../{2.0.35 => 2.0.36}/README.md | 0 .../{2.0.35 => 2.0.36}/app-readme.md | 0 .../2.0.36}/charts/common-8.9.24.tgz | Bin .../{2.0.35 => 2.0.36}/helm-values.md | 2 +- .../{2.0.35 => 2.0.36}/ix_values.yaml | 4 +- .../{2.0.35 => 2.0.36}/questions.yaml | 22 - .../{2.0.35 => 2.0.36}/security.md | 0 .../2.0.36}/templates/common.yaml | 0 .../2.0.36}/values.yaml | 0 stable/loki/{2.0.12 => 2.0.13}/CHANGELOG.md | 18 +- .../4.0.16 => loki/2.0.13}/CONFIG.md | 0 stable/loki/{2.0.12 => 2.0.13}/Chart.lock | 2 +- stable/loki/{2.0.12 => 2.0.13}/Chart.yaml | 2 +- stable/loki/{2.0.12 => 2.0.13}/README.md | 0 stable/loki/{2.0.12 => 2.0.13}/app-readme.md | 0 .../2.0.13}/charts/common-8.9.24.tgz | Bin .../charts/promtail-1.0.15.tgz | Bin stable/loki/{2.0.12 => 2.0.13}/helm-values.md | 0 stable/loki/{2.0.12 => 2.0.13}/ix_values.yaml | 0 stable/loki/{2.0.12 => 2.0.13}/questions.yaml | 0 stable/loki/{2.0.12 => 2.0.13}/security.md | 0 .../{2.0.12 => 2.0.13}/templates/_helpers.tpl | 0 .../2.0.13}/templates/common.yaml | 0 .../templates/configmap-alert.yaml | 0 .../{2.0.12 => 2.0.13}/templates/secret.yaml | 0 .../4.0.16 => loki/2.0.13}/values.yaml | 0 stable/lychee/9.0.25/Chart.lock | 6 - stable/lychee/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../1.0.29 => lychee/9.0.26}/CONFIG.md | 0 stable/lychee/9.0.26/Chart.lock | 6 + stable/lychee/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/lychee/{9.0.25 => 9.0.26}/README.md | 0 .../lychee/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../lychee/{9.0.25 => 9.0.26}/helm-values.md | 0 .../lychee/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../lychee/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/lychee/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../1.0.29 => lychee/9.0.26}/values.yaml | 0 stable/mealie/5.0.6/Chart.lock | 9 - stable/mealie/{5.0.6 => 5.0.7}/CHANGELOG.md | 22 +- .../{minio/1.0.12 => mealie/5.0.7}/CONFIG.md | 0 stable/mealie/5.0.7/Chart.lock | 9 + stable/mealie/{5.0.6 => 5.0.7}/Chart.yaml | 2 +- stable/mealie/{5.0.6 => 5.0.7}/README.md | 0 stable/mealie/{5.0.6 => 5.0.7}/app-readme.md | 0 .../5.0.7}/charts/common-8.9.24.tgz | Bin .../5.0.7}/charts/postgresql-6.0.34.tgz | Bin stable/mealie/{5.0.6 => 5.0.7}/helm-values.md | 3 - stable/mealie/{5.0.6 => 5.0.7}/ix_values.yaml | 2 - stable/mealie/{5.0.6 => 5.0.7}/questions.yaml | 1 - stable/mealie/{5.0.6 => 5.0.7}/security.md | 0 .../5.0.7}/templates/common.yaml | 0 .../1.0.12 => mealie/5.0.7}/values.yaml | 0 stable/medusa/1.0.28/Chart.lock | 6 - stable/medusa/{1.0.28 => 1.0.29}/CHANGELOG.md | 20 +- .../0.0.6 => medusa/1.0.29}/CONFIG.md | 0 stable/medusa/1.0.29/Chart.lock | 6 + stable/medusa/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- stable/medusa/{1.0.28 => 1.0.29}/README.md | 0 .../medusa/{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../medusa/{1.0.28 => 1.0.29}/helm-values.md | 0 .../medusa/{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../medusa/{1.0.28 => 1.0.29}/questions.yaml | 1 - stable/medusa/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../0.0.6 => medusa/1.0.29}/values.yaml | 0 stable/minetest/0.0.5/Chart.lock | 6 - stable/minetest/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.16 => minetest/0.0.6}/CONFIG.md | 0 stable/minetest/0.0.6/Chart.lock | 6 + stable/minetest/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/minetest/{0.0.5 => 0.0.6}/README.md | 0 .../minetest/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../minetest/{0.0.5 => 0.0.6}/helm-values.md | 0 .../minetest/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../minetest/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/minetest/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.16 => minetest/0.0.6}/values.yaml | 0 stable/miniflux/4.0.16/Chart.lock | 9 - .../miniflux/{4.0.16 => 4.0.17}/CHANGELOG.md | 20 +- .../4.0.26 => miniflux/4.0.17}/CONFIG.md | 0 stable/miniflux/4.0.17/Chart.lock | 9 + stable/miniflux/{4.0.16 => 4.0.17}/Chart.yaml | 2 +- stable/miniflux/{4.0.16 => 4.0.17}/README.md | 0 .../miniflux/{4.0.16 => 4.0.17}/app-readme.md | 0 .../4.0.17}/charts/common-8.9.24.tgz | Bin .../4.0.17}/charts/postgresql-6.0.34.tgz | Bin .../{4.0.16 => 4.0.17}/helm-values.md | 0 .../{4.0.16 => 4.0.17}/ix_values.yaml | 0 .../{4.0.16 => 4.0.17}/questions.yaml | 1 - .../miniflux/{4.0.16 => 4.0.17}/security.md | 0 .../4.0.17}/templates/common.yaml | 0 .../4.0.26 => miniflux/4.0.17}/values.yaml | 0 stable/minio-console/1.0.29/Chart.lock | 6 - .../{1.0.29 => 1.0.30}/CHANGELOG.md | 20 +- .../1.0.24 => minio-console/1.0.30}/CONFIG.md | 0 stable/minio-console/1.0.30/Chart.lock | 6 + .../{1.0.29 => 1.0.30}/Chart.yaml | 2 +- .../{1.0.29 => 1.0.30}/README.md | 0 .../{1.0.29 => 1.0.30}/app-readme.md | 0 .../1.0.30}/charts/common-8.9.24.tgz | Bin .../{1.0.29 => 1.0.30}/helm-values.md | 0 .../{1.0.29 => 1.0.30}/ix_values.yaml | 0 .../{1.0.29 => 1.0.30}/questions.yaml | 1 - .../{1.0.29 => 1.0.30}/security.md | 0 .../1.0.30}/templates/common.yaml | 0 .../1.0.30}/values.yaml | 0 stable/minio/1.0.12/Chart.lock | 6 - stable/minio/{1.0.12 => 1.0.13}/CHANGELOG.md | 22 +- .../1.0.28 => minio/1.0.13}/CONFIG.md | 0 stable/minio/1.0.13/Chart.lock | 6 + stable/minio/{1.0.12 => 1.0.13}/Chart.yaml | 2 +- stable/minio/{1.0.12 => 1.0.13}/README.md | 0 stable/minio/{1.0.12 => 1.0.13}/app-readme.md | 0 .../1.0.13}/charts/common-8.9.24.tgz | Bin .../minio/{1.0.12 => 1.0.13}/helm-values.md | 0 .../minio/{1.0.12 => 1.0.13}/ix_values.yaml | 0 .../minio/{1.0.12 => 1.0.13}/questions.yaml | 8 - stable/minio/{1.0.12 => 1.0.13}/security.md | 0 .../1.0.13}/templates/common.yaml | 0 .../1.0.28 => minio/1.0.13}/values.yaml | 0 stable/minisatip/0.0.6/Chart.lock | 6 - .../minisatip/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../4.0.24 => minisatip/0.0.7}/CONFIG.md | 0 stable/minisatip/0.0.7/Chart.lock | 6 + stable/minisatip/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/minisatip/{0.0.6 => 0.0.7}/README.md | 0 .../minisatip/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../minisatip/{0.0.6 => 0.0.7}/helm-values.md | 0 .../minisatip/{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../minisatip/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/minisatip/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../4.0.24 => minisatip/0.0.7}/values.yaml | 0 stable/monica/0.0.16/Chart.lock | 9 - stable/monica/{0.0.16 => 0.0.17}/CHANGELOG.md | 18 +- .../0.0.5 => monica/0.0.17}/CONFIG.md | 0 stable/monica/0.0.17/Chart.lock | 9 + stable/monica/{0.0.16 => 0.0.17}/Chart.yaml | 2 +- stable/monica/{0.0.16 => 0.0.17}/README.md | 0 .../monica/{0.0.16 => 0.0.17}/app-readme.md | 0 .../0.0.17}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../monica/{0.0.16 => 0.0.17}/helm-values.md | 0 .../monica/{0.0.16 => 0.0.17}/ix_values.yaml | 0 .../monica/{0.0.16 => 0.0.17}/questions.yaml | 0 stable/monica/{0.0.16 => 0.0.17}/security.md | 2 +- .../{0.0.16 => 0.0.17}/templates/_appkey.tpl | 0 .../{0.0.16 => 0.0.17}/templates/common.yaml | 0 .../0.0.5 => monica/0.0.17}/values.yaml | 0 stable/mosquitto/4.0.26/Chart.lock | 6 - .../mosquitto/{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../0.0.7 => mosquitto/4.0.27}/CONFIG.md | 0 stable/mosquitto/4.0.27/Chart.lock | 6 + .../mosquitto/{4.0.26 => 4.0.27}/Chart.yaml | 2 +- stable/mosquitto/{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../mosquitto/{4.0.26 => 4.0.27}/security.md | 0 .../{4.0.26 => 4.0.27}/templates/common.yaml | 0 .../templates/configmap.yaml | 0 .../0.0.7 => mosquitto/4.0.27}/values.yaml | 0 stable/mstream/1.0.24/Chart.lock | 6 - .../mstream/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../9.0.25 => mstream/1.0.25}/CONFIG.md | 0 stable/mstream/1.0.25/Chart.lock | 6 + stable/mstream/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/mstream/{1.0.24 => 1.0.25}/README.md | 0 .../mstream/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../mstream/{1.0.24 => 1.0.25}/helm-values.md | 0 .../mstream/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../mstream/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/mstream/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../9.0.25 => mstream/1.0.25}/values.yaml | 0 stable/muximux/1.0.28/Chart.lock | 6 - .../muximux/{1.0.28 => 1.0.29}/CHANGELOG.md | 20 +- .../0.0.5 => muximux/1.0.29}/CONFIG.md | 0 stable/muximux/1.0.29/Chart.lock | 6 + stable/muximux/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- stable/muximux/{1.0.28 => 1.0.29}/README.md | 0 .../muximux/{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../muximux/{1.0.28 => 1.0.29}/helm-values.md | 0 .../muximux/{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../muximux/{1.0.28 => 1.0.29}/questions.yaml | 1 - stable/muximux/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../0.0.5 => muximux/1.0.29}/values.yaml | 0 stable/mylar/4.0.24/Chart.lock | 6 - stable/mylar/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../0.0.5 => mylar/4.0.25}/CONFIG.md | 0 stable/mylar/4.0.25/Chart.lock | 6 + stable/mylar/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/mylar/{4.0.24 => 4.0.25}/README.md | 0 stable/mylar/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../mylar/{4.0.24 => 4.0.25}/helm-values.md | 0 .../mylar/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../mylar/{4.0.24 => 4.0.25}/questions.yaml | 1 - stable/mylar/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../0.0.5 => mylar/4.0.25}/values.yaml | 0 stable/mysql-workbench/0.0.5/Chart.lock | 6 - .../{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.6}/CONFIG.md | 0 stable/mysql-workbench/0.0.6/Chart.lock | 6 + .../{0.0.5 => 0.0.6}/Chart.yaml | 2 +- .../{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.6}/values.yaml | 0 stable/nano-wallet/0.0.7/Chart.lock | 6 - .../nano-wallet/{0.0.7 => 0.0.8}/CHANGELOG.md | 9 + .../1.0.24 => nano-wallet/0.0.8}/CONFIG.md | 0 stable/nano-wallet/0.0.8/Chart.lock | 6 + .../nano-wallet/{0.0.7 => 0.0.8}/Chart.yaml | 2 +- stable/nano-wallet/{0.0.7 => 0.0.8}/README.md | 0 .../{0.0.7 => 0.0.8}/app-readme.md | 0 .../0.0.8}/charts/common-8.9.24.tgz | Bin .../{0.0.7 => 0.0.8}/helm-values.md | 0 .../{0.0.7 => 0.0.8}/ix_values.yaml | 0 .../{0.0.7 => 0.0.8}/questions.yaml | 0 .../nano-wallet/{0.0.7 => 0.0.8}/security.md | 0 .../0.0.8}/templates/common.yaml | 0 .../1.0.24 => nano-wallet/0.0.8}/values.yaml | 0 stable/navidrome/9.0.25/Chart.lock | 6 - .../navidrome/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.24 => navidrome/9.0.26}/CONFIG.md | 0 stable/navidrome/9.0.26/Chart.lock | 6 + .../navidrome/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/navidrome/{9.0.25 => 9.0.26}/README.md | 0 .../{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../{9.0.25 => 9.0.26}/helm-values.md | 0 .../{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../{9.0.25 => 9.0.26}/questions.yaml | 1 - .../navidrome/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.24 => navidrome/9.0.26}/values.yaml | 0 stable/nextcloud/11.0.7/CHANGELOG.md | 99 + .../9.0.25 => nextcloud/11.0.7}/CONFIG.md | 0 stable/nextcloud/11.0.7/Chart.lock | 12 + stable/nextcloud/11.0.7/Chart.yaml | 41 + stable/nextcloud/11.0.7/README.md | 40 + stable/nextcloud/11.0.7/app-readme.md | 3 + .../11.0.7}/charts/common-8.9.24.tgz | Bin .../11.0.7}/charts/postgresql-6.0.34.tgz | Bin .../11.0.7}/charts/redis-1.0.39.tgz | Bin stable/nextcloud/11.0.7/helm-values.md | 62 + stable/nextcloud/11.0.7/ix_values.yaml | 131 + stable/nextcloud/11.0.7/questions.yaml | 1860 +++++++++++++ stable/nextcloud/11.0.7/security.md | 1816 +++++++++++++ .../nextcloud/11.0.7/templates/_configmap.tpl | 35 + .../nextcloud/11.0.7/templates/_cronjob.tpl | 51 + stable/nextcloud/11.0.7/templates/common.yaml | 14 + .../9.0.25 => nextcloud/11.0.7}/values.yaml | 0 stable/ngircd/0.0.5/Chart.lock | 6 - stable/ngircd/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../9.0.28 => ngircd/0.0.6}/CONFIG.md | 0 stable/ngircd/0.0.6/Chart.lock | 6 + stable/ngircd/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/ngircd/{0.0.5 => 0.0.6}/README.md | 0 stable/ngircd/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin stable/ngircd/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/ngircd/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/ngircd/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/ngircd/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../9.0.28 => ngircd/0.0.6}/values.yaml | 0 stable/nntp2nntp/0.0.5/Chart.lock | 6 - .../nntp2nntp/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.26 => nntp2nntp/0.0.6}/CONFIG.md | 0 stable/nntp2nntp/0.0.6/Chart.lock | 6 + stable/nntp2nntp/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/nntp2nntp/{0.0.5 => 0.0.6}/README.md | 0 .../nntp2nntp/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../nntp2nntp/{0.0.5 => 0.0.6}/helm-values.md | 0 .../nntp2nntp/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../nntp2nntp/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/nntp2nntp/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../4.0.26 => nntp2nntp/0.0.6}/values.yaml | 0 stable/node-red/9.0.25/Chart.lock | 6 - .../node-red/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.15 => node-red/9.0.26}/CONFIG.md | 0 stable/node-red/9.0.26/Chart.lock | 6 + stable/node-red/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/node-red/{9.0.25 => 9.0.26}/README.md | 0 .../node-red/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../{9.0.25 => 9.0.26}/helm-values.md | 0 .../{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../{9.0.25 => 9.0.26}/questions.yaml | 1 - .../node-red/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.15 => node-red/9.0.26}/values.yaml | 0 stable/novnc/1.0.24/Chart.lock | 6 - stable/novnc/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../{ombi/9.0.27 => novnc/1.0.25}/CONFIG.md | 0 stable/novnc/1.0.25/Chart.lock | 6 + stable/novnc/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/novnc/{1.0.24 => 1.0.25}/README.md | 0 stable/novnc/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../novnc/{1.0.24 => 1.0.25}/helm-values.md | 0 .../novnc/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../novnc/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/novnc/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../{ombi/9.0.27 => novnc/1.0.25}/values.yaml | 0 stable/nullserv/4.0.24/Chart.lock | 6 - .../nullserv/{4.0.24 => 4.0.25}/CHANGELOG.md | 22 +- .../3.0.5 => nullserv/4.0.25}/CONFIG.md | 0 stable/nullserv/4.0.25/Chart.lock | 6 + stable/nullserv/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/nullserv/{4.0.24 => 4.0.25}/README.md | 0 .../nullserv/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 8 - .../nullserv/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../3.0.5 => nullserv/4.0.25}/values.yaml | 0 stable/nzbget/9.0.25/Chart.lock | 6 - stable/nzbget/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.15 => nzbget/9.0.26}/CONFIG.md | 0 stable/nzbget/9.0.26/Chart.lock | 6 + stable/nzbget/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/nzbget/{9.0.25 => 9.0.26}/README.md | 0 .../nzbget/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../nzbget/{9.0.25 => 9.0.26}/helm-values.md | 0 .../nzbget/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../nzbget/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/nzbget/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.15 => nzbget/9.0.26}/values.yaml | 0 stable/nzbhydra/9.0.28/Chart.lock | 6 - .../nzbhydra/{9.0.28 => 9.0.29}/CHANGELOG.md | 20 +- .../5.0.7 => nzbhydra/9.0.29}/CONFIG.md | 0 stable/nzbhydra/9.0.29/Chart.lock | 6 + stable/nzbhydra/{9.0.28 => 9.0.29}/Chart.yaml | 2 +- stable/nzbhydra/{9.0.28 => 9.0.29}/README.md | 0 .../nzbhydra/{9.0.28 => 9.0.29}/app-readme.md | 0 .../9.0.29}/charts/common-8.9.24.tgz | Bin .../{9.0.28 => 9.0.29}/helm-values.md | 0 .../{9.0.28 => 9.0.29}/ix_values.yaml | 0 .../{9.0.28 => 9.0.29}/questions.yaml | 1 - .../nzbhydra/{9.0.28 => 9.0.29}/security.md | 0 .../9.0.29}/templates/common.yaml | 0 .../5.0.7 => nzbhydra/9.0.29}/values.yaml | 0 stable/octoprint/4.0.26/Chart.lock | 6 - .../octoprint/{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../0.0.6 => octoprint/4.0.27}/CONFIG.md | 0 stable/octoprint/4.0.27/Chart.lock | 6 + .../octoprint/{4.0.26 => 4.0.27}/Chart.yaml | 2 +- stable/octoprint/{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../octoprint/{4.0.26 => 4.0.27}/security.md | 0 .../4.0.27}/templates/common.yaml | 0 .../0.0.6 => octoprint/4.0.27}/values.yaml | 0 stable/odoo/4.0.15/Chart.lock | 9 - stable/odoo/{4.0.15 => 4.0.16}/CHANGELOG.md | 24 +- .../9.0.25 => odoo/4.0.16}/CONFIG.md | 0 stable/odoo/4.0.16/Chart.lock | 9 + stable/odoo/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/odoo/{4.0.15 => 4.0.16}/README.md | 0 stable/odoo/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16}/charts/postgresql-6.0.34.tgz | Bin stable/odoo/{4.0.15 => 4.0.16}/helm-values.md | 3 +- stable/odoo/{4.0.15 => 4.0.16}/ix_values.yaml | 6 +- stable/odoo/{4.0.15 => 4.0.16}/questions.yaml | 15 - stable/odoo/{4.0.15 => 4.0.16}/security.md | 0 .../4.0.16}/templates/common.yaml | 0 .../9.0.25 => odoo/4.0.16}/values.yaml | 0 stable/ombi/9.0.27/Chart.lock | 6 - stable/ombi/{9.0.27 => 9.0.28}/CHANGELOG.md | 20 +- .../{oscam/4.0.24 => ombi/9.0.28}/CONFIG.md | 0 stable/ombi/9.0.28/Chart.lock | 6 + stable/ombi/{9.0.27 => 9.0.28}/Chart.yaml | 2 +- stable/ombi/{9.0.27 => 9.0.28}/README.md | 0 stable/ombi/{9.0.27 => 9.0.28}/app-readme.md | 0 .../9.0.28}/charts/common-8.9.24.tgz | Bin stable/ombi/{9.0.27 => 9.0.28}/helm-values.md | 0 stable/ombi/{9.0.27 => 9.0.28}/ix_values.yaml | 0 stable/ombi/{9.0.27 => 9.0.28}/questions.yaml | 1 - stable/ombi/{9.0.27 => 9.0.28}/security.md | 0 .../9.0.28}/templates/common.yaml | 0 .../{oscam/4.0.24 => ombi/9.0.28}/values.yaml | 0 .../3.0.5/Chart.lock | 6 - .../{3.0.5 => 3.0.6}/CHANGELOG.md | 20 +- .../3.0.6}/CONFIG.md | 0 .../3.0.6}/Chart.lock | 2 +- .../{3.0.5 => 3.0.6}/Chart.yaml | 2 +- .../{3.0.5 => 3.0.6}/README.md | 0 .../{3.0.5 => 3.0.6}/app-readme.md | 0 .../3.0.6}/charts/common-8.9.24.tgz | Bin .../{3.0.5 => 3.0.6}/helm-values.md | 0 .../{3.0.5 => 3.0.6}/ix_values.yaml | 0 .../{3.0.5 => 3.0.6}/questions.yaml | 1 - .../{3.0.5 => 3.0.6}/security.md | 0 .../3.0.6}/templates/common.yaml | 0 .../3.0.6}/values.yaml | 0 stable/openkm/4.0.15/Chart.lock | 9 - stable/openkm/{4.0.15 => 4.0.16}/CHANGELOG.md | 20 +- .../4.0.24 => openkm/4.0.16}/CONFIG.md | 0 stable/openkm/4.0.16/Chart.lock | 9 + stable/openkm/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/openkm/{4.0.15 => 4.0.16}/README.md | 0 .../openkm/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16}/charts/postgresql-6.0.34.tgz | Bin .../openkm/{4.0.15 => 4.0.16}/helm-values.md | 0 .../openkm/{4.0.15 => 4.0.16}/ix_values.yaml | 0 .../openkm/{4.0.15 => 4.0.16}/questions.yaml | 1 - stable/openkm/{4.0.15 => 4.0.16}/security.md | 0 .../templates/_configmap.tpl | 0 .../{4.0.15 => 4.0.16}/templates/common.yaml | 0 .../4.0.24 => openkm/4.0.16}/values.yaml | 0 stable/openldap/5.0.7/Chart.lock | 6 - stable/openldap/{5.0.7 => 5.0.8}/CHANGELOG.md | 22 +- .../4.0.26 => openldap/5.0.8}/CONFIG.md | 0 stable/openldap/5.0.8/Chart.lock | 6 + stable/openldap/{5.0.7 => 5.0.8}/Chart.yaml | 2 +- stable/openldap/{5.0.7 => 5.0.8}/README.md | 0 .../openldap/{5.0.7 => 5.0.8}/app-readme.md | 0 .../5.0.8}/charts/common-8.9.24.tgz | Bin .../openldap/{5.0.7 => 5.0.8}/helm-values.md | 0 .../openldap/{5.0.7 => 5.0.8}/ix_values.yaml | 0 .../openldap/{5.0.7 => 5.0.8}/questions.yaml | 8 - stable/openldap/{5.0.7 => 5.0.8}/security.md | 0 .../{5.0.7 => 5.0.8}/templates/_configmap.tpl | 0 .../{5.0.7 => 5.0.8}/templates/common.yaml | 0 .../4.0.26 => openldap/5.0.8}/values.yaml | 0 stable/openvscode-server/0.0.6/Chart.lock | 6 - .../{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../0.0.7}/CONFIG.md | 0 stable/openvscode-server/0.0.7/Chart.lock | 6 + .../{0.0.6 => 0.0.7}/Chart.yaml | 2 +- .../{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../0.0.7}/values.yaml | 0 stable/organizr/9.0.25/Chart.lock | 6 - .../organizr/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../0.0.6 => organizr/9.0.26}/CONFIG.md | 0 stable/organizr/9.0.26/Chart.lock | 6 + stable/organizr/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/organizr/{9.0.25 => 9.0.26}/README.md | 0 .../organizr/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../{9.0.25 => 9.0.26}/helm-values.md | 0 .../{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../{9.0.25 => 9.0.26}/questions.yaml | 1 - .../organizr/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../0.0.6 => organizr/9.0.26}/values.yaml | 0 stable/oscam/4.0.24/Chart.lock | 6 - stable/oscam/{4.0.24 => 4.0.25}/CHANGELOG.md | 18 +- .../{pgadmin/5.0.5 => oscam/4.0.25}/CONFIG.md | 0 stable/oscam/4.0.25/Chart.lock | 6 + stable/oscam/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/oscam/{4.0.24 => 4.0.25}/README.md | 0 stable/oscam/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../oscam/{4.0.24 => 4.0.25}/helm-values.md | 0 .../oscam/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../oscam/{4.0.24 => 4.0.25}/questions.yaml | 0 stable/oscam/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../5.0.5 => oscam/4.0.25}/values.yaml | 0 stable/overseerr/4.0.24/Chart.lock | 6 - .../overseerr/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../7.0.7 => overseerr/4.0.25}/CONFIG.md | 0 stable/overseerr/4.0.25/Chart.lock | 6 + .../overseerr/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/overseerr/{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../overseerr/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../7.0.7 => overseerr/4.0.25}/values.yaml | 0 stable/owncast/4.0.24/Chart.lock | 6 - .../owncast/{4.0.24 => 4.0.25}/CHANGELOG.md | 22 +- .../1.0.28 => owncast/4.0.25}/CONFIG.md | 0 stable/owncast/4.0.25/Chart.lock | 6 + stable/owncast/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/owncast/{4.0.24 => 4.0.25}/README.md | 0 .../owncast/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../owncast/{4.0.24 => 4.0.25}/helm-values.md | 0 .../owncast/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../owncast/{4.0.24 => 4.0.25}/questions.yaml | 8 - stable/owncast/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../1.0.28 => owncast/4.0.25}/values.yaml | 0 stable/owncloud-ocis/4.0.26/Chart.lock | 6 - .../{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../4.0.25 => owncloud-ocis/4.0.27}/CONFIG.md | 0 stable/owncloud-ocis/4.0.27/Chart.lock | 6 + .../{4.0.26 => 4.0.27}/Chart.yaml | 2 +- .../{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../{4.0.26 => 4.0.27}/security.md | 0 .../4.0.27}/templates/common.yaml | 0 .../4.0.27}/values.yaml | 0 .../{1.0.3 => 1.0.4}/CHANGELOG.md | 10 + .../4.0.28 => paperless-ng/1.0.4}/CONFIG.md | 0 stable/paperless-ng/1.0.4/Chart.lock | 12 + .../paperless-ng/{1.0.3 => 1.0.4}/Chart.yaml | 2 +- .../paperless-ng/{1.0.3 => 1.0.4}/README.md | 0 .../{1.0.3 => 1.0.4}/app-readme.md | 0 .../1.0.4}/charts/common-8.9.24.tgz | Bin .../1.0.4}/charts/postgresql-6.0.34.tgz | Bin .../1.0.4/charts/redis-1.0.39.tgz | Bin 0 -> 65304 bytes .../{1.0.3 => 1.0.4}/helm-values.md | 12 +- .../{1.0.3 => 1.0.4}/ix_values.yaml | 2 - .../{1.0.3 => 1.0.4}/questions.yaml | 0 .../paperless-ng/{1.0.3 => 1.0.4}/security.md | 0 .../{1.0.3 => 1.0.4}/templates/_sercrets.tpl | 0 .../{1.0.3 => 1.0.4}/templates/common.yaml | 0 .../4.0.28 => paperless-ng/1.0.4}/values.yaml | 0 .../papermerge/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../0.0.5 => papermerge/0.0.7}/CONFIG.md | 0 stable/papermerge/{0.0.6 => 0.0.7}/Chart.lock | 2 +- stable/papermerge/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/papermerge/{0.0.6 => 0.0.7}/README.md | 0 .../papermerge/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../papermerge/0.0.7/charts/redis-1.0.39.tgz | Bin 0 -> 65304 bytes .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../papermerge/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../0.0.5 => papermerge/0.0.7}/values.yaml | 0 stable/pgadmin/5.0.5/Chart.lock | 6 - stable/pgadmin/{5.0.5 => 5.0.6}/CHANGELOG.md | 20 +- .../4.0.27 => pgadmin/5.0.6}/CONFIG.md | 0 stable/pgadmin/5.0.6/Chart.lock | 6 + stable/pgadmin/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- stable/pgadmin/{5.0.5 => 5.0.6}/README.md | 0 stable/pgadmin/{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../pgadmin/{5.0.5 => 5.0.6}/helm-values.md | 0 .../pgadmin/{5.0.5 => 5.0.6}/ix_values.yaml | 0 .../pgadmin/{5.0.5 => 5.0.6}/questions.yaml | 1 - stable/pgadmin/{5.0.5 => 5.0.6}/security.md | 0 .../5.0.6}/templates/common.yaml | 0 .../4.0.27 => pgadmin/5.0.6}/values.yaml | 0 stable/photoprism/7.0.7/Chart.lock | 9 - stable/photoprism/7.0.7/questions.yaml | 1912 -------------- .../photoprism/{7.0.7 => 7.0.8}/CHANGELOG.md | 22 +- .../1.0.25 => photoprism/7.0.8}/CONFIG.md | 0 .../0.0.5 => photoprism/7.0.8}/Chart.lock | 2 +- stable/photoprism/{7.0.7 => 7.0.8}/Chart.yaml | 2 +- stable/photoprism/{7.0.7 => 7.0.8}/README.md | 0 .../photoprism/{7.0.7 => 7.0.8}/app-readme.md | 0 .../7.0.8}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../{7.0.7 => 7.0.8}/helm-values.md | 2 +- .../{7.0.7 => 7.0.8}/ix_values.yaml | 18 +- stable/photoprism/7.0.8/questions.yaml | 1863 +++++++++++++ .../photoprism/{7.0.7 => 7.0.8}/security.md | 0 .../7.0.8}/templates/common.yaml | 0 .../1.0.25 => photoprism/7.0.8}/values.yaml | 0 stable/photoshow/1.0.28/Chart.lock | 6 - .../photoshow/{1.0.28 => 1.0.29}/CHANGELOG.md | 20 +- .../1.0.24 => photoshow/1.0.29}/CONFIG.md | 0 stable/photoshow/1.0.29/Chart.lock | 6 + .../photoshow/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- stable/photoshow/{1.0.28 => 1.0.29}/README.md | 0 .../{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../{1.0.28 => 1.0.29}/helm-values.md | 0 .../{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../{1.0.28 => 1.0.29}/questions.yaml | 1 - .../photoshow/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../1.0.24 => photoshow/1.0.29}/values.yaml | 0 stable/phpldapadmin/4.0.25/Chart.lock | 6 - .../{4.0.25 => 4.0.26}/CHANGELOG.md | 20 +- .../8.0.25 => phpldapadmin/4.0.26}/CONFIG.md | 0 stable/phpldapadmin/4.0.26/Chart.lock | 6 + .../{4.0.25 => 4.0.26}/Chart.yaml | 2 +- .../phpldapadmin/{4.0.25 => 4.0.26}/README.md | 0 .../{4.0.25 => 4.0.26}/app-readme.md | 0 .../4.0.26}/charts/common-8.9.24.tgz | Bin .../{4.0.25 => 4.0.26}/helm-values.md | 0 .../{4.0.25 => 4.0.26}/ix_values.yaml | 0 .../{4.0.25 => 4.0.26}/questions.yaml | 1 - .../{4.0.25 => 4.0.26}/security.md | 0 .../4.0.26}/templates/common.yaml | 0 .../4.0.26}/values.yaml | 0 stable/piaware/4.0.28/Chart.lock | 6 - .../piaware/{4.0.28 => 4.0.29}/CHANGELOG.md | 20 +- .../8.0.5 => piaware/4.0.29}/CONFIG.md | 0 stable/piaware/4.0.29/Chart.lock | 6 + stable/piaware/{4.0.28 => 4.0.29}/Chart.yaml | 2 +- stable/piaware/{4.0.28 => 4.0.29}/README.md | 0 .../piaware/{4.0.28 => 4.0.29}/app-readme.md | 0 .../4.0.29}/charts/common-8.9.24.tgz | Bin .../{4.0.28 => 4.0.29}/ci/ct-values.yaml | 0 .../piaware/{4.0.28 => 4.0.29}/helm-values.md | 0 .../piaware/{4.0.28 => 4.0.29}/ix_values.yaml | 0 .../piaware/{4.0.28 => 4.0.29}/questions.yaml | 1 - stable/piaware/{4.0.28 => 4.0.29}/security.md | 0 .../4.0.29}/templates/common.yaml | 0 .../8.0.5 => piaware/4.0.29}/values.yaml | 0 stable/pidgin/0.0.5/Chart.lock | 6 - stable/pidgin/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.24 => pidgin/0.0.6}/CONFIG.md | 0 stable/pidgin/0.0.6/Chart.lock | 6 + stable/pidgin/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/pidgin/{0.0.5 => 0.0.6}/README.md | 0 stable/pidgin/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin stable/pidgin/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/pidgin/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/pidgin/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/pidgin/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../4.0.24 => pidgin/0.0.6}/values.yaml | 0 stable/pihole/4.0.27/Chart.lock | 6 - stable/pihole/{4.0.27 => 4.0.28}/CHANGELOG.md | 22 +- .../0.0.5 => pihole/4.0.28}/CONFIG.md | 0 stable/pihole/4.0.28/Chart.lock | 6 + stable/pihole/{4.0.27 => 4.0.28}/Chart.yaml | 2 +- stable/pihole/{4.0.27 => 4.0.28}/README.md | 0 .../pihole/{4.0.27 => 4.0.28}/app-readme.md | 0 .../4.0.28}/charts/common-8.9.24.tgz | Bin .../pihole/{4.0.27 => 4.0.28}/helm-values.md | 0 .../pihole/{4.0.27 => 4.0.28}/ix_values.yaml | 0 .../pihole/{4.0.27 => 4.0.28}/questions.yaml | 15 - stable/pihole/{4.0.27 => 4.0.28}/security.md | 0 .../templates/_configmap.tpl | 0 .../{4.0.27 => 4.0.28}/templates/common.yaml | 0 .../0.0.5 => pihole/4.0.28}/values.yaml | 0 stable/piwigo/1.0.25/Chart.lock | 6 - stable/piwigo/{1.0.25 => 1.0.26}/CHANGELOG.md | 20 +- .../2.0.5 => piwigo/1.0.26}/CONFIG.md | 0 stable/piwigo/1.0.26/Chart.lock | 6 + stable/piwigo/{1.0.25 => 1.0.26}/Chart.yaml | 2 +- stable/piwigo/{1.0.25 => 1.0.26}/README.md | 0 .../piwigo/{1.0.25 => 1.0.26}/app-readme.md | 0 .../1.0.26}/charts/common-8.9.24.tgz | Bin .../piwigo/{1.0.25 => 1.0.26}/helm-values.md | 0 .../piwigo/{1.0.25 => 1.0.26}/ix_values.yaml | 0 .../piwigo/{1.0.25 => 1.0.26}/questions.yaml | 1 - stable/piwigo/{1.0.25 => 1.0.26}/security.md | 0 .../{1.0.25 => 1.0.26}/templates/common.yaml | 0 .../2.0.5 => piwigo/1.0.26}/values.yaml | 0 stable/pixapop/1.0.24/Chart.lock | 6 - .../pixapop/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../4.0.24 => pixapop/1.0.25}/CONFIG.md | 0 stable/pixapop/1.0.25/Chart.lock | 6 + stable/pixapop/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/pixapop/{1.0.24 => 1.0.25}/README.md | 0 .../pixapop/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../pixapop/{1.0.24 => 1.0.25}/helm-values.md | 0 .../pixapop/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../pixapop/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/pixapop/{1.0.24 => 1.0.25}/security.md | 14 +- .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../4.0.24 => pixapop/1.0.25}/values.yaml | 0 stable/plex/8.0.25/Chart.lock | 6 - stable/plex/{8.0.25 => 8.0.26}/CHANGELOG.md | 20 +- .../4.0.43 => plex/8.0.26}/CONFIG.md | 0 stable/plex/8.0.26/Chart.lock | 6 + stable/plex/{8.0.25 => 8.0.26}/Chart.yaml | 2 +- stable/plex/{8.0.25 => 8.0.26}/README.md | 0 stable/plex/{8.0.25 => 8.0.26}/app-readme.md | 0 .../8.0.26}/charts/common-8.9.24.tgz | Bin stable/plex/{8.0.25 => 8.0.26}/helm-values.md | 0 stable/plex/{8.0.25 => 8.0.26}/ix_values.yaml | 0 stable/plex/{8.0.25 => 8.0.26}/questions.yaml | 1 - stable/plex/{8.0.25 => 8.0.26}/security.md | 0 .../8.0.26}/templates/common.yaml | 0 .../4.0.43 => plex/8.0.26}/values.yaml | 0 stable/podgrab/8.0.5/Chart.lock | 6 - stable/podgrab/{8.0.5 => 8.0.6}/CHANGELOG.md | 20 +- .../0.0.5 => podgrab/8.0.6}/CONFIG.md | 0 stable/podgrab/8.0.6/Chart.lock | 6 + stable/podgrab/{8.0.5 => 8.0.6}/Chart.yaml | 2 +- stable/podgrab/{8.0.5 => 8.0.6}/README.md | 0 stable/podgrab/{8.0.5 => 8.0.6}/app-readme.md | 0 .../8.0.6}/charts/common-8.9.24.tgz | Bin .../podgrab/{8.0.5 => 8.0.6}/helm-values.md | 0 .../podgrab/{8.0.5 => 8.0.6}/ix_values.yaml | 0 .../podgrab/{8.0.5 => 8.0.6}/questions.yaml | 1 - stable/podgrab/{8.0.5 => 8.0.6}/security.md | 0 .../8.0.6}/templates/common.yaml | 0 .../0.0.5 => podgrab/8.0.6}/values.yaml | 0 stable/pretend-youre-xyzzy/4.0.24/Chart.lock | 6 - .../{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../4.0.25}/CONFIG.md | 0 stable/pretend-youre-xyzzy/4.0.25/Chart.lock | 6 + .../{4.0.24 => 4.0.25}/Chart.yaml | 2 +- .../{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../4.0.25}/values.yaml | 0 stable/projectsend/0.0.5/Chart.lock | 6 - .../projectsend/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.24 => projectsend/0.0.6}/CONFIG.md | 0 stable/projectsend/0.0.6/Chart.lock | 6 + .../projectsend/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/projectsend/{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../projectsend/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../4.0.24 => projectsend/0.0.6}/values.yaml | 0 stable/promcord/2.0.5/Chart.lock | 6 - stable/promcord/{2.0.5 => 2.0.6}/CHANGELOG.md | 18 +- .../{pylon/0.0.5 => promcord/2.0.6}/CONFIG.md | 0 stable/promcord/2.0.6/Chart.lock | 6 + stable/promcord/{2.0.5 => 2.0.6}/Chart.yaml | 2 +- stable/promcord/{2.0.5 => 2.0.6}/README.md | 0 .../promcord/{2.0.5 => 2.0.6}/app-readme.md | 0 .../2.0.6}/charts/common-8.9.24.tgz | Bin .../{2.0.5 => 2.0.6}/ci/no-values.yaml | 0 .../promcord/{2.0.5 => 2.0.6}/helm-values.md | 0 .../promcord/{2.0.5 => 2.0.6}/ix_values.yaml | 0 .../promcord/{2.0.5 => 2.0.6}/questions.yaml | 0 stable/promcord/{2.0.5 => 2.0.6}/security.md | 0 .../{2.0.5 => 2.0.6}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../0.0.5 => promcord/2.0.6}/values.yaml | 0 stable/protonmail-bridge/4.0.24/Chart.lock | 6 - .../{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../4.0.25}/CONFIG.md | 0 stable/protonmail-bridge/4.0.25/Chart.lock | 6 + .../{4.0.24 => 4.0.25}/Chart.yaml | 2 +- .../{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 1 - .../{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../4.0.25}/values.yaml | 0 stable/prowlarr/4.0.43/Chart.lock | 6 - .../prowlarr/{4.0.43 => 4.0.44}/CHANGELOG.md | 20 +- .../0.0.6 => prowlarr/4.0.44}/CONFIG.md | 0 stable/prowlarr/4.0.44/Chart.lock | 6 + stable/prowlarr/{4.0.43 => 4.0.44}/Chart.yaml | 2 +- stable/prowlarr/{4.0.43 => 4.0.44}/README.md | 0 .../prowlarr/{4.0.43 => 4.0.44}/app-readme.md | 0 .../4.0.44}/charts/common-8.9.24.tgz | Bin .../{4.0.43 => 4.0.44}/helm-values.md | 0 .../{4.0.43 => 4.0.44}/ix_values.yaml | 0 .../{4.0.43 => 4.0.44}/questions.yaml | 1 - .../prowlarr/{4.0.43 => 4.0.44}/security.md | 0 .../4.0.44}/templates/common.yaml | 0 .../0.0.6 => prowlarr/4.0.44}/values.yaml | 0 stable/pwndrop/0.0.5/Chart.lock | 6 - stable/pwndrop/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.5 => pwndrop/0.0.6}/CONFIG.md | 0 stable/pwndrop/0.0.6/Chart.lock | 6 + stable/pwndrop/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/pwndrop/{0.0.5 => 0.0.6}/README.md | 0 stable/pwndrop/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../pwndrop/{0.0.5 => 0.0.6}/helm-values.md | 0 .../pwndrop/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../pwndrop/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/pwndrop/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.5 => pwndrop/0.0.6}/values.yaml | 0 stable/pydio-cells/0.0.6/Chart.lock | 6 - .../pydio-cells/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../9.0.25 => pydio-cells/0.0.7}/CONFIG.md | 0 stable/pydio-cells/0.0.7/Chart.lock | 6 + .../pydio-cells/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/pydio-cells/{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../pydio-cells/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../9.0.25 => pydio-cells/0.0.7}/values.yaml | 0 stable/pyload/4.0.24/Chart.lock | 6 - stable/pyload/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- .../9.0.38 => pyload/4.0.25}/CONFIG.md | 0 stable/pyload/4.0.25/Chart.lock | 6 + stable/pyload/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/pyload/{4.0.24 => 4.0.25}/README.md | 0 .../pyload/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../pyload/{4.0.24 => 4.0.25}/helm-values.md | 0 .../pyload/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../pyload/{4.0.24 => 4.0.25}/questions.yaml | 1 - stable/pyload/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../9.0.38 => pyload/4.0.25}/values.yaml | 0 stable/pylon/0.0.5/Chart.lock | 6 - stable/pylon/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../{recipes/5.0.1 => pylon/0.0.6}/CONFIG.md | 0 stable/pylon/0.0.6/Chart.lock | 6 + stable/pylon/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/pylon/{0.0.5 => 0.0.6}/README.md | 0 stable/pylon/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin stable/pylon/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/pylon/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/pylon/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/pylon/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../5.0.1 => pylon/0.0.6}/values.yaml | 0 stable/qbittorrent/9.0.27/Chart.lock | 6 - .../{9.0.27 => 9.0.28}/CHANGELOG.md | 22 +- .../4.0.23 => qbittorrent/9.0.28}/CONFIG.md | 0 stable/qbittorrent/9.0.28/Chart.lock | 6 + .../qbittorrent/{9.0.27 => 9.0.28}/Chart.yaml | 2 +- .../qbittorrent/{9.0.27 => 9.0.28}/README.md | 0 .../{9.0.27 => 9.0.28}/app-readme.md | 0 .../9.0.28}/charts/common-8.9.24.tgz | Bin .../{9.0.27 => 9.0.28}/helm-values.md | 0 .../{9.0.27 => 9.0.28}/ix_values.yaml | 0 .../{9.0.27 => 9.0.28}/questions.yaml | 15 - .../{9.0.27 => 9.0.28}/security.md | 0 .../templates/_configmap.tpl | 0 .../{9.0.27 => 9.0.28}/templates/common.yaml | 0 .../4.0.23 => qbittorrent/9.0.28}/values.yaml | 0 stable/quassel-core/0.0.6/Chart.lock | 9 - .../{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../1.0.28 => quassel-core/0.0.7}/CONFIG.md | 0 stable/quassel-core/0.0.7/Chart.lock | 9 + .../quassel-core/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- .../quassel-core/{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../0.0.7}/charts/postgresql-6.0.34.tgz | Bin .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../quassel-core/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../1.0.28 => quassel-core/0.0.7}/values.yaml | 0 stable/quassel-web/0.0.5/Chart.lock | 6 - .../quassel-web/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../0.0.5 => quassel-web/0.0.6}/CONFIG.md | 0 stable/quassel-web/0.0.6/Chart.lock | 6 + .../quassel-web/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/quassel-web/{0.0.5 => 0.0.6}/README.md | 0 .../{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../quassel-web/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../0.0.5 => quassel-web/0.0.6}/values.yaml | 0 stable/radarr/9.0.25/Chart.lock | 6 - stable/radarr/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../4.0.24 => radarr/9.0.26}/CONFIG.md | 0 stable/radarr/9.0.26/Chart.lock | 6 + stable/radarr/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/radarr/{9.0.25 => 9.0.26}/README.md | 0 .../radarr/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../radarr/{9.0.25 => 9.0.26}/helm-values.md | 0 .../radarr/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../radarr/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/radarr/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../4.0.24 => radarr/9.0.26}/values.yaml | 0 stable/readarr/9.0.38/Chart.lock | 6 - .../readarr/{9.0.38 => 9.0.39}/CHANGELOG.md | 20 +- .../0.0.5 => readarr/9.0.39}/CONFIG.md | 0 stable/readarr/9.0.39/Chart.lock | 6 + stable/readarr/{9.0.38 => 9.0.39}/Chart.yaml | 2 +- stable/readarr/{9.0.38 => 9.0.39}/README.md | 0 .../readarr/{9.0.38 => 9.0.39}/app-readme.md | 0 .../9.0.39}/charts/common-8.9.24.tgz | Bin .../readarr/{9.0.38 => 9.0.39}/helm-values.md | 0 .../readarr/{9.0.38 => 9.0.39}/ix_values.yaml | 0 .../readarr/{9.0.38 => 9.0.39}/questions.yaml | 1 - stable/readarr/{9.0.38 => 9.0.39}/security.md | 0 .../9.0.39}/templates/common.yaml | 0 .../0.0.5 => readarr/9.0.39}/values.yaml | 0 stable/recipes/5.0.1/Chart.lock | 9 - stable/recipes/{5.0.1 => 5.0.2}/CHANGELOG.md | 22 +- .../9.0.24 => recipes/5.0.2}/CONFIG.md | 0 stable/recipes/5.0.2/Chart.lock | 9 + stable/recipes/{5.0.1 => 5.0.2}/Chart.yaml | 2 +- stable/recipes/{5.0.1 => 5.0.2}/README.md | 0 stable/recipes/{5.0.1 => 5.0.2}/app-readme.md | 0 .../5.0.2}/charts/common-8.9.24.tgz | Bin .../5.0.2}/charts/postgresql-6.0.34.tgz | Bin .../recipes/{5.0.1 => 5.0.2}/helm-values.md | 5 - .../recipes/{5.0.1 => 5.0.2}/ix_values.yaml | 2 - .../recipes/{5.0.1 => 5.0.2}/questions.yaml | 1 - stable/recipes/{5.0.1 => 5.0.2}/security.md | 0 .../{5.0.1 => 5.0.2}/templates/_sercrets.tpl | 0 .../{5.0.1 => 5.0.2}/templates/common.yaml | 0 .../{5.0.1 => 5.0.2}/templates/configmap.yaml | 0 .../9.0.24 => recipes/5.0.2}/values.yaml | 0 stable/reg/4.0.23/Chart.lock | 6 - stable/reg/{4.0.23 => 4.0.24}/CHANGELOG.md | 20 +- .../{scrutiny/0.0.6 => reg/4.0.24}/CONFIG.md | 0 stable/reg/4.0.24/Chart.lock | 6 + stable/reg/{4.0.23 => 4.0.24}/Chart.yaml | 2 +- stable/reg/{4.0.23 => 4.0.24}/README.md | 0 stable/reg/{4.0.23 => 4.0.24}/app-readme.md | 0 .../4.0.24}/charts/common-8.9.24.tgz | Bin .../reg/{4.0.23 => 4.0.24}/ci/ct-values.yaml | 0 stable/reg/{4.0.23 => 4.0.24}/helm-values.md | 0 stable/reg/{4.0.23 => 4.0.24}/ix_values.yaml | 0 stable/reg/{4.0.23 => 4.0.24}/questions.yaml | 1 - stable/reg/{4.0.23 => 4.0.24}/security.md | 0 .../4.0.24/templates/common.yaml | 0 .../0.0.6 => reg/4.0.24}/values.yaml | 0 stable/remmina/1.0.28/Chart.lock | 6 - .../remmina/{1.0.28 => 1.0.29}/CHANGELOG.md | 20 +- .../4.0.24 => remmina/1.0.29}/CONFIG.md | 0 stable/remmina/1.0.29/Chart.lock | 6 + stable/remmina/{1.0.28 => 1.0.29}/Chart.yaml | 2 +- stable/remmina/{1.0.28 => 1.0.29}/README.md | 0 .../remmina/{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../remmina/{1.0.28 => 1.0.29}/helm-values.md | 0 .../remmina/{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../remmina/{1.0.28 => 1.0.29}/questions.yaml | 1 - stable/remmina/{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../4.0.24 => remmina/1.0.29}/values.yaml | 0 stable/requestrr/0.0.5/Chart.lock | 6 - .../requestrr/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.15 => requestrr/0.0.6}/CONFIG.md | 0 stable/requestrr/0.0.6/Chart.lock | 6 + stable/requestrr/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/requestrr/{0.0.5 => 0.0.6}/README.md | 0 .../requestrr/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../requestrr/{0.0.5 => 0.0.6}/helm-values.md | 0 .../requestrr/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../requestrr/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/requestrr/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../4.0.15 => requestrr/0.0.6}/values.yaml | 0 stable/resilio-sync/4.0.24/Chart.lock | 6 - .../{4.0.24 => 4.0.25}/CHANGELOG.md | 22 +- .../1.0.24 => resilio-sync/4.0.25}/CONFIG.md | 0 stable/resilio-sync/4.0.25/Chart.lock | 6 + .../{4.0.24 => 4.0.25}/Chart.yaml | 2 +- .../resilio-sync/{4.0.24 => 4.0.25}/README.md | 0 .../{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 15 - .../{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../4.0.25}/values.yaml | 0 stable/rsnapshot/0.0.5/Chart.lock | 6 - .../rsnapshot/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../1.0.24 => rsnapshot/0.0.6}/CONFIG.md | 0 stable/rsnapshot/0.0.6/Chart.lock | 6 + stable/rsnapshot/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/rsnapshot/{0.0.5 => 0.0.6}/README.md | 0 .../rsnapshot/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../rsnapshot/{0.0.5 => 0.0.6}/helm-values.md | 0 .../rsnapshot/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../rsnapshot/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/rsnapshot/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6/templates/common.yaml | 0 .../1.0.24 => rsnapshot/0.0.6}/values.yaml | 0 stable/sabnzbd/9.0.24/Chart.lock | 6 - .../sabnzbd/{9.0.24 => 9.0.25}/CHANGELOG.md | 20 +- .../1.0.24 => sabnzbd/9.0.25}/CONFIG.md | 0 stable/sabnzbd/9.0.25/Chart.lock | 6 + stable/sabnzbd/{9.0.24 => 9.0.25}/Chart.yaml | 2 +- stable/sabnzbd/{9.0.24 => 9.0.25}/README.md | 0 .../sabnzbd/{9.0.24 => 9.0.25}/app-readme.md | 0 .../9.0.25}/charts/common-8.9.24.tgz | Bin .../sabnzbd/{9.0.24 => 9.0.25}/helm-values.md | 0 .../sabnzbd/{9.0.24 => 9.0.25}/ix_values.yaml | 0 .../sabnzbd/{9.0.24 => 9.0.25}/questions.yaml | 1 - stable/sabnzbd/{9.0.24 => 9.0.25}/security.md | 0 .../9.0.25}/templates/common.yaml | 0 .../1.0.24 => sabnzbd/9.0.25}/values.yaml | 0 stable/scrutiny/0.0.6/Chart.lock | 6 - stable/scrutiny/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../1.0.26 => scrutiny/0.0.7}/CONFIG.md | 0 stable/scrutiny/0.0.7/Chart.lock | 6 + stable/scrutiny/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/scrutiny/{0.0.6 => 0.0.7}/README.md | 0 .../scrutiny/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../scrutiny/{0.0.6 => 0.0.7}/helm-values.md | 0 .../scrutiny/{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../scrutiny/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/scrutiny/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../1.0.26 => scrutiny/0.0.7}/values.yaml | 0 stable/ser2sock/4.0.24/Chart.lock | 6 - .../ser2sock/{4.0.24 => 4.0.25}/CHANGELOG.md | 22 +- .../0.0.16 => ser2sock/4.0.25}/CONFIG.md | 0 stable/ser2sock/4.0.25/Chart.lock | 6 + stable/ser2sock/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/ser2sock/{4.0.24 => 4.0.25}/README.md | 0 .../ser2sock/{4.0.24 => 4.0.25}/app-readme.md | 0 .../4.0.25}/charts/common-8.9.24.tgz | Bin .../{4.0.24 => 4.0.25}/ci/test-values.yaml | 0 .../{4.0.24 => 4.0.25}/helm-values.md | 0 .../{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../{4.0.24 => 4.0.25}/questions.yaml | 8 - .../ser2sock/{4.0.24 => 4.0.25}/security.md | 0 .../4.0.25}/templates/common.yaml | 0 .../0.0.16 => ser2sock/4.0.25}/values.yaml | 0 stable/shiori/4.0.15/Chart.lock | 9 - stable/shiori/{4.0.15 => 4.0.16}/CHANGELOG.md | 22 +- .../9.0.25 => shiori/4.0.16}/CONFIG.md | 0 stable/shiori/4.0.16/Chart.lock | 9 + stable/shiori/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/shiori/{4.0.15 => 4.0.16}/README.md | 0 .../shiori/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16}/charts/postgresql-6.0.34.tgz | Bin .../shiori/{4.0.15 => 4.0.16}/helm-values.md | 4 +- .../shiori/{4.0.15 => 4.0.16}/ix_values.yaml | 2 - .../shiori/{4.0.15 => 4.0.16}/questions.yaml | 1 - stable/shiori/{4.0.15 => 4.0.16}/security.md | 0 .../4.0.16}/templates/common.yaml | 0 .../9.0.25 => shiori/4.0.16}/values.yaml | 0 stable/shorturl/1.0.24/Chart.lock | 6 - .../shorturl/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../1.0.11 => shorturl/1.0.25}/CONFIG.md | 0 stable/shorturl/1.0.25/Chart.lock | 6 + stable/shorturl/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/shorturl/{1.0.24 => 1.0.25}/README.md | 0 .../shorturl/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../{1.0.24 => 1.0.25}/helm-values.md | 0 .../{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../{1.0.24 => 1.0.25}/questions.yaml | 1 - .../shorturl/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../1.0.11 => shorturl/1.0.25}/values.yaml | 0 stable/sickchill/1.0.24/Chart.lock | 6 - .../sickchill/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../1.0.28 => sickchill/1.0.25}/CONFIG.md | 0 stable/sickchill/1.0.25/Chart.lock | 6 + .../sickchill/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/sickchill/{1.0.24 => 1.0.25}/README.md | 0 .../{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../{1.0.24 => 1.0.25}/helm-values.md | 0 .../{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../{1.0.24 => 1.0.25}/questions.yaml | 1 - .../sickchill/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../1.0.28 => sickchill/1.0.25}/values.yaml | 0 stable/sickgear/1.0.24/Chart.lock | 6 - .../sickgear/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../5.0.5 => sickgear/1.0.25}/CONFIG.md | 0 stable/sickgear/1.0.25/Chart.lock | 6 + stable/sickgear/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/sickgear/{1.0.24 => 1.0.25}/README.md | 0 .../sickgear/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../{1.0.24 => 1.0.25}/helm-values.md | 0 .../{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../{1.0.24 => 1.0.25}/questions.yaml | 1 - .../sickgear/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../5.0.5 => sickgear/1.0.25}/values.yaml | 0 stable/smokeping/1.0.26/Chart.lock | 6 - .../smokeping/{1.0.26 => 1.0.27}/CHANGELOG.md | 20 +- .../1.0.24 => smokeping/1.0.27}/CONFIG.md | 0 stable/smokeping/1.0.27/Chart.lock | 6 + .../smokeping/{1.0.26 => 1.0.27}/Chart.yaml | 2 +- stable/smokeping/{1.0.26 => 1.0.27}/README.md | 0 .../{1.0.26 => 1.0.27}/app-readme.md | 0 .../1.0.27}/charts/common-8.9.24.tgz | Bin .../{1.0.26 => 1.0.27}/helm-values.md | 0 .../{1.0.26 => 1.0.27}/ix_values.yaml | 0 .../{1.0.26 => 1.0.27}/questions.yaml | 1 - .../smokeping/{1.0.26 => 1.0.27}/security.md | 0 .../{1.0.26 => 1.0.27}/templates/common.yaml | 0 .../1.0.24 => smokeping/1.0.27}/values.yaml | 0 stable/snipe-it/0.0.16/Chart.lock | 9 - .../snipe-it/{0.0.16 => 0.0.17}/CHANGELOG.md | 18 +- .../4.0.15 => snipe-it/0.0.17}/CONFIG.md | 0 stable/snipe-it/0.0.17/Chart.lock | 9 + stable/snipe-it/{0.0.16 => 0.0.17}/Chart.yaml | 2 +- stable/snipe-it/{0.0.16 => 0.0.17}/README.md | 0 .../snipe-it/{0.0.16 => 0.0.17}/app-readme.md | 0 .../0.0.17}/charts/common-8.9.24.tgz | Bin .../charts/mariadb-1.0.37.tgz | Bin .../{0.0.16 => 0.0.17}/helm-values.md | 0 .../{0.0.16 => 0.0.17}/ix_values.yaml | 0 .../{0.0.16 => 0.0.17}/questions.yaml | 0 .../snipe-it/{0.0.16 => 0.0.17}/security.md | 2 +- .../{0.0.16 => 0.0.17}/templates/common.yaml | 0 .../4.0.15 => snipe-it/0.0.17}/values.yaml | 0 stable/sonarr/9.0.25/Chart.lock | 6 - stable/sonarr/{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../0.0.5 => sonarr/9.0.26}/CONFIG.md | 0 stable/sonarr/9.0.26/Chart.lock | 6 + stable/sonarr/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- stable/sonarr/{9.0.25 => 9.0.26}/README.md | 0 .../sonarr/{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../sonarr/{9.0.25 => 9.0.26}/helm-values.md | 0 .../sonarr/{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../sonarr/{9.0.25 => 9.0.26}/questions.yaml | 1 - stable/sonarr/{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../0.0.5 => sonarr/9.0.26}/values.yaml | 0 stable/speedtest-exporter/1.0.11/Chart.lock | 6 - .../{1.0.11 => 1.0.12}/CHANGELOG.md | 18 +- .../1.0.12}/CONFIG.md | 0 stable/speedtest-exporter/1.0.12/Chart.lock | 6 + .../{1.0.11 => 1.0.12}/Chart.yaml | 2 +- .../{1.0.11 => 1.0.12}/README.md | 0 .../{1.0.11 => 1.0.12}/app-readme.md | 0 .../1.0.12}/charts/common-8.9.24.tgz | Bin .../{1.0.11 => 1.0.12}/helm-values.md | 0 .../{1.0.11 => 1.0.12}/ix_values.yaml | 0 .../{1.0.11 => 1.0.12}/questions.yaml | 0 .../{1.0.11 => 1.0.12}/security.md | 0 .../1.0.12}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../1.0.12}/values.yaml | 0 stable/sqlitebrowser/1.0.28/Chart.lock | 6 - .../{1.0.28 => 1.0.29}/CHANGELOG.md | 20 +- .../0.0.6 => sqlitebrowser/1.0.29}/CONFIG.md | 0 stable/sqlitebrowser/1.0.29/Chart.lock | 6 + .../{1.0.28 => 1.0.29}/Chart.yaml | 2 +- .../{1.0.28 => 1.0.29}/README.md | 0 .../{1.0.28 => 1.0.29}/app-readme.md | 0 .../1.0.29}/charts/common-8.9.24.tgz | Bin .../{1.0.28 => 1.0.29}/helm-values.md | 0 .../{1.0.28 => 1.0.29}/ix_values.yaml | 0 .../{1.0.28 => 1.0.29}/questions.yaml | 1 - .../{1.0.28 => 1.0.29}/security.md | 0 .../{1.0.28 => 1.0.29}/templates/common.yaml | 0 .../1.0.29}/values.yaml | 0 stable/stash/5.0.5/Chart.lock | 6 - stable/stash/{5.0.5 => 5.0.6}/CHANGELOG.md | 20 +- .../9.0.24 => stash/5.0.6}/CONFIG.md | 0 stable/stash/5.0.6/Chart.lock | 6 + stable/stash/{5.0.5 => 5.0.6}/Chart.yaml | 2 +- stable/stash/{5.0.5 => 5.0.6}/README.md | 0 stable/stash/{5.0.5 => 5.0.6}/app-readme.md | 0 .../5.0.6}/charts/common-8.9.24.tgz | Bin .../stash/{5.0.5 => 5.0.6}/ci/ct-values.yaml | 0 stable/stash/{5.0.5 => 5.0.6}/helm-values.md | 0 stable/stash/{5.0.5 => 5.0.6}/ix_values.yaml | 0 stable/stash/{5.0.5 => 5.0.6}/questions.yaml | 1 - stable/stash/{5.0.5 => 5.0.6}/security.md | 0 .../5.0.6}/templates/common.yaml | 0 .../9.0.24 => stash/5.0.6}/values.yaml | 0 stable/static/1.0.24/Chart.lock | 6 - stable/static/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../2.0.24 => static/1.0.25}/CONFIG.md | 0 stable/static/1.0.25/Chart.lock | 6 + stable/static/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/static/{1.0.24 => 1.0.25}/README.md | 0 .../static/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../static/{1.0.24 => 1.0.25}/helm-values.md | 0 .../static/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../static/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/static/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../2.0.24 => static/1.0.25}/values.yaml | 0 stable/statping/4.0.15/Chart.lock | 9 - .../statping/{4.0.15 => 4.0.16}/CHANGELOG.md | 22 +- .../4.0.15 => statping/4.0.16}/CONFIG.md | 0 stable/statping/4.0.16/Chart.lock | 9 + stable/statping/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/statping/{4.0.15 => 4.0.16}/README.md | 0 .../statping/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16}/charts/postgresql-6.0.34.tgz | Bin .../{4.0.15 => 4.0.16}/helm-values.md | 10 +- .../{4.0.15 => 4.0.16}/ix_values.yaml | 1 - .../{4.0.15 => 4.0.16}/questions.yaml | 1 - .../statping/{4.0.15 => 4.0.16}/security.md | 0 .../{4.0.15 => 4.0.16}/templates/common.yaml | 0 .../4.0.15 => statping/4.0.16}/values.yaml | 0 stable/synclounge/0.0.5/Chart.lock | 6 - .../synclounge/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../4.0.26 => synclounge/0.0.6}/CONFIG.md | 0 stable/synclounge/0.0.6/Chart.lock | 6 + stable/synclounge/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/synclounge/{0.0.5 => 0.0.6}/README.md | 0 .../synclounge/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../{0.0.5 => 0.0.6}/helm-values.md | 0 .../{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../{0.0.5 => 0.0.6}/questions.yaml | 0 .../synclounge/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6/templates/common.yaml | 0 .../4.0.26 => synclounge/0.0.6}/values.yaml | 0 stable/syncthing/9.0.26/Chart.lock | 6 - .../syncthing/{9.0.26 => 9.0.27}/CHANGELOG.md | 22 +- .../4.0.15 => syncthing/9.0.27}/CONFIG.md | 0 stable/syncthing/9.0.27/Chart.lock | 6 + .../syncthing/{9.0.26 => 9.0.27}/Chart.yaml | 2 +- stable/syncthing/{9.0.26 => 9.0.27}/README.md | 0 .../{9.0.26 => 9.0.27}/app-readme.md | 0 .../9.0.27}/charts/common-8.9.24.tgz | Bin .../{9.0.26 => 9.0.27}/helm-values.md | 0 .../{9.0.26 => 9.0.27}/ix_values.yaml | 0 .../{9.0.26 => 9.0.27}/questions.yaml | 22 - .../syncthing/{9.0.26 => 9.0.27}/security.md | 0 .../9.0.27}/templates/common.yaml | 0 .../4.0.15 => syncthing/9.0.27}/values.yaml | 0 stable/syslog-ng/0.0.6/Chart.lock | 6 - .../syslog-ng/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + .../9.0.25 => syslog-ng/0.0.7}/CONFIG.md | 0 stable/syslog-ng/0.0.7/Chart.lock | 6 + stable/syslog-ng/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/syslog-ng/{0.0.6 => 0.0.7}/README.md | 0 .../syslog-ng/{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7}/charts/common-8.9.24.tgz | Bin .../syslog-ng/{0.0.6 => 0.0.7}/helm-values.md | 0 .../syslog-ng/{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../syslog-ng/{0.0.6 => 0.0.7}/questions.yaml | 0 stable/syslog-ng/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 .../9.0.25 => syslog-ng/0.0.7}/values.yaml | 0 stable/tautulli/9.0.24/Chart.lock | 6 - .../tautulli/{9.0.24 => 9.0.25}/CHANGELOG.md | 20 +- .../4.0.23 => tautulli/9.0.25}/CONFIG.md | 0 stable/tautulli/9.0.25/Chart.lock | 6 + stable/tautulli/{9.0.24 => 9.0.25}/Chart.yaml | 2 +- stable/tautulli/{9.0.24 => 9.0.25}/README.md | 0 .../tautulli/{9.0.24 => 9.0.25}/app-readme.md | 0 .../9.0.25}/charts/common-8.9.24.tgz | Bin .../{9.0.24 => 9.0.25}/helm-values.md | 0 .../{9.0.24 => 9.0.25}/ix_values.yaml | 0 .../{9.0.24 => 9.0.25}/questions.yaml | 1 - .../tautulli/{9.0.24 => 9.0.25}/security.md | 0 .../9.0.25}/templates/common.yaml | 0 .../4.0.23 => tautulli/9.0.25}/values.yaml | 0 stable/teamspeak3/2.0.24/Chart.lock | 6 - .../{2.0.24 => 2.0.25}/CHANGELOG.md | 24 +- .../1.0.24 => teamspeak3/2.0.25}/CONFIG.md | 0 stable/teamspeak3/2.0.25/Chart.lock | 6 + .../teamspeak3/{2.0.24 => 2.0.25}/Chart.yaml | 2 +- .../teamspeak3/{2.0.24 => 2.0.25}/README.md | 0 .../{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-8.9.24.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 2 +- .../{2.0.24 => 2.0.25}/questions.yaml | 24 +- .../teamspeak3/{2.0.24 => 2.0.25}/security.md | 0 .../2.0.25}/templates/common.yaml | 0 .../1.0.24 => teamspeak3/2.0.25}/values.yaml | 0 stable/teedy/4.0.15/Chart.lock | 9 - stable/teedy/{4.0.15 => 4.0.16}/CHANGELOG.md | 22 +- .../0.0.5 => teedy/4.0.16}/CONFIG.md | 0 stable/teedy/4.0.16/Chart.lock | 9 + stable/teedy/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/teedy/{4.0.15 => 4.0.16}/README.md | 0 stable/teedy/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16}/charts/postgresql-6.0.34.tgz | Bin .../teedy/{4.0.15 => 4.0.16}/helm-values.md | 2 +- .../teedy/{4.0.15 => 4.0.16}/ix_values.yaml | 1 - .../teedy/{4.0.15 => 4.0.16}/questions.yaml | 1 - stable/teedy/{4.0.15 => 4.0.16}/security.md | 0 .../4.0.16}/templates/common.yaml | 0 .../0.0.5 => teedy/4.0.16}/values.yaml | 0 stable/thelounge/4.0.26/Chart.lock | 6 - .../thelounge/{4.0.26 => 4.0.27}/CHANGELOG.md | 20 +- .../9.0.28 => thelounge/4.0.27}/CONFIG.md | 0 stable/thelounge/4.0.27/Chart.lock | 6 + .../thelounge/{4.0.26 => 4.0.27}/Chart.yaml | 2 +- stable/thelounge/{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 1 - .../thelounge/{4.0.26 => 4.0.27}/security.md | 0 .../4.0.27}/templates/common.yaml | 0 .../9.0.28 => thelounge/4.0.27}/values.yaml | 0 stable/traccar/4.0.15/Chart.lock | 9 - .../traccar/{4.0.15 => 4.0.16}/CHANGELOG.md | 22 +- .../4.0.26 => traccar/4.0.16}/CONFIG.md | 0 .../4.0.14 => traccar/4.0.16}/Chart.lock | 2 +- stable/traccar/{4.0.15 => 4.0.16}/Chart.yaml | 2 +- stable/traccar/{4.0.15 => 4.0.16}/README.md | 0 .../traccar/{4.0.15 => 4.0.16}/app-readme.md | 0 .../4.0.16}/charts/common-8.9.24.tgz | Bin .../4.0.16/charts/postgresql-6.0.34.tgz | Bin 0 -> 72664 bytes .../traccar/{4.0.15 => 4.0.16}/helm-values.md | 2 - .../traccar/{4.0.15 => 4.0.16}/ix_values.yaml | 2 - .../traccar/{4.0.15 => 4.0.16}/questions.yaml | 1 - stable/traccar/{4.0.15 => 4.0.16}/security.md | 0 .../4.0.16}/templates/common.yaml | 0 .../4.0.26 => traccar/4.0.16}/values.yaml | 0 stable/transmission/10.0.6/CHANGELOG.md | 99 + .../1.0.15 => transmission/10.0.6}/CONFIG.md | 0 stable/transmission/10.0.6/Chart.lock | 6 + stable/transmission/10.0.6/Chart.yaml | 30 + stable/transmission/10.0.6/README.md | 38 + stable/transmission/10.0.6/app-readme.md | 3 + .../10.0.6}/charts/common-8.9.24.tgz | Bin stable/transmission/10.0.6/helm-values.md | 34 + stable/transmission/10.0.6/ix_values.yaml | 103 + stable/transmission/10.0.6/questions.yaml | 2339 +++++++++++++++++ stable/transmission/10.0.6/security.md | 176 ++ .../transmission/10.0.6/templates/common.yaml | 2 + .../10.0.6}/values.yaml | 0 stable/truecommand/9.0.25/Chart.lock | 6 - .../{9.0.25 => 9.0.26}/CHANGELOG.md | 20 +- .../1.0.25 => truecommand/9.0.26}/CONFIG.md | 0 stable/truecommand/9.0.26/Chart.lock | 6 + .../truecommand/{9.0.25 => 9.0.26}/Chart.yaml | 2 +- .../truecommand/{9.0.25 => 9.0.26}/README.md | 0 .../{9.0.25 => 9.0.26}/app-readme.md | 0 .../9.0.26}/charts/common-8.9.24.tgz | Bin .../{9.0.25 => 9.0.26}/helm-values.md | 0 .../{9.0.25 => 9.0.26}/ix_values.yaml | 0 .../{9.0.25 => 9.0.26}/questions.yaml | 1 - .../{9.0.25 => 9.0.26}/security.md | 0 .../9.0.26}/templates/common.yaml | 0 .../1.0.25 => truecommand/9.0.26}/values.yaml | 0 stable/tt-rss/4.0.23/Chart.lock | 9 - stable/tt-rss/{4.0.23 => 4.0.24}/CHANGELOG.md | 22 +- .../2.0.5 => tt-rss/4.0.24}/CONFIG.md | 0 stable/tt-rss/4.0.24/Chart.lock | 9 + stable/tt-rss/{4.0.23 => 4.0.24}/Chart.yaml | 2 +- stable/tt-rss/{4.0.23 => 4.0.24}/README.md | 0 .../tt-rss/{4.0.23 => 4.0.24}/app-readme.md | 0 .../4.0.24}/charts/common-8.9.24.tgz | Bin .../4.0.24/charts/postgresql-6.0.34.tgz | Bin 0 -> 72664 bytes .../tt-rss/{4.0.23 => 4.0.24}/helm-values.md | 3 - .../tt-rss/{4.0.23 => 4.0.24}/ix_values.yaml | 2 - .../tt-rss/{4.0.23 => 4.0.24}/questions.yaml | 1 - stable/tt-rss/{4.0.23 => 4.0.24}/security.md | 0 .../{4.0.23 => 4.0.24}/templates/common.yaml | 0 .../2.0.5 => tt-rss/4.0.24}/values.yaml | 0 stable/tvheadend/10.0.25/CHANGELOG.md | 99 + .../2.0.5 => tvheadend/10.0.25}/CONFIG.md | 0 stable/tvheadend/10.0.25/Chart.lock | 6 + stable/tvheadend/10.0.25/Chart.yaml | 30 + stable/tvheadend/10.0.25/README.md | 37 + stable/tvheadend/10.0.25/app-readme.md | 3 + .../10.0.25}/charts/common-8.9.24.tgz | Bin stable/tvheadend/10.0.25/helm-values.md | 31 + stable/tvheadend/10.0.25/ix_values.yaml | 38 + stable/tvheadend/10.0.25/questions.yaml | 1930 ++++++++++++++ stable/tvheadend/10.0.25/security.md | 80 + .../10.0.25}/templates/common.yaml | 0 .../2.0.5 => tvheadend/10.0.25}/values.yaml | 0 stable/twtxt/1.0.24/Chart.lock | 6 - stable/twtxt/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- .../0.0.6 => twtxt/1.0.25}/CONFIG.md | 0 stable/twtxt/1.0.25/Chart.lock | 6 + stable/twtxt/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/twtxt/{1.0.24 => 1.0.25}/README.md | 0 stable/twtxt/{1.0.24 => 1.0.25}/app-readme.md | 0 .../1.0.25}/charts/common-8.9.24.tgz | Bin .../twtxt/{1.0.24 => 1.0.25}/helm-values.md | 0 .../twtxt/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../twtxt/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/twtxt/{1.0.24 => 1.0.25}/security.md | 0 .../{1.0.24 => 1.0.25}/templates/common.yaml | 0 .../0.0.6 => twtxt/1.0.25}/values.yaml | 0 stable/ubooquity/0.0.5/Chart.lock | 6 - .../ubooquity/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + .../1.0.24 => ubooquity/0.0.6}/CONFIG.md | 0 stable/ubooquity/0.0.6/Chart.lock | 6 + stable/ubooquity/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/ubooquity/{0.0.5 => 0.0.6}/README.md | 0 .../ubooquity/{0.0.5 => 0.0.6}/app-readme.md | 0 .../0.0.6}/charts/common-8.9.24.tgz | Bin .../ubooquity/{0.0.5 => 0.0.6}/helm-values.md | 0 .../ubooquity/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../ubooquity/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/ubooquity/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 .../1.0.24 => ubooquity/0.0.6}/values.yaml | 0 stable/unifi/9.0.28/Chart.lock | 6 - stable/unifi/{9.0.28 => 9.0.29}/CHANGELOG.md | 24 +- .../{wikijs/4.0.14 => unifi/9.0.29}/CONFIG.md | 0 stable/unifi/9.0.29/Chart.lock | 6 + stable/unifi/{9.0.28 => 9.0.29}/Chart.yaml | 2 +- stable/unifi/{9.0.28 => 9.0.29}/README.md | 0 stable/unifi/{9.0.28 => 9.0.29}/app-readme.md | 0 .../9.0.29}/charts/common-8.9.24.tgz | Bin .../unifi/{9.0.28 => 9.0.29}/helm-values.md | 4 +- .../unifi/{9.0.28 => 9.0.29}/ix_values.yaml | 9 +- .../unifi/{9.0.28 => 9.0.29}/questions.yaml | 36 - stable/unifi/{9.0.28 => 9.0.29}/security.md | 2 +- .../9.0.29}/templates/common.yaml | 0 .../4.0.14 => unifi/9.0.29}/values.yaml | 0 stable/unpackerr/4.0.26/Chart.lock | 6 - .../unpackerr/{4.0.26 => 4.0.27}/CHANGELOG.md | 18 +- .../0.0.5 => unpackerr/4.0.27}/CONFIG.md | 0 stable/unpackerr/4.0.27/Chart.lock | 6 + .../unpackerr/{4.0.26 => 4.0.27}/Chart.yaml | 2 +- stable/unpackerr/{4.0.26 => 4.0.27}/README.md | 0 .../{4.0.26 => 4.0.27}/app-readme.md | 0 .../4.0.27}/charts/common-8.9.24.tgz | Bin .../{4.0.26 => 4.0.27}/helm-values.md | 0 .../{4.0.26 => 4.0.27}/ix_values.yaml | 0 .../{4.0.26 => 4.0.27}/questions.yaml | 0 .../unpackerr/{4.0.26 => 4.0.27}/security.md | 0 .../4.0.27}/templates/common.yaml | 0 .../0.0.5 => unpackerr/4.0.27}/values.yaml | 0 stable/unpoller/1.0.15/Chart.lock | 6 - .../unpoller/{1.0.15 => 1.0.16}/CHANGELOG.md | 20 +- .../0.0.13 => unpoller/1.0.16}/CONFIG.md | 0 stable/unpoller/1.0.16/Chart.lock | 6 + stable/unpoller/{1.0.15 => 1.0.16}/Chart.yaml | 2 +- stable/unpoller/{1.0.15 => 1.0.16}/README.md | 0 .../unpoller/{1.0.15 => 1.0.16}/app-readme.md | 0 .../1.0.16}/charts/common-8.9.24.tgz | Bin .../{1.0.15 => 1.0.16}/helm-values.md | 2 +- .../{1.0.15 => 1.0.16}/ix_values.yaml | 2 +- .../{1.0.15 => 1.0.16}/questions.yaml | 6 - .../unpoller/{1.0.15 => 1.0.16}/security.md | 0 .../1.0.16}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../0.0.13 => unpoller/1.0.16}/values.yaml | 0 stable/uptime-kuma/1.0.25/Chart.lock | 6 - .../{1.0.25 => 1.0.26}/CHANGELOG.md | 20 +- .../4.0.24 => uptime-kuma/1.0.26}/CONFIG.md | 0 stable/uptime-kuma/1.0.26/Chart.lock | 6 + .../uptime-kuma/{1.0.25 => 1.0.26}/Chart.yaml | 2 +- .../uptime-kuma/{1.0.25 => 1.0.26}/README.md | 0 .../{1.0.25 => 1.0.26}/app-readme.md | 0 .../1.0.26}/charts/common-8.9.24.tgz | Bin .../{1.0.25 => 1.0.26}/helm-values.md | 0 .../{1.0.25 => 1.0.26}/ix_values.yaml | 0 .../{1.0.25 => 1.0.26}/questions.yaml | 1 - .../{1.0.25 => 1.0.26}/security.md | 0 .../1.0.26}/templates/common.yaml | 0 .../4.0.24 => uptime-kuma/1.0.26}/values.yaml | 0 .../uptimerobot-prometheus/2.0.5/Chart.lock | 6 - .../{2.0.5 => 2.0.6}/CHANGELOG.md | 18 +- .../2.0.6}/CONFIG.md | 0 .../uptimerobot-prometheus/2.0.6/Chart.lock | 6 + .../{2.0.5 => 2.0.6}/Chart.yaml | 2 +- .../{2.0.5 => 2.0.6}/README.md | 0 .../{2.0.5 => 2.0.6}/app-readme.md | 0 .../2.0.6}/charts/common-8.9.24.tgz | Bin .../{2.0.5 => 2.0.6}/helm-values.md | 0 .../{2.0.5 => 2.0.6}/ix_values.yaml | 0 .../{2.0.5 => 2.0.6}/questions.yaml | 0 .../{2.0.5 => 2.0.6}/security.md | 0 .../2.0.6}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../2.0.6}/values.yaml | 0 stable/valheim/2.0.5/Chart.lock | 6 - stable/valheim/{2.0.5 => 2.0.6}/CHANGELOG.md | 24 +- stable/{znc/0.0.5 => valheim/2.0.6}/CONFIG.md | 0 stable/valheim/2.0.6/Chart.lock | 6 + stable/valheim/{2.0.5 => 2.0.6}/Chart.yaml | 2 +- stable/valheim/{2.0.5 => 2.0.6}/README.md | 0 stable/valheim/{2.0.5 => 2.0.6}/app-readme.md | 0 .../2.0.6}/charts/common-8.9.24.tgz | Bin .../valheim/{2.0.5 => 2.0.6}/helm-values.md | 0 .../valheim/{2.0.5 => 2.0.6}/ix_values.yaml | 0 .../valheim/{2.0.5 => 2.0.6}/questions.yaml | 50 - stable/valheim/{2.0.5 => 2.0.6}/security.md | 0 .../{2.0.5 => 2.0.6}/templates/common.yaml | 0 .../{znc/0.0.5 => valheim/2.0.6}/values.yaml | 0 stable/vaultwarden/13.0.17/CHANGELOG.md | 99 + .../9.0.30 => vaultwarden/13.0.17}/CONFIG.md | 0 stable/vaultwarden/13.0.17/Chart.lock | 9 + stable/vaultwarden/13.0.17/Chart.yaml | 36 + stable/vaultwarden/13.0.17/README.md | 38 + stable/vaultwarden/13.0.17/app-readme.md | 3 + .../13.0.17}/charts/common-8.9.24.tgz | Bin .../13.0.17/charts/postgresql-6.0.34.tgz | Bin 0 -> 72664 bytes .../13.0.17/ci/default-values.yaml} | 0 .../13.0.17/ci/ingress-values.yaml | 67 + stable/vaultwarden/13.0.17/helm-values.md | 54 + stable/vaultwarden/13.0.17/ix_values.yaml | 154 ++ stable/vaultwarden/13.0.17/questions.yaml | 2213 ++++++++++++++++ stable/vaultwarden/13.0.17/security.md | 880 +++++++ .../13.0.17/templates/_configmap.tpl | 116 + .../13.0.17/templates/_secrets.tpl | 36 + .../13.0.17/templates/_validate.tpl | 17 + .../vaultwarden/13.0.17/templates/common.yaml | 38 + .../13.0.17}/values.yaml | 0 stable/webgrabplus/0.0.6/Chart.lock | 6 - .../webgrabplus/{0.0.6 => 0.0.7}/CHANGELOG.md | 9 + stable/webgrabplus/0.0.7/CONFIG.md | 8 + stable/webgrabplus/0.0.7/Chart.lock | 6 + .../webgrabplus/{0.0.6 => 0.0.7}/Chart.yaml | 2 +- stable/webgrabplus/{0.0.6 => 0.0.7}/README.md | 0 .../{0.0.6 => 0.0.7}/app-readme.md | 0 .../0.0.7/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../{0.0.6 => 0.0.7}/helm-values.md | 0 .../{0.0.6 => 0.0.7}/ix_values.yaml | 0 .../{0.0.6 => 0.0.7}/questions.yaml | 0 .../webgrabplus/{0.0.6 => 0.0.7}/security.md | 0 .../0.0.7}/templates/common.yaml | 0 stable/webgrabplus/0.0.7/values.yaml | 0 stable/whoogle/1.0.24/Chart.lock | 6 - .../whoogle/{1.0.24 => 1.0.25}/CHANGELOG.md | 20 +- stable/whoogle/1.0.25/CONFIG.md | 8 + stable/whoogle/1.0.25/Chart.lock | 6 + stable/whoogle/{1.0.24 => 1.0.25}/Chart.yaml | 2 +- stable/whoogle/{1.0.24 => 1.0.25}/README.md | 0 .../whoogle/{1.0.24 => 1.0.25}/app-readme.md | 0 .../whoogle/1.0.25/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../whoogle/{1.0.24 => 1.0.25}/helm-values.md | 0 .../whoogle/{1.0.24 => 1.0.25}/ix_values.yaml | 0 .../whoogle/{1.0.24 => 1.0.25}/questions.yaml | 1 - stable/whoogle/{1.0.24 => 1.0.25}/security.md | 0 .../1.0.25}/templates/common.yaml | 0 stable/whoogle/1.0.25/values.yaml | 0 stable/wikijs/{4.0.14 => 4.0.15}/CHANGELOG.md | 22 +- stable/wikijs/4.0.15/CONFIG.md | 8 + stable/wikijs/4.0.15/Chart.lock | 9 + stable/wikijs/{4.0.14 => 4.0.15}/Chart.yaml | 2 +- stable/wikijs/{4.0.14 => 4.0.15}/README.md | 0 .../wikijs/{4.0.14 => 4.0.15}/app-readme.md | 0 stable/wikijs/4.0.15/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../4.0.15/charts/postgresql-6.0.34.tgz | Bin 0 -> 72664 bytes .../wikijs/{4.0.14 => 4.0.15}/helm-values.md | 4 - .../wikijs/{4.0.14 => 4.0.15}/ix_values.yaml | 2 - .../wikijs/{4.0.14 => 4.0.15}/questions.yaml | 1 - stable/wikijs/{4.0.14 => 4.0.15}/security.md | 0 .../4.0.15}/templates/common.yaml | 0 stable/wikijs/4.0.15/values.yaml | 0 stable/wireshark/0.0.5/Chart.lock | 6 - .../wireshark/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + stable/wireshark/0.0.6/CONFIG.md | 8 + stable/wireshark/0.0.6/Chart.lock | 6 + stable/wireshark/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/wireshark/{0.0.5 => 0.0.6}/README.md | 0 .../wireshark/{0.0.5 => 0.0.6}/app-readme.md | 0 .../wireshark/0.0.6/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../wireshark/{0.0.5 => 0.0.6}/helm-values.md | 0 .../wireshark/{0.0.5 => 0.0.6}/ix_values.yaml | 0 .../wireshark/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/wireshark/{0.0.5 => 0.0.6}/security.md | 0 .../0.0.6}/templates/common.yaml | 0 stable/wireshark/0.0.6/values.yaml | 0 stable/xbackbone/0.0.13/Chart.lock | 9 - .../xbackbone/{0.0.13 => 0.0.14}/CHANGELOG.md | 18 +- stable/xbackbone/0.0.14/CONFIG.md | 8 + stable/xbackbone/0.0.14/Chart.lock | 9 + .../xbackbone/{0.0.13 => 0.0.14}/Chart.yaml | 2 +- stable/xbackbone/{0.0.13 => 0.0.14}/README.md | 0 .../{0.0.13 => 0.0.14}/app-readme.md | 0 .../xbackbone/0.0.14/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../charts/mariadb-1.0.37.tgz | Bin .../{0.0.13 => 0.0.14}/helm-values.md | 0 .../{0.0.13 => 0.0.14}/ix_values.yaml | 0 .../{0.0.13 => 0.0.14}/questions.yaml | 0 .../xbackbone/{0.0.13 => 0.0.14}/security.md | 0 .../0.0.14}/templates/common.yaml | 0 stable/xbackbone/0.0.14/values.yaml | 0 stable/xteve/4.0.24/Chart.lock | 6 - stable/xteve/{4.0.24 => 4.0.25}/CHANGELOG.md | 20 +- stable/xteve/4.0.25/CONFIG.md | 8 + stable/xteve/4.0.25/Chart.lock | 6 + stable/xteve/{4.0.24 => 4.0.25}/Chart.yaml | 2 +- stable/xteve/{4.0.24 => 4.0.25}/README.md | 0 stable/xteve/{4.0.24 => 4.0.25}/app-readme.md | 0 stable/xteve/4.0.25/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../xteve/{4.0.24 => 4.0.25}/helm-values.md | 0 .../xteve/{4.0.24 => 4.0.25}/ix_values.yaml | 0 .../xteve/{4.0.24 => 4.0.25}/questions.yaml | 1 - stable/xteve/{4.0.24 => 4.0.25}/security.md | 0 stable/xteve/4.0.25/templates/common.yaml | 1 + stable/xteve/4.0.25/values.yaml | 0 stable/zigbee2mqtt/1.0.25/Chart.lock | 6 - .../{1.0.25 => 1.0.26}/CHANGELOG.md | 20 +- stable/zigbee2mqtt/1.0.26/CONFIG.md | 8 + stable/zigbee2mqtt/1.0.26/Chart.lock | 6 + .../zigbee2mqtt/{1.0.25 => 1.0.26}/Chart.yaml | 2 +- .../zigbee2mqtt/{1.0.25 => 1.0.26}/README.md | 0 stable/zigbee2mqtt/1.0.26/SKIPINSTALL | 0 .../{1.0.25 => 1.0.26}/app-readme.md | 0 .../1.0.26/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../{1.0.25 => 1.0.26}/helm-values.md | 0 .../{1.0.25 => 1.0.26}/ix_values.yaml | 0 .../{1.0.25 => 1.0.26}/questions.yaml | 1 - .../{1.0.25 => 1.0.26}/security.md | 0 .../{1.0.25 => 1.0.26}/templates/common.yaml | 0 .../templates/configmap.yaml | 0 stable/zigbee2mqtt/1.0.26/values.yaml | 0 stable/znc/0.0.5/Chart.lock | 6 - stable/znc/{0.0.5 => 0.0.6}/CHANGELOG.md | 9 + stable/znc/0.0.6/CONFIG.md | 8 + stable/znc/0.0.6/Chart.lock | 6 + stable/znc/{0.0.5 => 0.0.6}/Chart.yaml | 2 +- stable/znc/{0.0.5 => 0.0.6}/README.md | 0 stable/znc/{0.0.5 => 0.0.6}/app-readme.md | 0 stable/znc/0.0.6/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes stable/znc/{0.0.5 => 0.0.6}/helm-values.md | 0 stable/znc/{0.0.5 => 0.0.6}/ix_values.yaml | 0 stable/znc/{0.0.5 => 0.0.6}/questions.yaml | 0 stable/znc/{0.0.5 => 0.0.6}/security.md | 0 stable/znc/0.0.6/templates/common.yaml | 1 + stable/znc/0.0.6/values.yaml | 0 stable/zwavejs2mqtt/9.0.30/Chart.lock | 6 - .../{9.0.30 => 9.0.31}/CHANGELOG.md | 22 +- stable/zwavejs2mqtt/9.0.31/CONFIG.md | 8 + stable/zwavejs2mqtt/9.0.31/Chart.lock | 6 + .../{9.0.30 => 9.0.31}/Chart.yaml | 2 +- .../zwavejs2mqtt/{9.0.30 => 9.0.31}/README.md | 0 .../{9.0.30 => 9.0.31}/app-readme.md | 0 .../9.0.31/charts/common-8.9.24.tgz | Bin 0 -> 38123 bytes .../{9.0.30 => 9.0.31}/helm-values.md | 0 .../{9.0.30 => 9.0.31}/ix_values.yaml | 0 .../{9.0.30 => 9.0.31}/questions.yaml | 8 - .../{9.0.30 => 9.0.31}/security.md | 0 .../zwavejs2mqtt/9.0.31/templates/common.yaml | 1 + stable/zwavejs2mqtt/9.0.31/values.yaml | 0 3301 files changed, 34690 insertions(+), 5739 deletions(-) rename core/k8s-gateway/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/CONFIG.md (100%) rename {dependency/memcached/1.0.36 => core/k8s-gateway/4.0.25}/Chart.lock (78%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/README.md (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/app-readme.md (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/charts/common-8.9.24.tgz (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/helm-values.md (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/questions.yaml (99%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/security.md (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/templates/_configmap.tpl (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/templates/common.yaml (100%) rename core/k8s-gateway/{4.0.24 => 4.0.25}/values.yaml (100%) rename core/metallb/{1.0.2 => 1.0.3}/CHANGELOG.md (76%) rename core/metallb/{1.0.2 => 1.0.3}/CONFIG.md (100%) rename core/metallb/{1.0.2 => 1.0.3}/Chart.lock (80%) rename core/metallb/{1.0.2 => 1.0.3}/Chart.yaml (89%) rename core/metallb/{1.0.2 => 1.0.3}/README.md (100%) rename core/metallb/{1.0.2 => 1.0.3}/app-readme.md (100%) rename core/metallb/{1.0.2 => 1.0.3}/charts/metallb-0.11.0.tgz (100%) rename core/metallb/{1.0.2 => 1.0.3}/helm-values.md (100%) rename core/metallb/{1.0.2 => 1.0.3}/ix_values.yaml (100%) rename core/metallb/{1.0.2 => 1.0.3}/questions.yaml (100%) rename core/metallb/{1.0.2 => 1.0.3}/security.md (100%) rename core/metallb/{1.0.2 => 1.0.3}/values.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/CHANGELOG.md (91%) rename core/prometheus/{1.1.22 => 1.1.23}/CONFIG.md (100%) rename core/prometheus/{1.1.22 => 1.1.23}/Chart.lock (88%) rename core/prometheus/{1.1.22 => 1.1.23}/Chart.yaml (98%) rename core/prometheus/{1.1.22 => 1.1.23}/README.md (100%) rename core/prometheus/{1.1.22 => 1.1.23}/app-readme.md (100%) rename core/prometheus/{1.1.22 => 1.1.23}/charts/common-8.9.24.tgz (100%) rename core/prometheus/{1.1.22 => 1.1.23}/charts/kube-state-metrics-2.1.19.tgz (100%) rename core/prometheus/{1.1.22 => 1.1.23}/charts/node-exporter-2.3.17.tgz (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-alertmanager-config.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-alertmanager.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-podmonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-probes.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-prometheus.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-prometheusrules.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/crds/crd-thanosrulers.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/helm-values.md (100%) rename core/prometheus/{1.1.22 => 1.1.23}/ix_values.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/questions.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/security.md (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/_helpers.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/alertmanager/_alertmanager.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/alertmanager/secrets.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/alertmanager/serviceaccount.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/alertmanager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/common.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/core-dns/service.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/core-dns/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-apiserver/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-controller-manager/endpoints.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-controller-manager/service.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-controller-manager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-scheduler/endpoints.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-scheduler/service.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kube-scheduler/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/exporters/kubelet/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/operator/_args.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/operator/configmap.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/operator/servicemonitor.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/_additionalPrometheusRules.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/_additionalScrapeJobs.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/_prometheus.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/_servicemonitor.tpl (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/clusterrole.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/clusterrolebinding.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/templates/prometheus/serviceaccount.yaml (100%) rename core/prometheus/{1.1.22 => 1.1.23}/values.yaml (100%) create mode 100644 core/traefik/10.0.28/CHANGELOG.md rename {dependency/mariadb/1.0.37 => core/traefik/10.0.28}/CONFIG.md (100%) rename core/{k8s-gateway/4.0.24 => traefik/10.0.28}/Chart.lock (78%) create mode 100644 core/traefik/10.0.28/Chart.yaml create mode 100644 core/traefik/10.0.28/README.md create mode 100644 core/traefik/10.0.28/app-readme.md rename {dependency/mariadb/1.0.37 => core/traefik/10.0.28}/charts/common-8.9.24.tgz (100%) create mode 100644 core/traefik/10.0.28/crds/ingressroute.yaml create mode 100644 core/traefik/10.0.28/crds/ingressroutetcp.yaml create mode 100644 core/traefik/10.0.28/crds/ingressrouteudp.yaml create mode 100644 core/traefik/10.0.28/crds/middlewares.yaml create mode 100644 core/traefik/10.0.28/crds/middlewarestcp.yaml create mode 100644 core/traefik/10.0.28/crds/serverstransports.yaml create mode 100644 core/traefik/10.0.28/crds/tlsoptions.yaml create mode 100644 core/traefik/10.0.28/crds/tlsstores.yaml create mode 100644 core/traefik/10.0.28/crds/traefikservices.yaml create mode 100644 core/traefik/10.0.28/helm-values.md create mode 100644 core/traefik/10.0.28/ix_values.yaml create mode 100644 core/traefik/10.0.28/questions.yaml create mode 100644 core/traefik/10.0.28/security.md create mode 100644 core/traefik/10.0.28/templates/_args.tpl create mode 100644 core/traefik/10.0.28/templates/_helpers.tpl create mode 100644 core/traefik/10.0.28/templates/_ingressclass.tpl create mode 100644 core/traefik/10.0.28/templates/_ingressroute.tpl create mode 100644 core/traefik/10.0.28/templates/_portalhook.tpl create mode 100644 core/traefik/10.0.28/templates/_tlsoptions.tpl create mode 100644 core/traefik/10.0.28/templates/common.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/basic-middleware.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/basicauth.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/chain.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/forwardauth.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/ipwhitelist.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/ratelimit.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/redirectScheme.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/redirectregex.yaml create mode 100644 core/traefik/10.0.28/templates/middlewares/tc-nextcloud.yaml rename {dependency/mariadb/1.0.37 => core/traefik/10.0.28}/values.yaml (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/CHANGELOG.md (89%) rename dependency/{memcached/1.0.36 => mariadb/1.0.38}/CONFIG.md (100%) rename dependency/{postgresql/6.0.34 => mariadb/1.0.38}/Chart.lock (78%) rename dependency/mariadb/{1.0.37 => 1.0.38}/Chart.yaml (98%) rename dependency/mariadb/{1.0.37 => 1.0.38}/README.md (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/app-readme.md (100%) rename dependency/{memcached/1.0.36 => mariadb/1.0.38}/charts/common-8.9.24.tgz (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/helm-values.md (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/ix_values.yaml (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/questions.yaml (99%) rename dependency/mariadb/{1.0.37 => 1.0.38}/security.md (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/templates/common.yaml (100%) rename dependency/mariadb/{1.0.37 => 1.0.38}/templates/secret.yaml (100%) rename dependency/{memcached/1.0.36 => mariadb/1.0.38}/values.yaml (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/CHANGELOG.md (89%) rename dependency/{postgresql/6.0.34 => memcached/1.0.37}/CONFIG.md (100%) rename dependency/{mariadb => memcached}/1.0.37/Chart.lock (78%) rename dependency/memcached/{1.0.36 => 1.0.37}/Chart.yaml (97%) rename dependency/memcached/{1.0.36 => 1.0.37}/README.md (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/app-readme.md (100%) rename dependency/{postgresql/6.0.34 => memcached/1.0.37}/charts/common-8.9.24.tgz (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/helm-values.md (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/ix_values.yaml (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/questions.yaml (99%) rename dependency/memcached/{1.0.36 => 1.0.37}/security.md (100%) rename dependency/memcached/{1.0.36 => 1.0.37}/templates/common.yaml (100%) rename dependency/{postgresql/6.0.34 => memcached/1.0.37}/values.yaml (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/CHANGELOG.md (89%) rename dependency/{promtail/1.0.15 => postgresql/6.0.35}/CONFIG.md (100%) create mode 100644 dependency/postgresql/6.0.35/Chart.lock rename dependency/postgresql/{6.0.34 => 6.0.35}/Chart.yaml (97%) rename dependency/postgresql/{6.0.34 => 6.0.35}/README.md (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/app-readme.md (100%) rename dependency/{promtail/1.0.15 => postgresql/6.0.35}/charts/common-8.9.24.tgz (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/helm-values.md (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/ix_values.yaml (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/questions.yaml (99%) rename dependency/postgresql/{6.0.34 => 6.0.35}/security.md (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/templates/backup-postgres-config.yaml (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/templates/common.yaml (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/templates/secret.yaml (100%) rename dependency/postgresql/{6.0.34 => 6.0.35}/templates/upgrade-backup-postgres-hook.yaml (100%) rename dependency/{promtail/1.0.15 => postgresql/6.0.35}/values.yaml (100%) delete mode 100644 dependency/promtail/1.0.15/Chart.lock rename dependency/promtail/{1.0.15 => 1.0.16}/CHANGELOG.md (93%) rename dependency/{redis/1.0.39 => promtail/1.0.16}/CONFIG.md (100%) create mode 100644 dependency/promtail/1.0.16/Chart.lock rename dependency/promtail/{1.0.15 => 1.0.16}/Chart.yaml (98%) rename dependency/promtail/{1.0.15 => 1.0.16}/README.md (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/app-readme.md (100%) rename dependency/{redis/1.0.39 => promtail/1.0.16}/charts/common-8.9.24.tgz (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/helm-values.md (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/ix_values.yaml (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/questions.yaml (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/security.md (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/templates/common.yaml (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/templates/secret.yaml (100%) rename dependency/promtail/{1.0.15 => 1.0.16}/templates/servicemonitor.yaml (100%) rename dependency/{redis/1.0.39 => promtail/1.0.16}/values.yaml (100%) delete mode 100644 dependency/redis/1.0.39/Chart.lock rename dependency/redis/{1.0.39 => 1.0.40}/CHANGELOG.md (89%) rename {incubator/omada-controller/4.0.34 => dependency/redis/1.0.40}/CONFIG.md (100%) create mode 100644 dependency/redis/1.0.40/Chart.lock rename dependency/redis/{1.0.39 => 1.0.40}/Chart.yaml (97%) rename dependency/redis/{1.0.39 => 1.0.40}/README.md (100%) rename dependency/redis/{1.0.39 => 1.0.40}/app-readme.md (100%) rename {incubator/omada-controller/4.0.34 => dependency/redis/1.0.40}/charts/common-8.9.24.tgz (100%) rename dependency/redis/{1.0.39 => 1.0.40}/helm-values.md (100%) rename dependency/redis/{1.0.39 => 1.0.40}/ix_values.yaml (100%) rename dependency/redis/{1.0.39 => 1.0.40}/questions.yaml (99%) rename dependency/redis/{1.0.39 => 1.0.40}/security.md (100%) rename dependency/redis/{1.0.39 => 1.0.40}/templates/common.yaml (100%) rename dependency/redis/{1.0.39 => 1.0.40}/templates/health-configmap.yaml (100%) rename dependency/redis/{1.0.39 => 1.0.40}/templates/secret.yaml (100%) rename {incubator/omada-controller/4.0.34 => dependency/redis/1.0.40}/values.yaml (100%) delete mode 100644 incubator/omada-controller/4.0.34/Chart.lock rename incubator/omada-controller/{4.0.34 => 4.0.35}/CHANGELOG.md (81%) rename incubator/{tdarr-node/1.0.28 => omada-controller/4.0.35}/CONFIG.md (100%) create mode 100644 incubator/omada-controller/4.0.35/Chart.lock rename incubator/omada-controller/{4.0.34 => 4.0.35}/Chart.yaml (97%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/README.md (100%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/app-readme.md (100%) rename incubator/{tdarr-node/1.0.28 => omada-controller/4.0.35}/charts/common-8.9.24.tgz (100%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/helm-values.md (100%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/ix_values.yaml (100%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/questions.yaml (99%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/security.md (99%) rename incubator/omada-controller/{4.0.34 => 4.0.35}/templates/common.yaml (100%) rename incubator/{tdarr-node/1.0.28 => omada-controller/4.0.35}/values.yaml (100%) delete mode 100644 incubator/tdarr-node/1.0.28/Chart.lock rename incubator/tdarr-node/{1.0.28 => 1.0.29}/CHANGELOG.md (78%) rename incubator/{tdarr/1.0.28 => tdarr-node/1.0.29}/CONFIG.md (100%) rename {stable/couchpotato/0.0.5 => incubator/tdarr-node/1.0.29}/Chart.lock (79%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/Chart.yaml (97%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/README.md (100%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/app-readme.md (100%) rename incubator/{tdarr/1.0.28 => tdarr-node/1.0.29}/charts/common-8.9.24.tgz (100%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/helm-values.md (100%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/questions.yaml (99%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/security.md (100%) rename incubator/tdarr-node/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename incubator/{tdarr/1.0.28 => tdarr-node/1.0.29}/values.yaml (100%) delete mode 100644 incubator/tdarr/1.0.28/Chart.lock rename incubator/tdarr/{1.0.28 => 1.0.29}/CHANGELOG.md (78%) rename {stable/airsonic/4.0.26 => incubator/tdarr/1.0.29}/CONFIG.md (100%) create mode 100644 incubator/tdarr/1.0.29/Chart.lock rename incubator/tdarr/{1.0.28 => 1.0.29}/Chart.yaml (97%) rename incubator/tdarr/{1.0.28 => 1.0.29}/README.md (100%) rename incubator/tdarr/{1.0.28 => 1.0.29}/app-readme.md (100%) rename {stable/airsonic/4.0.26 => incubator/tdarr/1.0.29}/charts/common-8.9.24.tgz (100%) rename incubator/tdarr/{1.0.28 => 1.0.29}/helm-values.md (100%) rename incubator/tdarr/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename incubator/tdarr/{1.0.28 => 1.0.29}/questions.yaml (98%) rename incubator/tdarr/{1.0.28 => 1.0.29}/security.md (100%) rename incubator/tdarr/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename {stable/airsonic/4.0.26 => incubator/tdarr/1.0.29}/values.yaml (100%) delete mode 100644 stable/airsonic/4.0.26/Chart.lock rename stable/airsonic/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{amcrest2mqtt/2.0.26 => airsonic/4.0.27}/CONFIG.md (100%) create mode 100644 stable/airsonic/4.0.27/Chart.lock rename stable/airsonic/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/airsonic/{4.0.26 => 4.0.27}/README.md (100%) rename stable/airsonic/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{amcrest2mqtt/2.0.26 => airsonic/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/airsonic/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/airsonic/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/airsonic/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/airsonic/{4.0.26 => 4.0.27}/security.md (100%) rename stable/airsonic/{4.0.26 => 4.0.27}/templates/common.yaml (100%) rename stable/{amcrest2mqtt/2.0.26 => airsonic/4.0.27}/values.yaml (100%) delete mode 100644 stable/amcrest2mqtt/2.0.26/Chart.lock rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/CHANGELOG.md (93%) rename stable/{anonaddy/6.0.16 => amcrest2mqtt/2.0.27}/CONFIG.md (100%) create mode 100644 stable/amcrest2mqtt/2.0.27/Chart.lock rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/Chart.yaml (97%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/README.md (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/app-readme.md (100%) rename stable/{anonaddy/6.0.16 => amcrest2mqtt/2.0.27}/charts/common-8.9.24.tgz (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/helm-values.md (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/ix_values.yaml (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/questions.yaml (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/security.md (100%) rename stable/amcrest2mqtt/{2.0.26 => 2.0.27}/templates/common.yaml (100%) rename stable/{anonaddy/6.0.16 => amcrest2mqtt/2.0.27}/values.yaml (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/CHANGELOG.md (91%) rename stable/{apache-musicindex/2.0.24 => anonaddy/6.0.17}/CONFIG.md (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/Chart.lock (87%) rename stable/anonaddy/{6.0.16 => 6.0.17}/Chart.yaml (98%) rename stable/anonaddy/{6.0.16 => 6.0.17}/README.md (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/app-readme.md (100%) rename stable/{apache-musicindex/2.0.24 => anonaddy/6.0.17}/charts/common-8.9.24.tgz (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/charts/mariadb-1.0.37.tgz (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/charts/redis-1.0.39.tgz (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/helm-values.md (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/ix_values.yaml (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/questions.yaml (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/security.md (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/templates/_appkey.tpl (100%) rename stable/anonaddy/{6.0.16 => 6.0.17}/templates/common.yaml (100%) rename stable/{apache-musicindex/2.0.24 => anonaddy/6.0.17}/values.yaml (100%) delete mode 100644 stable/apache-musicindex/2.0.24/Chart.lock rename stable/apache-musicindex/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{appdaemon/7.0.5 => apache-musicindex/2.0.25}/CONFIG.md (100%) rename stable/{dillinger/0.0.5 => apache-musicindex/2.0.25}/Chart.lock (79%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/README.md (100%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{appdaemon/7.0.5 => apache-musicindex/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/security.md (100%) rename stable/apache-musicindex/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{appdaemon/7.0.5 => apache-musicindex/2.0.25}/values.yaml (100%) delete mode 100644 stable/appdaemon/7.0.5/Chart.lock rename stable/appdaemon/{7.0.5 => 7.0.6}/CHANGELOG.md (91%) rename stable/{aria2/3.0.5 => appdaemon/7.0.6}/CONFIG.md (100%) create mode 100644 stable/appdaemon/7.0.6/Chart.lock rename stable/appdaemon/{7.0.5 => 7.0.6}/Chart.yaml (98%) rename stable/appdaemon/{7.0.5 => 7.0.6}/README.md (100%) rename stable/appdaemon/{7.0.5 => 7.0.6}/app-readme.md (100%) rename stable/{aria2/3.0.5 => appdaemon/7.0.6}/charts/common-8.9.24.tgz (100%) rename stable/appdaemon/{7.0.5 => 7.0.6}/helm-values.md (100%) rename stable/appdaemon/{7.0.5 => 7.0.6}/ix_values.yaml (100%) rename stable/appdaemon/{7.0.5 => 7.0.6}/questions.yaml (99%) rename stable/appdaemon/{7.0.5 => 7.0.6}/security.md (100%) rename stable/appdaemon/{7.0.5 => 7.0.6}/templates/common.yaml (100%) rename stable/{aria2/3.0.5 => appdaemon/7.0.6}/values.yaml (100%) delete mode 100644 stable/aria2/3.0.5/Chart.lock rename stable/aria2/{3.0.5 => 3.0.6}/CHANGELOG.md (82%) rename stable/{audacity/2.0.24 => aria2/3.0.6}/CONFIG.md (100%) create mode 100644 stable/aria2/3.0.6/Chart.lock rename stable/aria2/{3.0.5 => 3.0.6}/Chart.yaml (97%) rename stable/aria2/{3.0.5 => 3.0.6}/README.md (100%) rename stable/aria2/{3.0.5 => 3.0.6}/app-readme.md (100%) rename stable/{audacity/2.0.24 => aria2/3.0.6}/charts/common-8.9.24.tgz (100%) rename stable/aria2/{3.0.5 => 3.0.6}/helm-values.md (100%) rename stable/aria2/{3.0.5 => 3.0.6}/ix_values.yaml (100%) rename stable/aria2/{3.0.5 => 3.0.6}/questions.yaml (99%) rename stable/aria2/{3.0.5 => 3.0.6}/security.md (100%) rename stable/aria2/{3.0.5 => 3.0.6}/templates/common.yaml (100%) rename stable/{audacity/2.0.24 => aria2/3.0.6}/values.yaml (100%) delete mode 100644 stable/audacity/2.0.24/Chart.lock rename stable/audacity/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{authelia/8.0.19 => audacity/2.0.25}/CONFIG.md (100%) create mode 100644 stable/audacity/2.0.25/Chart.lock rename stable/audacity/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/audacity/{2.0.24 => 2.0.25}/README.md (100%) rename stable/audacity/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{authelia/8.0.19 => audacity/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/audacity/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/audacity/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/audacity/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/audacity/{2.0.24 => 2.0.25}/security.md (100%) rename stable/audacity/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{authelia/8.0.19 => audacity/2.0.25}/values.yaml (100%) rename stable/authelia/{8.0.19 => 8.0.20}/CHANGELOG.md (86%) rename stable/{babybuddy/5.0.20 => authelia/8.0.20}/CONFIG.md (100%) rename stable/authelia/{8.0.19 => 8.0.20}/Chart.lock (87%) rename stable/authelia/{8.0.19 => 8.0.20}/Chart.yaml (98%) rename stable/authelia/{8.0.19 => 8.0.20}/README.md (100%) rename stable/authelia/{8.0.19 => 8.0.20}/app-readme.md (100%) rename stable/{babybuddy/5.0.20 => authelia/8.0.20}/charts/common-8.9.24.tgz (100%) rename stable/authelia/{8.0.19 => 8.0.20}/charts/postgresql-6.0.34.tgz (100%) rename stable/authelia/{8.0.19 => 8.0.20}/charts/redis-1.0.39.tgz (100%) rename stable/authelia/{8.0.19 => 8.0.20}/helm-values.md (100%) rename stable/authelia/{8.0.19 => 8.0.20}/ix_values.yaml (100%) rename stable/authelia/{8.0.19 => 8.0.20}/questions.yaml (99%) rename stable/authelia/{8.0.19 => 8.0.20}/security.md (100%) rename stable/authelia/{8.0.19 => 8.0.20}/templates/_configmap.tpl (100%) rename stable/authelia/{8.0.19 => 8.0.20}/templates/_secrets.tpl (100%) rename stable/authelia/{8.0.19 => 8.0.20}/templates/common.yaml (100%) rename stable/{babybuddy/5.0.20 => authelia/8.0.20}/values.yaml (100%) rename stable/babybuddy/{5.0.20 => 5.0.21}/CHANGELOG.md (88%) rename stable/{bazarr/9.0.26 => babybuddy/5.0.21}/CONFIG.md (100%) rename stable/{dsmr-reader/5.0.14 => babybuddy/5.0.21}/Chart.lock (84%) rename stable/babybuddy/{5.0.20 => 5.0.21}/Chart.yaml (98%) rename stable/babybuddy/{5.0.20 => 5.0.21}/README.md (100%) rename stable/babybuddy/{5.0.20 => 5.0.21}/app-readme.md (100%) rename stable/{bazarr/9.0.26 => babybuddy/5.0.21}/charts/common-8.9.24.tgz (100%) rename stable/babybuddy/{5.0.20 => 5.0.21}/charts/postgresql-6.0.34.tgz (100%) rename stable/babybuddy/{5.0.20 => 5.0.21}/helm-values.md (87%) rename stable/babybuddy/{5.0.20 => 5.0.21}/ix_values.yaml (97%) rename stable/babybuddy/{5.0.20 => 5.0.21}/questions.yaml (99%) rename stable/babybuddy/{5.0.20 => 5.0.21}/security.md (100%) rename stable/babybuddy/{5.0.20 => 5.0.21}/templates/common.yaml (100%) rename stable/{bazarr/9.0.26 => babybuddy/5.0.21}/values.yaml (100%) delete mode 100644 stable/bazarr/9.0.26/Chart.lock rename stable/bazarr/{9.0.26 => 9.0.27}/CHANGELOG.md (90%) rename stable/{beets/2.0.27 => bazarr/9.0.27}/CONFIG.md (100%) create mode 100644 stable/bazarr/9.0.27/Chart.lock rename stable/bazarr/{9.0.26 => 9.0.27}/Chart.yaml (98%) rename stable/bazarr/{9.0.26 => 9.0.27}/README.md (100%) rename stable/bazarr/{9.0.26 => 9.0.27}/app-readme.md (100%) rename stable/{beets/2.0.27 => bazarr/9.0.27}/charts/common-8.9.24.tgz (100%) rename stable/bazarr/{9.0.26 => 9.0.27}/helm-values.md (100%) rename stable/bazarr/{9.0.26 => 9.0.27}/ix_values.yaml (100%) rename stable/bazarr/{9.0.26 => 9.0.27}/questions.yaml (99%) rename stable/bazarr/{9.0.26 => 9.0.27}/security.md (100%) rename stable/bazarr/{9.0.26 => 9.0.27}/templates/common.yaml (100%) rename stable/{beets/2.0.27 => bazarr/9.0.27}/values.yaml (100%) delete mode 100644 stable/beets/2.0.27/Chart.lock rename stable/beets/{2.0.27 => 2.0.28}/CHANGELOG.md (89%) rename stable/{blog/0.0.14 => beets/2.0.28}/CONFIG.md (100%) create mode 100644 stable/beets/2.0.28/Chart.lock rename stable/beets/{2.0.27 => 2.0.28}/Chart.yaml (97%) rename stable/beets/{2.0.27 => 2.0.28}/README.md (100%) rename stable/beets/{2.0.27 => 2.0.28}/app-readme.md (100%) rename stable/{blog/0.0.14 => beets/2.0.28}/charts/common-8.9.24.tgz (100%) rename stable/beets/{2.0.27 => 2.0.28}/helm-values.md (100%) rename stable/beets/{2.0.27 => 2.0.28}/ix_values.yaml (100%) rename stable/beets/{2.0.27 => 2.0.28}/questions.yaml (99%) rename stable/beets/{2.0.27 => 2.0.28}/security.md (100%) rename stable/beets/{2.0.27 => 2.0.28}/templates/common.yaml (100%) rename stable/{blog/0.0.14 => beets/2.0.28}/values.yaml (100%) rename stable/blog/{0.0.14 => 0.0.15}/CHANGELOG.md (92%) rename stable/{boinc/0.0.5 => blog/0.0.15}/CONFIG.md (100%) rename stable/{etherpad/5.0.15 => blog/0.0.15}/Chart.lock (84%) rename stable/blog/{0.0.14 => 0.0.15}/Chart.yaml (98%) rename stable/blog/{0.0.14 => 0.0.15}/README.md (100%) rename stable/blog/{0.0.14 => 0.0.15}/app-readme.md (100%) rename stable/{boinc/0.0.5 => blog/0.0.15}/charts/common-8.9.24.tgz (100%) rename stable/blog/{0.0.14 => 0.0.15}/charts/postgresql-6.0.34.tgz (100%) rename stable/blog/{0.0.14 => 0.0.15}/helm-values.md (100%) rename stable/blog/{0.0.14 => 0.0.15}/ix_values.yaml (100%) rename stable/blog/{0.0.14 => 0.0.15}/questions.yaml (100%) rename stable/blog/{0.0.14 => 0.0.15}/security.md (100%) rename stable/blog/{0.0.14 => 0.0.15}/templates/common.yaml (100%) rename stable/{boinc/0.0.5 => blog/0.0.15}/values.yaml (100%) delete mode 100644 stable/boinc/0.0.5/Chart.lock rename stable/boinc/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{booksonic-air/4.0.26 => boinc/0.0.6}/CONFIG.md (100%) create mode 100644 stable/boinc/0.0.6/Chart.lock rename stable/boinc/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/boinc/{0.0.5 => 0.0.6}/README.md (100%) rename stable/boinc/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{booksonic-air/4.0.26 => boinc/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/boinc/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/boinc/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/boinc/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/boinc/{0.0.5 => 0.0.6}/security.md (100%) rename stable/boinc/{0.0.5 => 0.0.6}/templates/common.yaml (100%) rename stable/{booksonic-air/4.0.26 => boinc/0.0.6}/values.yaml (100%) delete mode 100644 stable/booksonic-air/4.0.26/Chart.lock rename stable/booksonic-air/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{bookstack/0.0.14 => booksonic-air/4.0.27}/CONFIG.md (100%) create mode 100644 stable/booksonic-air/4.0.27/Chart.lock rename stable/booksonic-air/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/README.md (100%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{bookstack/0.0.14 => booksonic-air/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/security.md (99%) rename stable/booksonic-air/{4.0.26 => 4.0.27}/templates/common.yaml (100%) rename stable/{bookstack/0.0.14 => booksonic-air/4.0.27}/values.yaml (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/CHANGELOG.md (94%) rename stable/{calibre-web/9.0.24 => bookstack/0.0.15}/CONFIG.md (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/Chart.lock (84%) rename stable/bookstack/{0.0.14 => 0.0.15}/Chart.yaml (98%) rename stable/bookstack/{0.0.14 => 0.0.15}/README.md (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/app-readme.md (100%) rename stable/{calibre-web/9.0.24 => bookstack/0.0.15}/charts/common-8.9.24.tgz (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/charts/mariadb-1.0.37.tgz (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/helm-values.md (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/ix_values.yaml (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/questions.yaml (100%) rename stable/bookstack/{0.0.14 => 0.0.15}/security.md (99%) rename stable/bookstack/{0.0.14 => 0.0.15}/templates/common.yaml (100%) rename stable/{calibre-web/9.0.24 => bookstack/0.0.15}/values.yaml (100%) delete mode 100644 stable/calibre-web/9.0.24/Chart.lock rename stable/calibre-web/{9.0.24 => 9.0.25}/CHANGELOG.md (90%) rename stable/{calibre/5.0.5 => calibre-web/9.0.25}/CONFIG.md (100%) create mode 100644 stable/calibre-web/9.0.25/Chart.lock rename stable/calibre-web/{9.0.24 => 9.0.25}/Chart.yaml (98%) rename stable/calibre-web/{9.0.24 => 9.0.25}/README.md (100%) rename stable/calibre-web/{9.0.24 => 9.0.25}/app-readme.md (100%) rename stable/{calibre/5.0.5 => calibre-web/9.0.25}/charts/common-8.9.24.tgz (100%) rename stable/calibre-web/{9.0.24 => 9.0.25}/helm-values.md (100%) rename stable/calibre-web/{9.0.24 => 9.0.25}/ix_values.yaml (100%) rename stable/calibre-web/{9.0.24 => 9.0.25}/questions.yaml (99%) rename stable/calibre-web/{9.0.24 => 9.0.25}/security.md (100%) rename stable/calibre-web/{9.0.24 => 9.0.25}/templates/common.yaml (100%) rename stable/{calibre/5.0.5 => calibre-web/9.0.25}/values.yaml (100%) delete mode 100644 stable/calibre/5.0.5/Chart.lock rename stable/calibre/{5.0.5 => 5.0.6}/CHANGELOG.md (86%) rename stable/{chevereto/0.0.6 => calibre/5.0.6}/CONFIG.md (100%) create mode 100644 stable/calibre/5.0.6/Chart.lock rename stable/calibre/{5.0.5 => 5.0.6}/Chart.yaml (97%) rename stable/calibre/{5.0.5 => 5.0.6}/README.md (100%) rename stable/calibre/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{chevereto/0.0.6 => calibre/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/calibre/{5.0.5 => 5.0.6}/helm-values.md (100%) rename stable/calibre/{5.0.5 => 5.0.6}/ix_values.yaml (100%) rename stable/calibre/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/calibre/{5.0.5 => 5.0.6}/security.md (100%) rename stable/calibre/{5.0.5 => 5.0.6}/templates/common.yaml (100%) rename stable/{chevereto/0.0.6 => calibre/5.0.6}/values.yaml (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{clarkson/0.0.15 => chevereto/0.0.7}/CONFIG.md (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/Chart.lock (84%) rename stable/chevereto/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/chevereto/{0.0.6 => 0.0.7}/README.md (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{clarkson/0.0.15 => chevereto/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/charts/mariadb-1.0.37.tgz (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/security.md (100%) rename stable/chevereto/{0.0.6 => 0.0.7}/templates/common.yaml (100%) rename stable/{clarkson/0.0.15 => chevereto/0.0.7}/values.yaml (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/CHANGELOG.md (92%) rename stable/{cloud9/2.0.27 => clarkson/0.0.16}/CONFIG.md (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/Chart.lock (84%) rename stable/clarkson/{0.0.15 => 0.0.16}/Chart.yaml (98%) rename stable/clarkson/{0.0.15 => 0.0.16}/README.md (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/app-readme.md (100%) rename stable/{cloud9/2.0.27 => clarkson/0.0.16}/charts/common-8.9.24.tgz (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/charts/mariadb-1.0.37.tgz (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/helm-values.md (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/ix_values.yaml (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/questions.yaml (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/security.md (100%) rename stable/clarkson/{0.0.15 => 0.0.16}/templates/common.yaml (100%) rename stable/{cloud9/2.0.27 => clarkson/0.0.16}/values.yaml (100%) delete mode 100644 stable/cloud9/2.0.27/Chart.lock rename stable/cloud9/{2.0.27 => 2.0.28}/CHANGELOG.md (90%) rename stable/{code-server/2.1.7 => cloud9/2.0.28}/CONFIG.md (100%) create mode 100644 stable/cloud9/2.0.28/Chart.lock rename stable/cloud9/{2.0.27 => 2.0.28}/Chart.yaml (97%) rename stable/cloud9/{2.0.27 => 2.0.28}/README.md (100%) rename stable/cloud9/{2.0.27 => 2.0.28}/app-readme.md (100%) rename stable/{code-server/2.1.7 => cloud9/2.0.28}/charts/common-8.9.24.tgz (100%) rename stable/cloud9/{2.0.27 => 2.0.28}/helm-values.md (100%) rename stable/cloud9/{2.0.27 => 2.0.28}/ix_values.yaml (100%) rename stable/cloud9/{2.0.27 => 2.0.28}/questions.yaml (99%) rename stable/cloud9/{2.0.27 => 2.0.28}/security.md (100%) rename stable/cloud9/{2.0.27 => 2.0.28}/templates/common.yaml (100%) rename stable/{code-server/2.1.7 => cloud9/2.0.28}/values.yaml (100%) delete mode 100644 stable/code-server/2.1.7/Chart.lock rename stable/code-server/{2.1.7 => 2.1.8}/CHANGELOG.md (89%) rename stable/{couchpotato/0.0.5 => code-server/2.1.8}/CONFIG.md (100%) create mode 100644 stable/code-server/2.1.8/Chart.lock rename stable/code-server/{2.1.7 => 2.1.8}/Chart.yaml (97%) rename stable/code-server/{2.1.7 => 2.1.8}/README.md (100%) rename stable/code-server/{2.1.7 => 2.1.8}/app-readme.md (100%) rename stable/{couchpotato/0.0.5 => code-server/2.1.8}/charts/common-8.9.24.tgz (100%) rename stable/code-server/{2.1.7 => 2.1.8}/helm-values.md (100%) rename stable/code-server/{2.1.7 => 2.1.8}/ix_values.yaml (100%) rename stable/code-server/{2.1.7 => 2.1.8}/questions.yaml (99%) rename stable/code-server/{2.1.7 => 2.1.8}/security.md (100%) rename stable/code-server/{2.1.7 => 2.1.8}/templates/common.yaml (100%) rename stable/{couchpotato/0.0.5 => code-server/2.1.8}/values.yaml (100%) create mode 100644 stable/collabora-online/10.0.6/CHANGELOG.md rename stable/{cryptofolio/2.0.24 => collabora-online/10.0.6}/CONFIG.md (100%) create mode 100644 stable/collabora-online/10.0.6/Chart.lock create mode 100644 stable/collabora-online/10.0.6/Chart.yaml create mode 100644 stable/collabora-online/10.0.6/README.md create mode 100644 stable/collabora-online/10.0.6/app-readme.md rename stable/{cryptofolio/2.0.24 => collabora-online/10.0.6}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/collabora-online/10.0.6/helm-values.md create mode 100644 stable/collabora-online/10.0.6/ix_values.yaml create mode 100644 stable/collabora-online/10.0.6/questions.yaml create mode 100644 stable/collabora-online/10.0.6/security.md rename stable/{couchpotato/0.0.5 => collabora-online/10.0.6}/templates/common.yaml (100%) rename stable/{cryptofolio/2.0.24 => collabora-online/10.0.6}/values.yaml (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{custom-app/3.0.42 => couchpotato/0.0.6}/CONFIG.md (100%) create mode 100644 stable/couchpotato/0.0.6/Chart.lock rename stable/couchpotato/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/couchpotato/{0.0.5 => 0.0.6}/README.md (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{custom-app/3.0.42 => couchpotato/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/couchpotato/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{cryptofolio/2.0.24 => couchpotato/0.0.6}/templates/common.yaml (100%) rename stable/{custom-app/3.0.42 => couchpotato/0.0.6}/values.yaml (100%) delete mode 100644 stable/cryptofolio/2.0.24/Chart.lock rename stable/cryptofolio/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{darktable/0.0.5 => cryptofolio/2.0.25}/CONFIG.md (100%) create mode 100644 stable/cryptofolio/2.0.25/Chart.lock rename stable/cryptofolio/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/README.md (100%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{darktable/0.0.5 => cryptofolio/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/cryptofolio/{2.0.24 => 2.0.25}/security.md (100%) rename stable/{custom-app/3.0.42 => cryptofolio/2.0.25}/templates/common.yaml (100%) rename stable/{darktable/0.0.5 => cryptofolio/2.0.25}/values.yaml (100%) delete mode 100644 stable/custom-app/3.0.42/Chart.lock rename stable/custom-app/{3.0.42 => 3.0.43}/CHANGELOG.md (92%) rename stable/{davos/2.0.24 => custom-app/3.0.43}/CONFIG.md (100%) create mode 100644 stable/custom-app/3.0.43/Chart.lock rename stable/custom-app/{3.0.42 => 3.0.43}/Chart.yaml (97%) rename stable/custom-app/{3.0.42 => 3.0.43}/README.md (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/app-readme.md (100%) rename stable/{davos/2.0.24 => custom-app/3.0.43}/charts/common-8.9.24.tgz (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/ci/test-values.yaml (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/helm-values.md (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/ix_values.yaml (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/questions.yaml (100%) rename stable/custom-app/{3.0.42 => 3.0.43}/security.md (100%) rename stable/{darktable/0.0.5 => custom-app/3.0.43}/templates/common.yaml (100%) rename stable/{davos/2.0.24 => custom-app/3.0.43}/values.yaml (100%) delete mode 100644 stable/darktable/0.0.5/Chart.lock rename stable/darktable/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{ddclient/0.0.5 => darktable/0.0.6}/CONFIG.md (100%) create mode 100644 stable/darktable/0.0.6/Chart.lock rename stable/darktable/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/darktable/{0.0.5 => 0.0.6}/README.md (100%) rename stable/darktable/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{ddclient/0.0.5 => darktable/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/darktable/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/darktable/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/darktable/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/darktable/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{ddclient/0.0.5 => darktable/0.0.6}/templates/common.yaml (100%) rename stable/{ddclient/0.0.5 => darktable/0.0.6}/values.yaml (100%) delete mode 100644 stable/davos/2.0.24/Chart.lock rename stable/davos/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{deconz/6.0.5 => davos/2.0.25}/CONFIG.md (100%) create mode 100644 stable/davos/2.0.25/Chart.lock rename stable/davos/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/davos/{2.0.24 => 2.0.25}/README.md (100%) rename stable/davos/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{deconz/6.0.5 => davos/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/davos/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/davos/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/davos/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/davos/{2.0.24 => 2.0.25}/security.md (99%) rename stable/davos/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{deconz/6.0.5 => davos/2.0.25}/values.yaml (100%) delete mode 100644 stable/ddclient/0.0.5/Chart.lock rename stable/ddclient/{0.0.5 => 0.0.6}/CHANGELOG.md (87%) rename stable/{deepstack-cpu/8.0.6 => ddclient/0.0.6}/CONFIG.md (100%) create mode 100644 stable/ddclient/0.0.6/Chart.lock rename stable/ddclient/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/ddclient/{0.0.5 => 0.0.6}/README.md (100%) rename stable/ddclient/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{deepstack-cpu/8.0.6 => ddclient/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/ddclient/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/ddclient/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/ddclient/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/ddclient/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{deconz/6.0.5 => ddclient/0.0.6}/templates/common.yaml (100%) rename stable/{deepstack-cpu/8.0.6 => ddclient/0.0.6}/values.yaml (100%) delete mode 100644 stable/deconz/6.0.5/Chart.lock rename stable/deconz/{6.0.5 => 6.0.6}/CHANGELOG.md (85%) rename stable/{deepstack-gpu/3.0.6 => deconz/6.0.6}/CONFIG.md (100%) create mode 100644 stable/deconz/6.0.6/Chart.lock rename stable/deconz/{6.0.5 => 6.0.6}/Chart.yaml (98%) rename stable/deconz/{6.0.5 => 6.0.6}/README.md (100%) rename stable/deconz/{6.0.5 => 6.0.6}/app-readme.md (100%) rename stable/{deepstack-gpu/3.0.6 => deconz/6.0.6}/charts/common-8.9.24.tgz (100%) rename stable/deconz/{6.0.5 => 6.0.6}/ci/test-values.yaml (100%) rename stable/deconz/{6.0.5 => 6.0.6}/helm-values.md (100%) rename stable/deconz/{6.0.5 => 6.0.6}/ix_values.yaml (100%) rename stable/deconz/{6.0.5 => 6.0.6}/questions.yaml (99%) rename stable/deconz/{6.0.5 => 6.0.6}/security.md (100%) rename stable/{deepstack-cpu/8.0.6 => deconz/6.0.6}/templates/common.yaml (100%) rename stable/{deepstack-gpu/3.0.6 => deconz/6.0.6}/values.yaml (100%) delete mode 100644 stable/deepstack-cpu/8.0.6/Chart.lock rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/CHANGELOG.md (88%) rename stable/{deluge/9.0.25 => deepstack-cpu/8.0.7}/CONFIG.md (100%) create mode 100644 stable/deepstack-cpu/8.0.7/Chart.lock rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/Chart.yaml (98%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/README.md (100%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/app-readme.md (100%) rename stable/{deluge/9.0.25 => deepstack-cpu/8.0.7}/charts/common-8.9.24.tgz (100%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/helm-values.md (96%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/ix_values.yaml (94%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/questions.yaml (99%) rename stable/deepstack-cpu/{8.0.6 => 8.0.7}/security.md (100%) rename stable/{deepstack-gpu/3.0.6 => deepstack-cpu/8.0.7}/templates/common.yaml (100%) rename stable/{deluge/9.0.25 => deepstack-cpu/8.0.7}/values.yaml (100%) delete mode 100644 stable/deepstack-gpu/3.0.6/Chart.lock rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/CHANGELOG.md (88%) rename stable/{digikam/2.0.26 => deepstack-gpu/3.0.7}/CONFIG.md (100%) create mode 100644 stable/deepstack-gpu/3.0.7/Chart.lock rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/Chart.yaml (98%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/README.md (100%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/app-readme.md (100%) rename stable/{digikam/2.0.26 => deepstack-gpu/3.0.7}/charts/common-8.9.24.tgz (100%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/helm-values.md (96%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/ix_values.yaml (94%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/questions.yaml (99%) rename stable/deepstack-gpu/{3.0.6 => 3.0.7}/security.md (100%) rename stable/{deluge/9.0.25 => deepstack-gpu/3.0.7}/templates/common.yaml (100%) rename stable/{digikam/2.0.26 => deepstack-gpu/3.0.7}/values.yaml (100%) delete mode 100644 stable/deluge/9.0.25/Chart.lock rename stable/deluge/{9.0.25 => 9.0.26}/CHANGELOG.md (85%) rename stable/{dillinger/0.0.5 => deluge/9.0.26}/CONFIG.md (100%) create mode 100644 stable/deluge/9.0.26/Chart.lock rename stable/deluge/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/deluge/{9.0.25 => 9.0.26}/README.md (100%) rename stable/deluge/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{dillinger/0.0.5 => deluge/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/deluge/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/deluge/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/deluge/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/deluge/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{dillinger/0.0.5 => deluge/9.0.26}/templates/common.yaml (100%) rename stable/{dillinger/0.0.5 => deluge/9.0.26}/values.yaml (100%) delete mode 100644 stable/digikam/2.0.26/Chart.lock rename stable/digikam/{2.0.26 => 2.0.27}/CHANGELOG.md (90%) rename stable/{dizquetv/5.0.5 => digikam/2.0.27}/CONFIG.md (100%) create mode 100644 stable/digikam/2.0.27/Chart.lock rename stable/digikam/{2.0.26 => 2.0.27}/Chart.yaml (97%) rename stable/digikam/{2.0.26 => 2.0.27}/README.md (100%) rename stable/digikam/{2.0.26 => 2.0.27}/app-readme.md (100%) rename stable/{dizquetv/5.0.5 => digikam/2.0.27}/charts/common-8.9.24.tgz (100%) rename stable/digikam/{2.0.26 => 2.0.27}/helm-values.md (100%) rename stable/digikam/{2.0.26 => 2.0.27}/ix_values.yaml (100%) rename stable/digikam/{2.0.26 => 2.0.27}/questions.yaml (99%) rename stable/digikam/{2.0.26 => 2.0.27}/security.md (100%) rename stable/digikam/{2.0.26 => 2.0.27}/templates/common.yaml (100%) rename stable/{dizquetv/5.0.5 => digikam/2.0.27}/values.yaml (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{dokuwiki/0.0.5 => dillinger/0.0.6}/CONFIG.md (100%) create mode 100644 stable/dillinger/0.0.6/Chart.lock rename stable/dillinger/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/dillinger/{0.0.5 => 0.0.6}/README.md (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{dokuwiki/0.0.5 => dillinger/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/dillinger/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{dizquetv/5.0.5 => dillinger/0.0.6}/templates/common.yaml (100%) rename stable/{dokuwiki/0.0.5 => dillinger/0.0.6}/values.yaml (100%) rename stable/dizquetv/{5.0.5 => 5.0.6}/CHANGELOG.md (90%) rename stable/{domoticz/0.0.7 => dizquetv/5.0.6}/CONFIG.md (100%) create mode 100644 stable/dizquetv/5.0.6/Chart.lock rename stable/dizquetv/{5.0.5 => 5.0.6}/Chart.yaml (97%) rename stable/dizquetv/{5.0.5 => 5.0.6}/README.md (100%) rename stable/dizquetv/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{domoticz/0.0.7 => dizquetv/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/dizquetv/{5.0.5 => 5.0.6}/helm-values.md (100%) rename stable/dizquetv/{5.0.5 => 5.0.6}/ix_values.yaml (100%) rename stable/dizquetv/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/dizquetv/{5.0.5 => 5.0.6}/security.md (100%) rename stable/{dokuwiki/0.0.5 => dizquetv/5.0.6}/templates/common.yaml (100%) rename stable/{domoticz/0.0.7 => dizquetv/5.0.6}/values.yaml (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{doublecommander/2.0.27 => dokuwiki/0.0.6}/CONFIG.md (100%) create mode 100644 stable/dokuwiki/0.0.6/Chart.lock rename stable/dokuwiki/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/README.md (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{doublecommander/2.0.27 => dokuwiki/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/dokuwiki/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{domoticz/0.0.7 => dokuwiki/0.0.6}/templates/common.yaml (100%) rename stable/{doublecommander/2.0.27 => dokuwiki/0.0.6}/values.yaml (100%) delete mode 100644 stable/domoticz/0.0.7/Chart.lock rename stable/domoticz/{0.0.7 => 0.0.8}/CHANGELOG.md (90%) rename stable/{dsmr-reader/5.0.14 => domoticz/0.0.8}/CONFIG.md (100%) create mode 100644 stable/domoticz/0.0.8/Chart.lock rename stable/domoticz/{0.0.7 => 0.0.8}/Chart.yaml (98%) rename stable/domoticz/{0.0.7 => 0.0.8}/README.md (100%) rename stable/domoticz/{0.0.7 => 0.0.8}/app-readme.md (100%) rename stable/{dsmr-reader/5.0.14 => domoticz/0.0.8}/charts/common-8.9.24.tgz (100%) rename stable/domoticz/{0.0.7 => 0.0.8}/helm-values.md (100%) rename stable/domoticz/{0.0.7 => 0.0.8}/ix_values.yaml (100%) rename stable/domoticz/{0.0.7 => 0.0.8}/questions.yaml (100%) rename stable/domoticz/{0.0.7 => 0.0.8}/security.md (100%) rename stable/{dsmr-reader/5.0.14 => domoticz/0.0.8}/templates/common.yaml (100%) rename stable/{dsmr-reader/5.0.14 => domoticz/0.0.8}/values.yaml (100%) delete mode 100644 stable/doublecommander/2.0.27/Chart.lock rename stable/doublecommander/{2.0.27 => 2.0.28}/CHANGELOG.md (90%) rename stable/{duckdns/0.0.5 => doublecommander/2.0.28}/CONFIG.md (100%) create mode 100644 stable/doublecommander/2.0.28/Chart.lock rename stable/doublecommander/{2.0.27 => 2.0.28}/Chart.yaml (98%) rename stable/doublecommander/{2.0.27 => 2.0.28}/README.md (100%) rename stable/doublecommander/{2.0.27 => 2.0.28}/app-readme.md (100%) rename stable/{duckdns/0.0.5 => doublecommander/2.0.28}/charts/common-8.9.24.tgz (100%) rename stable/doublecommander/{2.0.27 => 2.0.28}/helm-values.md (100%) rename stable/doublecommander/{2.0.27 => 2.0.28}/ix_values.yaml (100%) rename stable/doublecommander/{2.0.27 => 2.0.28}/questions.yaml (99%) rename stable/doublecommander/{2.0.27 => 2.0.28}/security.md (100%) rename stable/doublecommander/{2.0.27 => 2.0.28}/templates/common.yaml (100%) rename stable/{duckdns/0.0.5 => doublecommander/2.0.28}/values.yaml (100%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/CHANGELOG.md (88%) rename stable/{duplicati/4.0.24 => dsmr-reader/5.0.15}/CONFIG.md (100%) rename stable/{babybuddy/5.0.20 => dsmr-reader/5.0.15}/Chart.lock (84%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/Chart.yaml (98%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/README.md (100%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/app-readme.md (100%) rename stable/{duplicati/4.0.24 => dsmr-reader/5.0.15}/charts/common-8.9.24.tgz (100%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/charts/postgresql-6.0.34.tgz (100%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/helm-values.md (84%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/ix_values.yaml (99%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/questions.yaml (99%) rename stable/dsmr-reader/{5.0.14 => 5.0.15}/security.md (100%) rename stable/{duckdns/0.0.5 => dsmr-reader/5.0.15}/templates/common.yaml (100%) rename stable/{duplicati/4.0.24 => dsmr-reader/5.0.15}/values.yaml (100%) delete mode 100644 stable/duckdns/0.0.5/Chart.lock rename stable/duckdns/{0.0.5 => 0.0.6}/CHANGELOG.md (87%) rename stable/{emby/9.0.26 => duckdns/0.0.6}/CONFIG.md (100%) create mode 100644 stable/duckdns/0.0.6/Chart.lock rename stable/duckdns/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/duckdns/{0.0.5 => 0.0.6}/README.md (100%) rename stable/duckdns/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{emby/9.0.26 => duckdns/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/duckdns/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/duckdns/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/duckdns/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/duckdns/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{duplicati/4.0.24 => duckdns/0.0.6}/templates/common.yaml (100%) rename stable/{emby/9.0.26 => duckdns/0.0.6}/values.yaml (100%) delete mode 100644 stable/duplicati/4.0.24/Chart.lock rename stable/duplicati/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{embystat/0.0.5 => duplicati/4.0.25}/CONFIG.md (100%) create mode 100644 stable/duplicati/4.0.25/Chart.lock rename stable/duplicati/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/duplicati/{4.0.24 => 4.0.25}/README.md (100%) rename stable/duplicati/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{embystat/0.0.5 => duplicati/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/duplicati/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/duplicati/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/duplicati/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/duplicati/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{emby/9.0.26 => duplicati/4.0.25}/templates/common.yaml (100%) rename stable/{embystat/0.0.5 => duplicati/4.0.25}/values.yaml (100%) delete mode 100644 stable/emby/9.0.26/Chart.lock rename stable/emby/{9.0.26 => 9.0.27}/CHANGELOG.md (90%) rename stable/{emulatorjs/0.0.6 => emby/9.0.27}/CONFIG.md (100%) create mode 100644 stable/emby/9.0.27/Chart.lock rename stable/emby/{9.0.26 => 9.0.27}/Chart.yaml (97%) rename stable/emby/{9.0.26 => 9.0.27}/README.md (100%) rename stable/emby/{9.0.26 => 9.0.27}/app-readme.md (100%) rename stable/{emulatorjs/0.0.6 => emby/9.0.27}/charts/common-8.9.24.tgz (100%) rename stable/emby/{9.0.26 => 9.0.27}/helm-values.md (100%) rename stable/emby/{9.0.26 => 9.0.27}/ix_values.yaml (100%) rename stable/emby/{9.0.26 => 9.0.27}/questions.yaml (99%) rename stable/emby/{9.0.26 => 9.0.27}/security.md (100%) rename stable/{embystat/0.0.5 => emby/9.0.27}/templates/common.yaml (100%) rename stable/{emulatorjs/0.0.6 => emby/9.0.27}/values.yaml (100%) delete mode 100644 stable/embystat/0.0.5/Chart.lock rename stable/embystat/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{endlessh/0.0.5 => embystat/0.0.6}/CONFIG.md (100%) create mode 100644 stable/embystat/0.0.6/Chart.lock rename stable/embystat/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/embystat/{0.0.5 => 0.0.6}/README.md (100%) rename stable/embystat/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{endlessh/0.0.5 => embystat/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/embystat/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/embystat/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/embystat/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/embystat/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{emulatorjs => embystat}/0.0.6/templates/common.yaml (100%) rename stable/{endlessh/0.0.5 => embystat/0.0.6}/values.yaml (100%) delete mode 100644 stable/emulatorjs/0.0.6/Chart.lock rename stable/emulatorjs/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{esphome/9.0.29 => emulatorjs/0.0.7}/CONFIG.md (100%) create mode 100644 stable/emulatorjs/0.0.7/Chart.lock rename stable/emulatorjs/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/README.md (100%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{esphome/9.0.29 => emulatorjs/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/emulatorjs/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{endlessh/0.0.5 => emulatorjs/0.0.7}/templates/common.yaml (100%) rename stable/{esphome/9.0.29 => emulatorjs/0.0.7}/values.yaml (100%) delete mode 100644 stable/endlessh/0.0.5/Chart.lock rename stable/endlessh/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{etherpad/5.0.15 => endlessh/0.0.6}/CONFIG.md (100%) create mode 100644 stable/endlessh/0.0.6/Chart.lock rename stable/endlessh/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/endlessh/{0.0.5 => 0.0.6}/README.md (100%) rename stable/endlessh/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{etherpad/5.0.15 => endlessh/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/endlessh/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/endlessh/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/endlessh/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/endlessh/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{esphome/9.0.29 => endlessh/0.0.6}/templates/common.yaml (100%) rename stable/{etherpad/5.0.15 => endlessh/0.0.6}/values.yaml (100%) delete mode 100644 stable/esphome/9.0.29/Chart.lock rename stable/esphome/{9.0.29 => 9.0.30}/CHANGELOG.md (90%) rename stable/{external-service/4.0.23 => esphome/9.0.30}/CONFIG.md (100%) create mode 100644 stable/esphome/9.0.30/Chart.lock rename stable/esphome/{9.0.29 => 9.0.30}/Chart.yaml (98%) rename stable/esphome/{9.0.29 => 9.0.30}/README.md (100%) rename stable/esphome/{9.0.29 => 9.0.30}/app-readme.md (100%) rename stable/{external-service/4.0.23 => esphome/9.0.30}/charts/common-8.9.24.tgz (100%) rename stable/esphome/{9.0.29 => 9.0.30}/helm-values.md (100%) rename stable/esphome/{9.0.29 => 9.0.30}/ix_values.yaml (100%) rename stable/esphome/{9.0.29 => 9.0.30}/questions.yaml (99%) rename stable/esphome/{9.0.29 => 9.0.30}/security.md (100%) rename stable/{etherpad/5.0.15 => esphome/9.0.30}/templates/common.yaml (100%) rename stable/{external-service/4.0.23 => esphome/9.0.30}/values.yaml (100%) rename stable/etherpad/{5.0.15 => 5.0.16}/CHANGELOG.md (88%) rename stable/{filezilla/2.0.24 => etherpad/5.0.16}/CONFIG.md (100%) rename stable/{blog/0.0.14 => etherpad/5.0.16}/Chart.lock (84%) rename stable/etherpad/{5.0.15 => 5.0.16}/Chart.yaml (98%) rename stable/etherpad/{5.0.15 => 5.0.16}/README.md (100%) rename stable/etherpad/{5.0.15 => 5.0.16}/app-readme.md (100%) rename stable/{filezilla/2.0.24 => etherpad/5.0.16}/charts/common-8.9.24.tgz (100%) rename stable/etherpad/{5.0.15 => 5.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/etherpad/{5.0.15 => 5.0.16}/helm-values.md (88%) rename stable/etherpad/{5.0.15 => 5.0.16}/ix_values.yaml (98%) rename stable/etherpad/{5.0.15 => 5.0.16}/questions.yaml (99%) rename stable/etherpad/{5.0.15 => 5.0.16}/security.md (100%) rename stable/{external-service/4.0.23 => etherpad/5.0.16}/templates/common.yaml (100%) rename stable/{filezilla/2.0.24 => etherpad/5.0.16}/values.yaml (100%) delete mode 100644 stable/external-service/4.0.23/Chart.lock rename stable/external-service/{4.0.23 => 4.0.24}/CHANGELOG.md (93%) rename stable/{firefox-syncserver/5.0.15 => external-service/4.0.24}/CONFIG.md (100%) create mode 100644 stable/external-service/4.0.24/Chart.lock rename stable/external-service/{4.0.23 => 4.0.24}/Chart.yaml (97%) rename stable/external-service/{4.0.23 => 4.0.24}/README.md (100%) rename stable/external-service/{4.0.23 => 4.0.24}/app-readme.md (100%) rename stable/{firefox-syncserver/5.0.15 => external-service/4.0.24}/charts/common-8.9.24.tgz (100%) rename stable/external-service/{4.0.23 => 4.0.24}/helm-values.md (100%) rename stable/external-service/{4.0.23 => 4.0.24}/ix_values.yaml (100%) rename stable/external-service/{4.0.23 => 4.0.24}/questions.yaml (100%) rename stable/external-service/{4.0.23 => 4.0.24}/security.md (100%) rename stable/{firefox-syncserver/5.0.15 => external-service/4.0.24}/templates/common.yaml (100%) rename stable/{firefox-syncserver/5.0.15 => external-service/4.0.24}/values.yaml (100%) delete mode 100644 stable/filezilla/2.0.24/Chart.lock rename stable/filezilla/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{firefox/0.0.5 => filezilla/2.0.25}/CONFIG.md (100%) create mode 100644 stable/filezilla/2.0.25/Chart.lock rename stable/filezilla/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/filezilla/{2.0.24 => 2.0.25}/README.md (100%) rename stable/filezilla/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{firefox/0.0.5 => filezilla/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/filezilla/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/filezilla/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/filezilla/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/filezilla/{2.0.24 => 2.0.25}/security.md (100%) rename stable/filezilla/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{firefox/0.0.5 => filezilla/2.0.25}/values.yaml (100%) create mode 100644 stable/fireflyiii/13.1.7/CHANGELOG.md rename stable/{flaresolverr/4.0.26 => fireflyiii/13.1.7}/CONFIG.md (100%) rename stable/{paperless-ng/1.0.3 => fireflyiii/13.1.7}/Chart.lock (87%) create mode 100644 stable/fireflyiii/13.1.7/Chart.yaml create mode 100644 stable/fireflyiii/13.1.7/README.md create mode 100644 stable/fireflyiii/13.1.7/app-readme.md rename stable/{flaresolverr/4.0.26 => fireflyiii/13.1.7}/charts/common-8.9.24.tgz (100%) rename stable/{firefox-syncserver/5.0.15 => fireflyiii/13.1.7}/charts/postgresql-6.0.34.tgz (100%) rename stable/{friendica/0.0.16 => fireflyiii/13.1.7}/charts/redis-1.0.39.tgz (100%) create mode 100644 stable/fireflyiii/13.1.7/helm-values.md create mode 100644 stable/fireflyiii/13.1.7/ix_values.yaml create mode 100644 stable/fireflyiii/13.1.7/questions.yaml create mode 100644 stable/fireflyiii/13.1.7/security.md create mode 100644 stable/fireflyiii/13.1.7/templates/_cronjob.tpl create mode 100644 stable/fireflyiii/13.1.7/templates/_secrets.tpl create mode 100644 stable/fireflyiii/13.1.7/templates/common.yaml rename stable/{flaresolverr/4.0.26 => fireflyiii/13.1.7}/values.yaml (100%) delete mode 100644 stable/firefox-syncserver/5.0.15/Chart.lock rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/CHANGELOG.md (89%) rename stable/{fleet/0.0.5 => firefox-syncserver/5.0.16}/CONFIG.md (100%) create mode 100644 stable/firefox-syncserver/5.0.16/Chart.lock rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/Chart.yaml (98%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/README.md (100%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/app-readme.md (100%) rename stable/{fleet/0.0.5 => firefox-syncserver/5.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{gitea/5.0.18 => firefox-syncserver/5.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/helm-values.md (100%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/ix_values.yaml (100%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/questions.yaml (99%) rename stable/firefox-syncserver/{5.0.15 => 5.0.16}/security.md (100%) rename stable/{firefox/0.0.5 => firefox-syncserver/5.0.16}/templates/common.yaml (100%) rename stable/{fleet/0.0.5 => firefox-syncserver/5.0.16}/values.yaml (100%) delete mode 100644 stable/firefox/0.0.5/Chart.lock rename stable/firefox/{0.0.5 => 0.0.6}/CHANGELOG.md (87%) rename stable/{flood/4.0.24 => firefox/0.0.6}/CONFIG.md (100%) create mode 100644 stable/firefox/0.0.6/Chart.lock rename stable/firefox/{0.0.5 => 0.0.6}/Chart.yaml (97%) rename stable/firefox/{0.0.5 => 0.0.6}/README.md (100%) rename stable/firefox/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{flood/4.0.24 => firefox/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/firefox/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/firefox/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/firefox/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/firefox/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{flaresolverr/4.0.26 => firefox/0.0.6}/templates/common.yaml (100%) rename stable/{flood/4.0.24 => firefox/0.0.6}/values.yaml (100%) delete mode 100644 stable/flaresolverr/4.0.26/Chart.lock rename stable/flaresolverr/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{focalboard/4.0.25 => flaresolverr/4.0.27}/CONFIG.md (100%) rename stable/{dizquetv/5.0.5 => flaresolverr/4.0.27}/Chart.lock (79%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/README.md (100%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{focalboard/4.0.25 => flaresolverr/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/flaresolverr/{4.0.26 => 4.0.27}/security.md (100%) rename stable/{fleet/0.0.5 => flaresolverr/4.0.27}/templates/common.yaml (100%) rename stable/{focalboard/4.0.25 => flaresolverr/4.0.27}/values.yaml (100%) rename stable/fleet/{0.0.5 => 0.0.6}/CHANGELOG.md (87%) rename stable/{foldingathome => fleet}/0.0.6/CONFIG.md (100%) create mode 100644 stable/fleet/0.0.6/Chart.lock rename stable/fleet/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/fleet/{0.0.5 => 0.0.6}/README.md (100%) rename stable/fleet/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{foldingathome => fleet}/0.0.6/charts/common-8.9.24.tgz (100%) rename stable/fleet/{0.0.5 => 0.0.6}/charts/mariadb-1.0.37.tgz (100%) rename stable/fleet/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/fleet/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/fleet/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/fleet/{0.0.5 => 0.0.6}/security.md (99%) rename stable/{flood/4.0.24 => fleet/0.0.6}/templates/common.yaml (100%) rename stable/{foldingathome => fleet}/0.0.6/values.yaml (100%) delete mode 100644 stable/flood/4.0.24/Chart.lock rename stable/flood/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{fossil/2.0.24 => flood/4.0.25}/CONFIG.md (100%) create mode 100644 stable/flood/4.0.25/Chart.lock rename stable/flood/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/flood/{4.0.24 => 4.0.25}/README.md (100%) rename stable/flood/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{fossil/2.0.24 => flood/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/flood/{4.0.24 => 4.0.25}/ci/ct-values.yaml (100%) rename stable/flood/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/flood/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/flood/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/flood/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{focalboard => flood}/4.0.25/templates/common.yaml (100%) rename stable/{fossil/2.0.24 => flood/4.0.25}/values.yaml (100%) delete mode 100644 stable/focalboard/4.0.25/Chart.lock rename stable/focalboard/{4.0.25 => 4.0.26}/CHANGELOG.md (90%) rename stable/{freeradius/4.0.27 => focalboard/4.0.26}/CONFIG.md (100%) create mode 100644 stable/focalboard/4.0.26/Chart.lock rename stable/focalboard/{4.0.25 => 4.0.26}/Chart.yaml (98%) rename stable/focalboard/{4.0.25 => 4.0.26}/README.md (100%) rename stable/focalboard/{4.0.25 => 4.0.26}/app-readme.md (100%) rename stable/{freeradius/4.0.27 => focalboard/4.0.26}/charts/common-8.9.24.tgz (100%) rename stable/focalboard/{4.0.25 => 4.0.26}/helm-values.md (100%) rename stable/focalboard/{4.0.25 => 4.0.26}/ix_values.yaml (100%) rename stable/focalboard/{4.0.25 => 4.0.26}/questions.yaml (99%) rename stable/focalboard/{4.0.25 => 4.0.26}/security.md (100%) rename stable/{foldingathome/0.0.6 => focalboard/4.0.26}/templates/common.yaml (100%) rename stable/{freeradius/4.0.27 => focalboard/4.0.26}/values.yaml (100%) delete mode 100644 stable/foldingathome/0.0.6/Chart.lock rename stable/foldingathome/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{freshrss/9.0.28 => foldingathome/0.0.7}/CONFIG.md (100%) create mode 100644 stable/foldingathome/0.0.7/Chart.lock rename stable/foldingathome/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/foldingathome/{0.0.6 => 0.0.7}/README.md (100%) rename stable/foldingathome/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{freshrss/9.0.28 => foldingathome/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/foldingathome/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/foldingathome/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/foldingathome/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/foldingathome/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{freshrss/9.0.28 => foldingathome/0.0.7}/templates/common.yaml (100%) rename stable/{freshrss/9.0.28 => foldingathome/0.0.7}/values.yaml (100%) delete mode 100644 stable/fossil/2.0.24/Chart.lock rename stable/fossil/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{friendica/0.0.16 => fossil/2.0.25}/CONFIG.md (100%) create mode 100644 stable/fossil/2.0.25/Chart.lock rename stable/fossil/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/fossil/{2.0.24 => 2.0.25}/README.md (100%) rename stable/fossil/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{friendica/0.0.16 => fossil/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/fossil/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/fossil/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/fossil/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/fossil/{2.0.24 => 2.0.25}/security.md (100%) rename stable/fossil/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{friendica/0.0.16 => fossil/2.0.25}/values.yaml (100%) delete mode 100644 stable/freeradius/4.0.27/Chart.lock rename stable/freeradius/{4.0.27 => 4.0.28}/CHANGELOG.md (90%) rename stable/{gaps/9.0.25 => freeradius/4.0.28}/CONFIG.md (100%) rename stable/{dokuwiki/0.0.5 => freeradius/4.0.28}/Chart.lock (79%) rename stable/freeradius/{4.0.27 => 4.0.28}/Chart.yaml (97%) rename stable/freeradius/{4.0.27 => 4.0.28}/README.md (100%) rename stable/freeradius/{4.0.27 => 4.0.28}/app-readme.md (100%) rename stable/{gaps/9.0.25 => freeradius/4.0.28}/charts/common-8.9.24.tgz (100%) rename stable/freeradius/{4.0.27 => 4.0.28}/helm-values.md (100%) rename stable/freeradius/{4.0.27 => 4.0.28}/ix_values.yaml (100%) rename stable/freeradius/{4.0.27 => 4.0.28}/questions.yaml (99%) rename stable/freeradius/{4.0.27 => 4.0.28}/security.md (100%) rename stable/freeradius/{4.0.27 => 4.0.28}/templates/common.yaml (100%) rename stable/{gaps/9.0.25 => freeradius/4.0.28}/values.yaml (100%) delete mode 100644 stable/freshrss/9.0.28/Chart.lock rename stable/freshrss/{9.0.28 => 9.0.29}/CHANGELOG.md (90%) rename stable/{gitea/5.0.18 => freshrss/9.0.29}/CONFIG.md (100%) create mode 100644 stable/freshrss/9.0.29/Chart.lock rename stable/freshrss/{9.0.28 => 9.0.29}/Chart.yaml (97%) rename stable/freshrss/{9.0.28 => 9.0.29}/README.md (100%) rename stable/freshrss/{9.0.28 => 9.0.29}/app-readme.md (100%) rename stable/{gitea/5.0.18 => freshrss/9.0.29}/charts/common-8.9.24.tgz (100%) rename stable/freshrss/{9.0.28 => 9.0.29}/helm-values.md (100%) rename stable/freshrss/{9.0.28 => 9.0.29}/ix_values.yaml (100%) rename stable/freshrss/{9.0.28 => 9.0.29}/questions.yaml (99%) rename stable/freshrss/{9.0.28 => 9.0.29}/security.md (100%) rename stable/{gaps/9.0.25 => freshrss/9.0.29}/templates/common.yaml (100%) rename stable/{gitea/5.0.18 => freshrss/9.0.29}/values.yaml (100%) rename stable/friendica/{0.0.16 => 0.0.17}/CHANGELOG.md (92%) rename stable/{golinks/2.0.24 => friendica/0.0.17}/CONFIG.md (100%) rename stable/friendica/{0.0.16 => 0.0.17}/Chart.lock (87%) rename stable/friendica/{0.0.16 => 0.0.17}/Chart.yaml (98%) rename stable/friendica/{0.0.16 => 0.0.17}/README.md (100%) rename stable/friendica/{0.0.16 => 0.0.17}/app-readme.md (100%) rename stable/{golinks/2.0.24 => friendica/0.0.17}/charts/common-8.9.24.tgz (100%) rename stable/friendica/{0.0.16 => 0.0.17}/charts/mariadb-1.0.37.tgz (100%) rename stable/{paperless-ng/1.0.3 => friendica/0.0.17}/charts/redis-1.0.39.tgz (100%) rename stable/friendica/{0.0.16 => 0.0.17}/helm-values.md (100%) rename stable/friendica/{0.0.16 => 0.0.17}/ix_values.yaml (100%) rename stable/friendica/{0.0.16 => 0.0.17}/questions.yaml (100%) rename stable/friendica/{0.0.16 => 0.0.17}/security.md (100%) rename stable/friendica/{0.0.16 => 0.0.17}/templates/common.yaml (100%) rename stable/{golinks/2.0.24 => friendica/0.0.17}/values.yaml (100%) delete mode 100644 stable/gaps/9.0.25/Chart.lock rename stable/gaps/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{gonic/4.0.24 => gaps/9.0.26}/CONFIG.md (100%) create mode 100644 stable/gaps/9.0.26/Chart.lock rename stable/gaps/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/gaps/{9.0.25 => 9.0.26}/README.md (100%) rename stable/gaps/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{gonic/4.0.24 => gaps/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/gaps/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/gaps/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/gaps/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/gaps/{9.0.25 => 9.0.26}/security.md (99%) rename stable/{gonic/4.0.24 => gaps/9.0.26}/templates/common.yaml (100%) rename stable/{gonic/4.0.24 => gaps/9.0.26}/values.yaml (100%) rename stable/gitea/{5.0.18 => 5.0.19}/CHANGELOG.md (89%) rename stable/{gotify/5.0.16 => gitea/5.0.19}/CONFIG.md (100%) rename stable/gitea/{5.0.18 => 5.0.19}/Chart.lock (87%) rename stable/gitea/{5.0.18 => 5.0.19}/Chart.yaml (98%) rename stable/gitea/{5.0.18 => 5.0.19}/README.md (100%) rename stable/gitea/{5.0.18 => 5.0.19}/app-readme.md (100%) rename stable/{gotify/5.0.16 => gitea/5.0.19}/charts/common-8.9.24.tgz (100%) rename stable/gitea/{5.0.18 => 5.0.19}/charts/memcached-1.0.36.tgz (100%) rename stable/{gotify/5.0.16 => gitea/5.0.19}/charts/postgresql-6.0.34.tgz (100%) rename stable/gitea/{5.0.18 => 5.0.19}/ci/basic-values.yaml (100%) rename stable/gitea/{5.0.18 => 5.0.19}/ci/ingress-values.yaml (100%) rename stable/gitea/{5.0.18 => 5.0.19}/helm-values.md (100%) rename stable/gitea/{5.0.18 => 5.0.19}/ix_values.yaml (100%) rename stable/gitea/{5.0.18 => 5.0.19}/questions.yaml (99%) rename stable/gitea/{5.0.18 => 5.0.19}/security.md (100%) rename stable/gitea/{5.0.18 => 5.0.19}/templates/_configmap.tpl (100%) rename stable/gitea/{5.0.18 => 5.0.19}/templates/_secrets.tpl (100%) rename stable/gitea/{5.0.18 => 5.0.19}/templates/common.yaml (100%) rename stable/{gotify/5.0.16 => gitea/5.0.19}/values.yaml (100%) delete mode 100644 stable/golinks/2.0.24/Chart.lock rename stable/golinks/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{grafana/2.0.8 => golinks/2.0.25}/CONFIG.md (100%) create mode 100644 stable/golinks/2.0.25/Chart.lock rename stable/golinks/{2.0.24 => 2.0.25}/Chart.yaml (98%) rename stable/golinks/{2.0.24 => 2.0.25}/README.md (100%) rename stable/golinks/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{grafana/2.0.8 => golinks/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/golinks/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/golinks/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/golinks/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/golinks/{2.0.24 => 2.0.25}/security.md (100%) rename stable/golinks/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{grafana/2.0.8 => golinks/2.0.25}/values.yaml (100%) delete mode 100644 stable/gonic/4.0.24/Chart.lock rename stable/gonic/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{grav/2.0.24 => gonic/4.0.25}/CONFIG.md (100%) create mode 100644 stable/gonic/4.0.25/Chart.lock rename stable/gonic/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/gonic/{4.0.24 => 4.0.25}/README.md (100%) rename stable/gonic/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{grav/2.0.24 => gonic/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/gonic/{4.0.24 => 4.0.25}/ci/ct-values.yaml (100%) rename stable/gonic/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/gonic/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/gonic/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/gonic/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{grafana/2.0.8 => gonic/4.0.25}/templates/common.yaml (100%) rename stable/{grav/2.0.24 => gonic/4.0.25}/values.yaml (100%) rename stable/gotify/{5.0.16 => 5.0.17}/CHANGELOG.md (86%) rename stable/{grocy/9.0.25 => gotify/5.0.17}/CONFIG.md (100%) create mode 100644 stable/gotify/5.0.17/Chart.lock rename stable/gotify/{5.0.16 => 5.0.17}/Chart.yaml (98%) rename stable/gotify/{5.0.16 => 5.0.17}/README.md (100%) rename stable/gotify/{5.0.16 => 5.0.17}/app-readme.md (100%) rename stable/{grocy/9.0.25 => gotify/5.0.17}/charts/common-8.9.24.tgz (100%) rename stable/{joplin-server/5.0.15 => gotify/5.0.17}/charts/postgresql-6.0.34.tgz (100%) rename stable/gotify/{5.0.16 => 5.0.17}/helm-values.md (100%) rename stable/gotify/{5.0.16 => 5.0.17}/ix_values.yaml (100%) rename stable/gotify/{5.0.16 => 5.0.17}/questions.yaml (99%) rename stable/gotify/{5.0.16 => 5.0.17}/security.md (100%) rename stable/gotify/{5.0.16 => 5.0.17}/templates/_configmap.tpl (100%) rename stable/gotify/{5.0.16 => 5.0.17}/templates/common.yaml (100%) rename stable/{grocy/9.0.25 => gotify/5.0.17}/values.yaml (100%) delete mode 100644 stable/grafana/2.0.8/Chart.lock rename stable/grafana/{2.0.8 => 2.0.9}/CHANGELOG.md (92%) rename stable/{guacd/0.0.5 => grafana/2.0.9}/CONFIG.md (100%) create mode 100644 stable/grafana/2.0.9/Chart.lock rename stable/grafana/{2.0.8 => 2.0.9}/Chart.yaml (98%) rename stable/grafana/{2.0.8 => 2.0.9}/README.md (100%) rename stable/grafana/{2.0.8 => 2.0.9}/app-readme.md (100%) rename stable/{guacd/0.0.5 => grafana/2.0.9}/charts/common-8.9.24.tgz (100%) rename stable/grafana/{2.0.8 => 2.0.9}/helm-values.md (100%) rename stable/grafana/{2.0.8 => 2.0.9}/ix_values.yaml (100%) rename stable/grafana/{2.0.8 => 2.0.9}/questions.yaml (100%) rename stable/grafana/{2.0.8 => 2.0.9}/security.md (100%) rename stable/{grocy/9.0.25 => grafana/2.0.9}/templates/common.yaml (100%) rename stable/grafana/{2.0.8 => 2.0.9}/templates/prometheusrules.yaml (100%) rename stable/grafana/{2.0.8 => 2.0.9}/templates/servicemonitor.yaml (100%) rename stable/{guacd/0.0.5 => grafana/2.0.9}/values.yaml (100%) delete mode 100644 stable/grav/2.0.24/Chart.lock rename stable/grav/{2.0.24 => 2.0.25}/CHANGELOG.md (91%) rename stable/{habridge/0.0.6 => grav/2.0.25}/CONFIG.md (100%) create mode 100644 stable/grav/2.0.25/Chart.lock rename stable/grav/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/grav/{2.0.24 => 2.0.25}/README.md (100%) rename stable/grav/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{habridge/0.0.6 => grav/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/grav/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/grav/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/grav/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/grav/{2.0.24 => 2.0.25}/security.md (100%) rename stable/grav/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{habridge/0.0.6 => grav/2.0.25}/values.yaml (100%) delete mode 100644 stable/grocy/9.0.25/Chart.lock rename stable/grocy/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{haste-server/4.0.24 => grocy/9.0.26}/CONFIG.md (100%) create mode 100644 stable/grocy/9.0.26/Chart.lock rename stable/grocy/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/grocy/{9.0.25 => 9.0.26}/README.md (100%) rename stable/grocy/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{haste-server/4.0.24 => grocy/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/grocy/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/grocy/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/grocy/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/grocy/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{guacd/0.0.5 => grocy/9.0.26}/templates/common.yaml (100%) rename stable/{haste-server/4.0.24 => grocy/9.0.26}/values.yaml (100%) delete mode 100644 stable/guacd/0.0.5/Chart.lock rename stable/guacd/{0.0.5 => 0.0.6}/CHANGELOG.md (85%) rename stable/{headphones/2.0.24 => guacd/0.0.6}/CONFIG.md (100%) create mode 100644 stable/guacd/0.0.6/Chart.lock rename stable/guacd/{0.0.5 => 0.0.6}/Chart.yaml (97%) rename stable/guacd/{0.0.5 => 0.0.6}/README.md (100%) rename stable/guacd/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{headphones/2.0.24 => guacd/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/guacd/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/guacd/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/guacd/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/guacd/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{habridge => guacd}/0.0.6/templates/common.yaml (100%) rename stable/{headphones/2.0.24 => guacd/0.0.6}/values.yaml (100%) delete mode 100644 stable/habridge/0.0.6/Chart.lock rename stable/habridge/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{healthchecks/5.0.5 => habridge/0.0.7}/CONFIG.md (100%) create mode 100644 stable/habridge/0.0.7/Chart.lock rename stable/habridge/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/habridge/{0.0.6 => 0.0.7}/README.md (100%) rename stable/habridge/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{healthchecks/5.0.5 => habridge/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/habridge/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/habridge/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/habridge/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/habridge/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{haste-server/4.0.24 => habridge/0.0.7}/templates/common.yaml (100%) rename stable/{healthchecks/5.0.5 => habridge/0.0.7}/values.yaml (100%) create mode 100644 stable/handbrake/10.0.6/CHANGELOG.md rename stable/{hedgedoc/0.0.5 => handbrake/10.0.6}/CONFIG.md (100%) create mode 100644 stable/handbrake/10.0.6/Chart.lock create mode 100644 stable/handbrake/10.0.6/Chart.yaml create mode 100644 stable/handbrake/10.0.6/README.md create mode 100644 stable/handbrake/10.0.6/app-readme.md rename stable/{hedgedoc/0.0.5 => handbrake/10.0.6}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/handbrake/10.0.6/helm-values.md create mode 100644 stable/handbrake/10.0.6/ix_values.yaml create mode 100644 stable/handbrake/10.0.6/questions.yaml create mode 100644 stable/handbrake/10.0.6/security.md rename stable/{healthchecks/5.0.5 => handbrake/10.0.6}/templates/common.yaml (100%) rename stable/{hedgedoc/0.0.5 => handbrake/10.0.6}/values.yaml (100%) delete mode 100644 stable/haste-server/4.0.24/Chart.lock rename stable/haste-server/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{heimdall/9.0.29 => haste-server/4.0.25}/CONFIG.md (100%) create mode 100644 stable/haste-server/4.0.25/Chart.lock rename stable/haste-server/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/haste-server/{4.0.24 => 4.0.25}/README.md (100%) rename stable/haste-server/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{heimdall/9.0.29 => haste-server/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/haste-server/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/haste-server/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/haste-server/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/haste-server/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{hedgedoc/0.0.5 => haste-server/4.0.25}/templates/common.yaml (100%) rename stable/{heimdall/9.0.29 => haste-server/4.0.25}/values.yaml (100%) delete mode 100644 stable/headphones/2.0.24/Chart.lock rename stable/headphones/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{htpcmanager/0.0.5 => headphones/2.0.25}/CONFIG.md (100%) create mode 100644 stable/headphones/2.0.25/Chart.lock rename stable/headphones/{2.0.24 => 2.0.25}/Chart.yaml (98%) rename stable/headphones/{2.0.24 => 2.0.25}/README.md (100%) rename stable/headphones/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{htpcmanager/0.0.5 => headphones/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/headphones/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/headphones/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/headphones/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/headphones/{2.0.24 => 2.0.25}/security.md (100%) rename stable/headphones/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{htpcmanager/0.0.5 => headphones/2.0.25}/values.yaml (100%) delete mode 100644 stable/healthchecks/5.0.5/Chart.lock rename stable/healthchecks/{5.0.5 => 5.0.6}/CHANGELOG.md (90%) rename stable/{hyperion-ng/4.0.27 => healthchecks/5.0.6}/CONFIG.md (100%) create mode 100644 stable/healthchecks/5.0.6/Chart.lock rename stable/healthchecks/{5.0.5 => 5.0.6}/Chart.yaml (98%) rename stable/healthchecks/{5.0.5 => 5.0.6}/README.md (100%) rename stable/healthchecks/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{hyperion-ng/4.0.27 => healthchecks/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/healthchecks/{5.0.5 => 5.0.6}/helm-values.md (100%) rename stable/healthchecks/{5.0.5 => 5.0.6}/ix_values.yaml (100%) rename stable/healthchecks/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/healthchecks/{5.0.5 => 5.0.6}/security.md (100%) rename stable/{heimdall/9.0.29 => healthchecks/5.0.6}/templates/common.yaml (100%) rename stable/{hyperion-ng/4.0.27 => healthchecks/5.0.6}/values.yaml (100%) delete mode 100644 stable/hedgedoc/0.0.5/Chart.lock rename stable/hedgedoc/{0.0.5 => 0.0.6}/CHANGELOG.md (85%) rename stable/{icantbelieveitsnotvaletudo/2.0.24 => hedgedoc/0.0.6}/CONFIG.md (100%) create mode 100644 stable/hedgedoc/0.0.6/Chart.lock rename stable/hedgedoc/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/README.md (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{icantbelieveitsnotvaletudo/2.0.24 => hedgedoc/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/charts/mariadb-1.0.37.tgz (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/hedgedoc/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{htpcmanager/0.0.5 => hedgedoc/0.0.6}/templates/common.yaml (100%) rename stable/{icantbelieveitsnotvaletudo/2.0.24 => hedgedoc/0.0.6}/values.yaml (100%) delete mode 100644 stable/heimdall/9.0.29/Chart.lock rename stable/heimdall/{9.0.29 => 9.0.30}/CHANGELOG.md (90%) rename stable/{icinga2/0.0.13 => heimdall/9.0.30}/CONFIG.md (100%) create mode 100644 stable/heimdall/9.0.30/Chart.lock rename stable/heimdall/{9.0.29 => 9.0.30}/Chart.yaml (97%) rename stable/heimdall/{9.0.29 => 9.0.30}/README.md (100%) rename stable/heimdall/{9.0.29 => 9.0.30}/app-readme.md (100%) rename stable/{icinga2/0.0.13 => heimdall/9.0.30}/charts/common-8.9.24.tgz (100%) rename stable/heimdall/{9.0.29 => 9.0.30}/helm-values.md (100%) rename stable/heimdall/{9.0.29 => 9.0.30}/ix_values.yaml (100%) rename stable/heimdall/{9.0.29 => 9.0.30}/questions.yaml (99%) rename stable/heimdall/{9.0.29 => 9.0.30}/security.md (100%) rename stable/{hyperion-ng/4.0.27 => heimdall/9.0.30}/templates/common.yaml (100%) rename stable/{icinga2/0.0.13 => heimdall/9.0.30}/values.yaml (100%) create mode 100644 stable/home-assistant/12.0.21/CHANGELOG.md rename stable/{ipfs/0.0.6 => home-assistant/12.0.21}/CONFIG.md (100%) create mode 100644 stable/home-assistant/12.0.21/Chart.lock create mode 100644 stable/home-assistant/12.0.21/Chart.yaml create mode 100644 stable/home-assistant/12.0.21/README.md create mode 100644 stable/home-assistant/12.0.21/app-readme.md rename stable/{ipfs/0.0.6 => home-assistant/12.0.21}/charts/common-8.9.24.tgz (100%) rename stable/{kanboard/5.0.16 => home-assistant/12.0.21}/charts/postgresql-6.0.34.tgz (100%) create mode 100644 stable/home-assistant/12.0.21/helm-values.md create mode 100644 stable/home-assistant/12.0.21/ix_values.yaml create mode 100644 stable/home-assistant/12.0.21/questions.yaml create mode 100644 stable/home-assistant/12.0.21/security.md create mode 100644 stable/home-assistant/12.0.21/templates/_configmap.tpl create mode 100644 stable/home-assistant/12.0.21/templates/common.yaml create mode 100644 stable/home-assistant/12.0.21/templates/secret.yaml rename stable/{ipfs/0.0.6 => home-assistant/12.0.21}/values.yaml (100%) delete mode 100644 stable/htpcmanager/0.0.5/Chart.lock rename stable/htpcmanager/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{jackett/9.0.51 => htpcmanager/0.0.6}/CONFIG.md (100%) create mode 100644 stable/htpcmanager/0.0.6/Chart.lock rename stable/htpcmanager/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/README.md (100%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{jackett/9.0.51 => htpcmanager/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/htpcmanager/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{icinga2/0.0.13 => htpcmanager/0.0.6}/templates/common.yaml (100%) rename stable/{jackett/9.0.51 => htpcmanager/0.0.6}/values.yaml (100%) delete mode 100644 stable/hyperion-ng/4.0.27/Chart.lock rename stable/hyperion-ng/{4.0.27 => 4.0.28}/CHANGELOG.md (90%) rename stable/{jdownloader2/5.0.5 => hyperion-ng/4.0.28}/CONFIG.md (100%) create mode 100644 stable/hyperion-ng/4.0.28/Chart.lock rename stable/hyperion-ng/{4.0.27 => 4.0.28}/Chart.yaml (97%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/README.md (100%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/app-readme.md (100%) rename stable/{jdownloader2/5.0.5 => hyperion-ng/4.0.28}/charts/common-8.9.24.tgz (100%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/helm-values.md (100%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/ix_values.yaml (100%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/questions.yaml (99%) rename stable/hyperion-ng/{4.0.27 => 4.0.28}/security.md (100%) rename stable/{ipfs/0.0.6 => hyperion-ng/4.0.28}/templates/common.yaml (100%) rename stable/{jdownloader2/5.0.5 => hyperion-ng/4.0.28}/values.yaml (100%) delete mode 100644 stable/icantbelieveitsnotvaletudo/2.0.24/Chart.lock rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/CHANGELOG.md (89%) rename stable/{jellyfin/9.0.25 => icantbelieveitsnotvaletudo/2.0.25}/CONFIG.md (100%) create mode 100644 stable/icantbelieveitsnotvaletudo/2.0.25/Chart.lock rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/Chart.yaml (98%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/README.md (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{jellyfin/9.0.25 => icantbelieveitsnotvaletudo/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/questions.yaml (99%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/security.md (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/icantbelieveitsnotvaletudo/{2.0.24 => 2.0.25}/templates/configmap.yaml (100%) rename stable/{jellyfin/9.0.25 => icantbelieveitsnotvaletudo/2.0.25}/values.yaml (100%) delete mode 100644 stable/icinga2/0.0.13/Chart.lock rename stable/icinga2/{0.0.13 => 0.0.14}/CHANGELOG.md (94%) rename stable/{joplin-server/5.0.15 => icinga2/0.0.14}/CONFIG.md (100%) create mode 100644 stable/icinga2/0.0.14/Chart.lock rename stable/icinga2/{0.0.13 => 0.0.14}/Chart.yaml (98%) rename stable/icinga2/{0.0.13 => 0.0.14}/README.md (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/app-readme.md (100%) rename stable/{joplin-server/5.0.15 => icinga2/0.0.14}/charts/common-8.9.24.tgz (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/charts/mariadb-1.0.37.tgz (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/helm-values.md (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/ix_values.yaml (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/questions.yaml (100%) rename stable/icinga2/{0.0.13 => 0.0.14}/security.md (100%) rename stable/{jackett/9.0.51 => icinga2/0.0.14}/templates/common.yaml (100%) rename stable/{joplin-server/5.0.15 => icinga2/0.0.14}/values.yaml (100%) delete mode 100644 stable/ipfs/0.0.6/Chart.lock rename stable/ipfs/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{kanboard/5.0.16 => ipfs/0.0.7}/CONFIG.md (100%) create mode 100644 stable/ipfs/0.0.7/Chart.lock rename stable/ipfs/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/ipfs/{0.0.6 => 0.0.7}/README.md (100%) rename stable/ipfs/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{kanboard/5.0.16 => ipfs/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/ipfs/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/ipfs/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/ipfs/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/ipfs/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{jdownloader2/5.0.5 => ipfs/0.0.7}/templates/common.yaml (100%) rename stable/{kanboard/5.0.16 => ipfs/0.0.7}/values.yaml (100%) delete mode 100644 stable/jackett/9.0.51/Chart.lock rename stable/jackett/{9.0.51 => 9.0.52}/CHANGELOG.md (92%) rename stable/{kms/9.0.29 => jackett/9.0.52}/CONFIG.md (100%) create mode 100644 stable/jackett/9.0.52/Chart.lock rename stable/jackett/{9.0.51 => 9.0.52}/Chart.yaml (97%) rename stable/jackett/{9.0.51 => 9.0.52}/README.md (100%) rename stable/jackett/{9.0.51 => 9.0.52}/app-readme.md (100%) rename stable/{kms/9.0.29 => jackett/9.0.52}/charts/common-8.9.24.tgz (100%) rename stable/jackett/{9.0.51 => 9.0.52}/helm-values.md (100%) rename stable/jackett/{9.0.51 => 9.0.52}/ix_values.yaml (100%) rename stable/jackett/{9.0.51 => 9.0.52}/questions.yaml (100%) rename stable/jackett/{9.0.51 => 9.0.52}/security.md (100%) rename stable/{jellyfin/9.0.25 => jackett/9.0.52}/templates/common.yaml (100%) rename stable/{kms/9.0.29 => jackett/9.0.52}/values.yaml (100%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/CHANGELOG.md (88%) rename stable/{kodi-headless/0.0.6 => jdownloader2/5.0.6}/CONFIG.md (100%) create mode 100644 stable/jdownloader2/5.0.6/Chart.lock rename stable/jdownloader2/{5.0.5 => 5.0.6}/Chart.yaml (98%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/README.md (100%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{kodi-headless/0.0.6 => jdownloader2/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/helm-values.md (97%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/ix_values.yaml (91%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/jdownloader2/{5.0.5 => 5.0.6}/security.md (100%) rename stable/{joplin-server/5.0.15 => jdownloader2/5.0.6}/templates/common.yaml (100%) rename stable/{kodi-headless/0.0.6 => jdownloader2/5.0.6}/values.yaml (100%) delete mode 100644 stable/jellyfin/9.0.25/Chart.lock rename stable/jellyfin/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{komga/4.0.32 => jellyfin/9.0.26}/CONFIG.md (100%) create mode 100644 stable/jellyfin/9.0.26/Chart.lock rename stable/jellyfin/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/jellyfin/{9.0.25 => 9.0.26}/README.md (100%) rename stable/jellyfin/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{komga/4.0.32 => jellyfin/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/jellyfin/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/jellyfin/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/jellyfin/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/jellyfin/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{kanboard/5.0.16 => jellyfin/9.0.26}/templates/common.yaml (100%) rename stable/{komga/4.0.32 => jellyfin/9.0.26}/values.yaml (100%) delete mode 100644 stable/joplin-server/5.0.15/Chart.lock rename stable/joplin-server/{5.0.15 => 5.0.16}/CHANGELOG.md (84%) rename stable/{lazylibrarian/9.0.32 => joplin-server/5.0.16}/CONFIG.md (100%) create mode 100644 stable/joplin-server/5.0.16/Chart.lock rename stable/joplin-server/{5.0.15 => 5.0.16}/Chart.yaml (98%) rename stable/joplin-server/{5.0.15 => 5.0.16}/README.md (100%) rename stable/joplin-server/{5.0.15 => 5.0.16}/app-readme.md (100%) rename stable/{lazylibrarian/9.0.32 => joplin-server/5.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{mealie/5.0.6 => joplin-server/5.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/joplin-server/{5.0.15 => 5.0.16}/helm-values.md (89%) rename stable/joplin-server/{5.0.15 => 5.0.16}/ix_values.yaml (99%) rename stable/joplin-server/{5.0.15 => 5.0.16}/questions.yaml (99%) rename stable/joplin-server/{5.0.15 => 5.0.16}/security.md (100%) rename stable/{kms/9.0.29 => joplin-server/5.0.16}/templates/common.yaml (100%) rename stable/{lazylibrarian/9.0.32 => joplin-server/5.0.16}/values.yaml (100%) delete mode 100644 stable/kanboard/5.0.16/Chart.lock rename stable/kanboard/{5.0.16 => 5.0.17}/CHANGELOG.md (88%) rename stable/{leaf2mqtt/2.0.24 => kanboard/5.0.17}/CONFIG.md (100%) rename stable/{gotify/5.0.16 => kanboard/5.0.17}/Chart.lock (84%) rename stable/kanboard/{5.0.16 => 5.0.17}/Chart.yaml (98%) rename stable/kanboard/{5.0.16 => 5.0.17}/README.md (100%) rename stable/kanboard/{5.0.16 => 5.0.17}/app-readme.md (100%) rename stable/{leaf2mqtt/2.0.24 => kanboard/5.0.17}/charts/common-8.9.24.tgz (100%) rename stable/{miniflux/4.0.16 => kanboard/5.0.17}/charts/postgresql-6.0.34.tgz (100%) rename stable/kanboard/{5.0.16 => 5.0.17}/helm-values.md (90%) rename stable/kanboard/{5.0.16 => 5.0.17}/ix_values.yaml (99%) rename stable/kanboard/{5.0.16 => 5.0.17}/questions.yaml (99%) rename stable/kanboard/{5.0.16 => 5.0.17}/security.md (100%) rename stable/{kodi-headless/0.0.6 => kanboard/5.0.17}/templates/common.yaml (100%) rename stable/{leaf2mqtt/2.0.24 => kanboard/5.0.17}/values.yaml (100%) delete mode 100644 stable/kms/9.0.29/Chart.lock rename stable/kms/{9.0.29 => 9.0.30}/CHANGELOG.md (89%) rename stable/{leantime/1.0.1 => kms/9.0.30}/CONFIG.md (100%) create mode 100644 stable/kms/9.0.30/Chart.lock rename stable/kms/{9.0.29 => 9.0.30}/Chart.yaml (97%) rename stable/kms/{9.0.29 => 9.0.30}/README.md (100%) rename stable/kms/{9.0.29 => 9.0.30}/app-readme.md (100%) rename stable/{leantime/1.0.1 => kms/9.0.30}/charts/common-8.9.24.tgz (100%) rename stable/kms/{9.0.29 => 9.0.30}/helm-values.md (100%) rename stable/kms/{9.0.29 => 9.0.30}/ix_values.yaml (100%) rename stable/kms/{9.0.29 => 9.0.30}/questions.yaml (99%) rename stable/kms/{9.0.29 => 9.0.30}/security.md (100%) rename stable/{komga/4.0.32 => kms/9.0.30}/templates/common.yaml (100%) rename stable/{leantime/1.0.1 => kms/9.0.30}/values.yaml (100%) delete mode 100644 stable/kodi-headless/0.0.6/Chart.lock rename stable/kodi-headless/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{libreoffice/0.0.5 => kodi-headless/0.0.7}/CONFIG.md (100%) create mode 100644 stable/kodi-headless/0.0.7/Chart.lock rename stable/kodi-headless/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/README.md (100%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{libreoffice/0.0.5 => kodi-headless/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/kodi-headless/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{lazylibrarian/9.0.32 => kodi-headless/0.0.7}/templates/common.yaml (100%) rename stable/{libreoffice/0.0.5 => kodi-headless/0.0.7}/values.yaml (100%) delete mode 100644 stable/komga/4.0.32/Chart.lock rename stable/komga/{4.0.32 => 4.0.33}/CHANGELOG.md (77%) rename stable/{librespeed/4.0.28 => komga/4.0.33}/CONFIG.md (100%) create mode 100644 stable/komga/4.0.33/Chart.lock rename stable/komga/{4.0.32 => 4.0.33}/Chart.yaml (97%) rename stable/komga/{4.0.32 => 4.0.33}/README.md (100%) rename stable/komga/{4.0.32 => 4.0.33}/app-readme.md (100%) rename stable/{librespeed/4.0.28 => komga/4.0.33}/charts/common-8.9.24.tgz (100%) rename stable/komga/{4.0.32 => 4.0.33}/helm-values.md (100%) rename stable/komga/{4.0.32 => 4.0.33}/ix_values.yaml (100%) rename stable/komga/{4.0.32 => 4.0.33}/questions.yaml (99%) rename stable/komga/{4.0.32 => 4.0.33}/security.md (99%) rename stable/{libreoffice/0.0.5 => komga/4.0.33}/templates/common.yaml (100%) rename stable/{librespeed/4.0.28 => komga/4.0.33}/values.yaml (100%) delete mode 100644 stable/lazylibrarian/9.0.32/Chart.lock rename stable/lazylibrarian/{9.0.32 => 9.0.33}/CHANGELOG.md (82%) rename stable/{lidarr/9.0.26 => lazylibrarian/9.0.33}/CONFIG.md (100%) create mode 100644 stable/lazylibrarian/9.0.33/Chart.lock rename stable/lazylibrarian/{9.0.32 => 9.0.33}/Chart.yaml (97%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/README.md (100%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/app-readme.md (100%) rename stable/{lidarr/9.0.26 => lazylibrarian/9.0.33}/charts/common-8.9.24.tgz (100%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/helm-values.md (100%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/ix_values.yaml (100%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/questions.yaml (99%) rename stable/lazylibrarian/{9.0.32 => 9.0.33}/security.md (100%) rename stable/{librespeed/4.0.28 => lazylibrarian/9.0.33}/templates/common.yaml (100%) rename stable/{lidarr/9.0.26 => lazylibrarian/9.0.33}/values.yaml (100%) delete mode 100644 stable/leaf2mqtt/2.0.24/Chart.lock rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/CHANGELOG.md (93%) rename stable/{littlelink/4.0.38 => leaf2mqtt/2.0.25}/CONFIG.md (100%) create mode 100644 stable/leaf2mqtt/2.0.25/Chart.lock rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/Chart.yaml (97%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/README.md (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{littlelink/4.0.38 => leaf2mqtt/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/ix_values.yaml (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/questions.yaml (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/security.md (100%) rename stable/leaf2mqtt/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{littlelink/4.0.38 => leaf2mqtt/2.0.25}/values.yaml (100%) delete mode 100644 stable/leantime/1.0.1/Chart.lock rename stable/leantime/{1.0.1 => 1.0.2}/CHANGELOG.md (92%) rename stable/{logitech-media-server/2.0.35 => leantime/1.0.2}/CONFIG.md (100%) create mode 100644 stable/leantime/1.0.2/Chart.lock rename stable/leantime/{1.0.1 => 1.0.2}/Chart.yaml (98%) rename stable/leantime/{1.0.1 => 1.0.2}/README.md (100%) rename stable/leantime/{1.0.1 => 1.0.2}/app-readme.md (100%) rename stable/{logitech-media-server/2.0.35 => leantime/1.0.2}/charts/common-8.9.24.tgz (100%) rename stable/leantime/{1.0.1 => 1.0.2}/charts/mariadb-1.0.37.tgz (100%) rename stable/leantime/{1.0.1 => 1.0.2}/helm-values.md (100%) rename stable/leantime/{1.0.1 => 1.0.2}/ix_values.yaml (100%) rename stable/leantime/{1.0.1 => 1.0.2}/questions.yaml (100%) rename stable/leantime/{1.0.1 => 1.0.2}/security.md (100%) rename stable/leantime/{1.0.1 => 1.0.2}/templates/_secrets.tpl (100%) rename stable/leantime/{1.0.1 => 1.0.2}/templates/common.yaml (100%) rename stable/{logitech-media-server/2.0.35 => leantime/1.0.2}/values.yaml (100%) delete mode 100644 stable/libreoffice/0.0.5/Chart.lock rename stable/libreoffice/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{loki/2.0.12 => libreoffice/0.0.6}/CONFIG.md (100%) create mode 100644 stable/libreoffice/0.0.6/Chart.lock rename stable/libreoffice/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/libreoffice/{0.0.5 => 0.0.6}/README.md (100%) rename stable/libreoffice/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{loki/2.0.12 => libreoffice/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/libreoffice/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/libreoffice/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/libreoffice/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/libreoffice/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{lidarr/9.0.26 => libreoffice/0.0.6}/templates/common.yaml (100%) rename stable/{loki/2.0.12 => libreoffice/0.0.6}/values.yaml (100%) delete mode 100644 stable/librespeed/4.0.28/Chart.lock rename stable/librespeed/{4.0.28 => 4.0.29}/CHANGELOG.md (90%) rename stable/{lychee/9.0.25 => librespeed/4.0.29}/CONFIG.md (100%) create mode 100644 stable/librespeed/4.0.29/Chart.lock rename stable/librespeed/{4.0.28 => 4.0.29}/Chart.yaml (98%) rename stable/librespeed/{4.0.28 => 4.0.29}/README.md (100%) rename stable/librespeed/{4.0.28 => 4.0.29}/app-readme.md (100%) rename stable/{lychee/9.0.25 => librespeed/4.0.29}/charts/common-8.9.24.tgz (100%) rename stable/librespeed/{4.0.28 => 4.0.29}/ci/ct-values.yaml (100%) rename stable/librespeed/{4.0.28 => 4.0.29}/helm-values.md (100%) rename stable/librespeed/{4.0.28 => 4.0.29}/ix_values.yaml (100%) rename stable/librespeed/{4.0.28 => 4.0.29}/questions.yaml (99%) rename stable/librespeed/{4.0.28 => 4.0.29}/security.md (100%) rename stable/{logitech-media-server/2.0.35 => librespeed/4.0.29}/templates/common.yaml (100%) rename stable/{lychee/9.0.25 => librespeed/4.0.29}/values.yaml (100%) delete mode 100644 stable/lidarr/9.0.26/Chart.lock rename stable/lidarr/{9.0.26 => 9.0.27}/CHANGELOG.md (89%) rename stable/{mealie/5.0.6 => lidarr/9.0.27}/CONFIG.md (100%) create mode 100644 stable/lidarr/9.0.27/Chart.lock rename stable/lidarr/{9.0.26 => 9.0.27}/Chart.yaml (97%) rename stable/lidarr/{9.0.26 => 9.0.27}/README.md (100%) rename stable/lidarr/{9.0.26 => 9.0.27}/app-readme.md (100%) rename stable/{mealie/5.0.6 => lidarr/9.0.27}/charts/common-8.9.24.tgz (100%) rename stable/lidarr/{9.0.26 => 9.0.27}/helm-values.md (100%) rename stable/lidarr/{9.0.26 => 9.0.27}/ix_values.yaml (100%) rename stable/lidarr/{9.0.26 => 9.0.27}/questions.yaml (99%) rename stable/lidarr/{9.0.26 => 9.0.27}/security.md (100%) rename stable/{loki/2.0.12 => lidarr/9.0.27}/templates/common.yaml (100%) rename stable/{mealie/5.0.6 => lidarr/9.0.27}/values.yaml (100%) delete mode 100644 stable/littlelink/4.0.38/Chart.lock rename stable/littlelink/{4.0.38 => 4.0.39}/CHANGELOG.md (89%) rename stable/{medusa/1.0.28 => littlelink/4.0.39}/CONFIG.md (100%) create mode 100644 stable/littlelink/4.0.39/Chart.lock rename stable/littlelink/{4.0.38 => 4.0.39}/Chart.yaml (97%) rename stable/littlelink/{4.0.38 => 4.0.39}/README.md (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/app-readme.md (100%) rename stable/{medusa/1.0.28 => littlelink/4.0.39}/charts/common-8.9.24.tgz (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/helm-values.md (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/ix_values.yaml (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/questions.yaml (99%) rename stable/littlelink/{4.0.38 => 4.0.39}/security.md (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/templates/_configmap.tpl (100%) rename stable/littlelink/{4.0.38 => 4.0.39}/templates/common.yaml (100%) rename stable/{medusa/1.0.28 => littlelink/4.0.39}/values.yaml (100%) delete mode 100644 stable/logitech-media-server/2.0.35/Chart.lock rename stable/logitech-media-server/{2.0.35 => 2.0.36}/CHANGELOG.md (83%) rename stable/{minetest/0.0.5 => logitech-media-server/2.0.36}/CONFIG.md (100%) create mode 100644 stable/logitech-media-server/2.0.36/Chart.lock rename stable/logitech-media-server/{2.0.35 => 2.0.36}/Chart.yaml (98%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/README.md (100%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/app-readme.md (100%) rename stable/{minetest/0.0.5 => logitech-media-server/2.0.36}/charts/common-8.9.24.tgz (100%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/helm-values.md (96%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/ix_values.yaml (99%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/questions.yaml (98%) rename stable/logitech-media-server/{2.0.35 => 2.0.36}/security.md (100%) rename stable/{lychee/9.0.25 => logitech-media-server/2.0.36}/templates/common.yaml (100%) rename stable/{minetest/0.0.5 => logitech-media-server/2.0.36}/values.yaml (100%) rename stable/loki/{2.0.12 => 2.0.13}/CHANGELOG.md (94%) rename stable/{miniflux/4.0.16 => loki/2.0.13}/CONFIG.md (100%) rename stable/loki/{2.0.12 => 2.0.13}/Chart.lock (84%) rename stable/loki/{2.0.12 => 2.0.13}/Chart.yaml (97%) rename stable/loki/{2.0.12 => 2.0.13}/README.md (100%) rename stable/loki/{2.0.12 => 2.0.13}/app-readme.md (100%) rename stable/{miniflux/4.0.16 => loki/2.0.13}/charts/common-8.9.24.tgz (100%) rename stable/loki/{2.0.12 => 2.0.13}/charts/promtail-1.0.15.tgz (100%) rename stable/loki/{2.0.12 => 2.0.13}/helm-values.md (100%) rename stable/loki/{2.0.12 => 2.0.13}/ix_values.yaml (100%) rename stable/loki/{2.0.12 => 2.0.13}/questions.yaml (100%) rename stable/loki/{2.0.12 => 2.0.13}/security.md (100%) rename stable/loki/{2.0.12 => 2.0.13}/templates/_helpers.tpl (100%) rename stable/{mealie/5.0.6 => loki/2.0.13}/templates/common.yaml (100%) rename stable/loki/{2.0.12 => 2.0.13}/templates/configmap-alert.yaml (100%) rename stable/loki/{2.0.12 => 2.0.13}/templates/secret.yaml (100%) rename stable/{miniflux/4.0.16 => loki/2.0.13}/values.yaml (100%) delete mode 100644 stable/lychee/9.0.25/Chart.lock rename stable/lychee/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{minio-console/1.0.29 => lychee/9.0.26}/CONFIG.md (100%) create mode 100644 stable/lychee/9.0.26/Chart.lock rename stable/lychee/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/lychee/{9.0.25 => 9.0.26}/README.md (100%) rename stable/lychee/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{minio-console/1.0.29 => lychee/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/lychee/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/lychee/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/lychee/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/lychee/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{minetest/0.0.5 => lychee/9.0.26}/templates/common.yaml (100%) rename stable/{minio-console/1.0.29 => lychee/9.0.26}/values.yaml (100%) delete mode 100644 stable/mealie/5.0.6/Chart.lock rename stable/mealie/{5.0.6 => 5.0.7}/CHANGELOG.md (87%) rename stable/{minio/1.0.12 => mealie/5.0.7}/CONFIG.md (100%) create mode 100644 stable/mealie/5.0.7/Chart.lock rename stable/mealie/{5.0.6 => 5.0.7}/Chart.yaml (98%) rename stable/mealie/{5.0.6 => 5.0.7}/README.md (100%) rename stable/mealie/{5.0.6 => 5.0.7}/app-readme.md (100%) rename stable/{minio/1.0.12 => mealie/5.0.7}/charts/common-8.9.24.tgz (100%) rename stable/{odoo/4.0.15 => mealie/5.0.7}/charts/postgresql-6.0.34.tgz (100%) rename stable/mealie/{5.0.6 => 5.0.7}/helm-values.md (91%) rename stable/mealie/{5.0.6 => 5.0.7}/ix_values.yaml (99%) rename stable/mealie/{5.0.6 => 5.0.7}/questions.yaml (99%) rename stable/mealie/{5.0.6 => 5.0.7}/security.md (100%) rename stable/{miniflux/4.0.16 => mealie/5.0.7}/templates/common.yaml (100%) rename stable/{minio/1.0.12 => mealie/5.0.7}/values.yaml (100%) delete mode 100644 stable/medusa/1.0.28/Chart.lock rename stable/medusa/{1.0.28 => 1.0.29}/CHANGELOG.md (90%) rename stable/{minisatip/0.0.6 => medusa/1.0.29}/CONFIG.md (100%) create mode 100644 stable/medusa/1.0.29/Chart.lock rename stable/medusa/{1.0.28 => 1.0.29}/Chart.yaml (97%) rename stable/medusa/{1.0.28 => 1.0.29}/README.md (100%) rename stable/medusa/{1.0.28 => 1.0.29}/app-readme.md (100%) rename stable/{minisatip/0.0.6 => medusa/1.0.29}/charts/common-8.9.24.tgz (100%) rename stable/medusa/{1.0.28 => 1.0.29}/helm-values.md (100%) rename stable/medusa/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename stable/medusa/{1.0.28 => 1.0.29}/questions.yaml (99%) rename stable/medusa/{1.0.28 => 1.0.29}/security.md (100%) rename stable/medusa/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename stable/{minisatip/0.0.6 => medusa/1.0.29}/values.yaml (100%) delete mode 100644 stable/minetest/0.0.5/Chart.lock rename stable/minetest/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{monica/0.0.16 => minetest/0.0.6}/CONFIG.md (100%) create mode 100644 stable/minetest/0.0.6/Chart.lock rename stable/minetest/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/minetest/{0.0.5 => 0.0.6}/README.md (100%) rename stable/minetest/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{monica/0.0.16 => minetest/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/minetest/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/minetest/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/minetest/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/minetest/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{minio-console/1.0.29 => minetest/0.0.6}/templates/common.yaml (100%) rename stable/{monica/0.0.16 => minetest/0.0.6}/values.yaml (100%) delete mode 100644 stable/miniflux/4.0.16/Chart.lock rename stable/miniflux/{4.0.16 => 4.0.17}/CHANGELOG.md (89%) rename stable/{mosquitto/4.0.26 => miniflux/4.0.17}/CONFIG.md (100%) create mode 100644 stable/miniflux/4.0.17/Chart.lock rename stable/miniflux/{4.0.16 => 4.0.17}/Chart.yaml (97%) rename stable/miniflux/{4.0.16 => 4.0.17}/README.md (100%) rename stable/miniflux/{4.0.16 => 4.0.17}/app-readme.md (100%) rename stable/{mosquitto/4.0.26 => miniflux/4.0.17}/charts/common-8.9.24.tgz (100%) rename stable/{openkm/4.0.15 => miniflux/4.0.17}/charts/postgresql-6.0.34.tgz (100%) rename stable/miniflux/{4.0.16 => 4.0.17}/helm-values.md (100%) rename stable/miniflux/{4.0.16 => 4.0.17}/ix_values.yaml (100%) rename stable/miniflux/{4.0.16 => 4.0.17}/questions.yaml (99%) rename stable/miniflux/{4.0.16 => 4.0.17}/security.md (100%) rename stable/{minio/1.0.12 => miniflux/4.0.17}/templates/common.yaml (100%) rename stable/{mosquitto/4.0.26 => miniflux/4.0.17}/values.yaml (100%) delete mode 100644 stable/minio-console/1.0.29/Chart.lock rename stable/minio-console/{1.0.29 => 1.0.30}/CHANGELOG.md (90%) rename stable/{mstream/1.0.24 => minio-console/1.0.30}/CONFIG.md (100%) create mode 100644 stable/minio-console/1.0.30/Chart.lock rename stable/minio-console/{1.0.29 => 1.0.30}/Chart.yaml (97%) rename stable/minio-console/{1.0.29 => 1.0.30}/README.md (100%) rename stable/minio-console/{1.0.29 => 1.0.30}/app-readme.md (100%) rename stable/{mstream/1.0.24 => minio-console/1.0.30}/charts/common-8.9.24.tgz (100%) rename stable/minio-console/{1.0.29 => 1.0.30}/helm-values.md (100%) rename stable/minio-console/{1.0.29 => 1.0.30}/ix_values.yaml (100%) rename stable/minio-console/{1.0.29 => 1.0.30}/questions.yaml (99%) rename stable/minio-console/{1.0.29 => 1.0.30}/security.md (100%) rename stable/{minisatip/0.0.6 => minio-console/1.0.30}/templates/common.yaml (100%) rename stable/{mstream/1.0.24 => minio-console/1.0.30}/values.yaml (100%) delete mode 100644 stable/minio/1.0.12/Chart.lock rename stable/minio/{1.0.12 => 1.0.13}/CHANGELOG.md (85%) rename stable/{muximux/1.0.28 => minio/1.0.13}/CONFIG.md (100%) create mode 100644 stable/minio/1.0.13/Chart.lock rename stable/minio/{1.0.12 => 1.0.13}/Chart.yaml (97%) rename stable/minio/{1.0.12 => 1.0.13}/README.md (100%) rename stable/minio/{1.0.12 => 1.0.13}/app-readme.md (100%) rename stable/{muximux/1.0.28 => minio/1.0.13}/charts/common-8.9.24.tgz (100%) rename stable/minio/{1.0.12 => 1.0.13}/helm-values.md (100%) rename stable/minio/{1.0.12 => 1.0.13}/ix_values.yaml (100%) rename stable/minio/{1.0.12 => 1.0.13}/questions.yaml (99%) rename stable/minio/{1.0.12 => 1.0.13}/security.md (100%) rename stable/{mylar/4.0.24 => minio/1.0.13}/templates/common.yaml (100%) rename stable/{muximux/1.0.28 => minio/1.0.13}/values.yaml (100%) delete mode 100644 stable/minisatip/0.0.6/Chart.lock rename stable/minisatip/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{mylar/4.0.24 => minisatip/0.0.7}/CONFIG.md (100%) create mode 100644 stable/minisatip/0.0.7/Chart.lock rename stable/minisatip/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/minisatip/{0.0.6 => 0.0.7}/README.md (100%) rename stable/minisatip/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{mylar/4.0.24 => minisatip/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/minisatip/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/minisatip/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/minisatip/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/minisatip/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{mysql-workbench/0.0.5 => minisatip/0.0.7}/templates/common.yaml (100%) rename stable/{mylar/4.0.24 => minisatip/0.0.7}/values.yaml (100%) delete mode 100644 stable/monica/0.0.16/Chart.lock rename stable/monica/{0.0.16 => 0.0.17}/CHANGELOG.md (92%) rename stable/{mysql-workbench/0.0.5 => monica/0.0.17}/CONFIG.md (100%) create mode 100644 stable/monica/0.0.17/Chart.lock rename stable/monica/{0.0.16 => 0.0.17}/Chart.yaml (98%) rename stable/monica/{0.0.16 => 0.0.17}/README.md (100%) rename stable/monica/{0.0.16 => 0.0.17}/app-readme.md (100%) rename stable/{mysql-workbench/0.0.5 => monica/0.0.17}/charts/common-8.9.24.tgz (100%) rename stable/monica/{0.0.16 => 0.0.17}/charts/mariadb-1.0.37.tgz (100%) rename stable/monica/{0.0.16 => 0.0.17}/helm-values.md (100%) rename stable/monica/{0.0.16 => 0.0.17}/ix_values.yaml (100%) rename stable/monica/{0.0.16 => 0.0.17}/questions.yaml (100%) rename stable/monica/{0.0.16 => 0.0.17}/security.md (99%) rename stable/monica/{0.0.16 => 0.0.17}/templates/_appkey.tpl (100%) rename stable/monica/{0.0.16 => 0.0.17}/templates/common.yaml (100%) rename stable/{mysql-workbench/0.0.5 => monica/0.0.17}/values.yaml (100%) delete mode 100644 stable/mosquitto/4.0.26/Chart.lock rename stable/mosquitto/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{nano-wallet/0.0.7 => mosquitto/4.0.27}/CONFIG.md (100%) create mode 100644 stable/mosquitto/4.0.27/Chart.lock rename stable/mosquitto/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/mosquitto/{4.0.26 => 4.0.27}/README.md (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{nano-wallet/0.0.7 => mosquitto/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/mosquitto/{4.0.26 => 4.0.27}/security.md (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/templates/common.yaml (100%) rename stable/mosquitto/{4.0.26 => 4.0.27}/templates/configmap.yaml (100%) rename stable/{nano-wallet/0.0.7 => mosquitto/4.0.27}/values.yaml (100%) delete mode 100644 stable/mstream/1.0.24/Chart.lock rename stable/mstream/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{navidrome/9.0.25 => mstream/1.0.25}/CONFIG.md (100%) create mode 100644 stable/mstream/1.0.25/Chart.lock rename stable/mstream/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/mstream/{1.0.24 => 1.0.25}/README.md (100%) rename stable/mstream/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{navidrome/9.0.25 => mstream/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/mstream/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/mstream/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/mstream/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/mstream/{1.0.24 => 1.0.25}/security.md (100%) rename stable/mstream/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{navidrome/9.0.25 => mstream/1.0.25}/values.yaml (100%) delete mode 100644 stable/muximux/1.0.28/Chart.lock rename stable/muximux/{1.0.28 => 1.0.29}/CHANGELOG.md (90%) rename stable/{ngircd/0.0.5 => muximux/1.0.29}/CONFIG.md (100%) create mode 100644 stable/muximux/1.0.29/Chart.lock rename stable/muximux/{1.0.28 => 1.0.29}/Chart.yaml (98%) rename stable/muximux/{1.0.28 => 1.0.29}/README.md (100%) rename stable/muximux/{1.0.28 => 1.0.29}/app-readme.md (100%) rename stable/{ngircd/0.0.5 => muximux/1.0.29}/charts/common-8.9.24.tgz (100%) rename stable/muximux/{1.0.28 => 1.0.29}/helm-values.md (100%) rename stable/muximux/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename stable/muximux/{1.0.28 => 1.0.29}/questions.yaml (99%) rename stable/muximux/{1.0.28 => 1.0.29}/security.md (100%) rename stable/muximux/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename stable/{ngircd/0.0.5 => muximux/1.0.29}/values.yaml (100%) delete mode 100644 stable/mylar/4.0.24/Chart.lock rename stable/mylar/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{nntp2nntp/0.0.5 => mylar/4.0.25}/CONFIG.md (100%) create mode 100644 stable/mylar/4.0.25/Chart.lock rename stable/mylar/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/mylar/{4.0.24 => 4.0.25}/README.md (100%) rename stable/mylar/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{nntp2nntp/0.0.5 => mylar/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/mylar/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/mylar/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/mylar/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/mylar/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{nano-wallet/0.0.7 => mylar/4.0.25}/templates/common.yaml (100%) rename stable/{nntp2nntp/0.0.5 => mylar/4.0.25}/values.yaml (100%) delete mode 100644 stable/mysql-workbench/0.0.5/Chart.lock rename stable/mysql-workbench/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{node-red/9.0.25 => mysql-workbench/0.0.6}/CONFIG.md (100%) create mode 100644 stable/mysql-workbench/0.0.6/Chart.lock rename stable/mysql-workbench/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/README.md (100%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{node-red/9.0.25 => mysql-workbench/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/mysql-workbench/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{navidrome/9.0.25 => mysql-workbench/0.0.6}/templates/common.yaml (100%) rename stable/{node-red/9.0.25 => mysql-workbench/0.0.6}/values.yaml (100%) delete mode 100644 stable/nano-wallet/0.0.7/Chart.lock rename stable/nano-wallet/{0.0.7 => 0.0.8}/CHANGELOG.md (87%) rename stable/{novnc/1.0.24 => nano-wallet/0.0.8}/CONFIG.md (100%) create mode 100644 stable/nano-wallet/0.0.8/Chart.lock rename stable/nano-wallet/{0.0.7 => 0.0.8}/Chart.yaml (98%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/README.md (100%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/app-readme.md (100%) rename stable/{novnc/1.0.24 => nano-wallet/0.0.8}/charts/common-8.9.24.tgz (100%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/helm-values.md (100%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/ix_values.yaml (100%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/questions.yaml (100%) rename stable/nano-wallet/{0.0.7 => 0.0.8}/security.md (100%) rename stable/{ngircd/0.0.5 => nano-wallet/0.0.8}/templates/common.yaml (100%) rename stable/{novnc/1.0.24 => nano-wallet/0.0.8}/values.yaml (100%) delete mode 100644 stable/navidrome/9.0.25/Chart.lock rename stable/navidrome/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{nullserv/4.0.24 => navidrome/9.0.26}/CONFIG.md (100%) create mode 100644 stable/navidrome/9.0.26/Chart.lock rename stable/navidrome/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/navidrome/{9.0.25 => 9.0.26}/README.md (100%) rename stable/navidrome/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{nullserv/4.0.24 => navidrome/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/navidrome/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/navidrome/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/navidrome/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/navidrome/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{nntp2nntp/0.0.5 => navidrome/9.0.26}/templates/common.yaml (100%) rename stable/{nullserv/4.0.24 => navidrome/9.0.26}/values.yaml (100%) create mode 100644 stable/nextcloud/11.0.7/CHANGELOG.md rename stable/{nzbget/9.0.25 => nextcloud/11.0.7}/CONFIG.md (100%) create mode 100644 stable/nextcloud/11.0.7/Chart.lock create mode 100644 stable/nextcloud/11.0.7/Chart.yaml create mode 100644 stable/nextcloud/11.0.7/README.md create mode 100644 stable/nextcloud/11.0.7/app-readme.md rename stable/{nzbget/9.0.25 => nextcloud/11.0.7}/charts/common-8.9.24.tgz (100%) rename stable/{paperless-ng/1.0.3 => nextcloud/11.0.7}/charts/postgresql-6.0.34.tgz (100%) rename stable/{papermerge/0.0.6 => nextcloud/11.0.7}/charts/redis-1.0.39.tgz (100%) create mode 100644 stable/nextcloud/11.0.7/helm-values.md create mode 100644 stable/nextcloud/11.0.7/ix_values.yaml create mode 100644 stable/nextcloud/11.0.7/questions.yaml create mode 100644 stable/nextcloud/11.0.7/security.md create mode 100644 stable/nextcloud/11.0.7/templates/_configmap.tpl create mode 100644 stable/nextcloud/11.0.7/templates/_cronjob.tpl create mode 100644 stable/nextcloud/11.0.7/templates/common.yaml rename stable/{nzbget/9.0.25 => nextcloud/11.0.7}/values.yaml (100%) delete mode 100644 stable/ngircd/0.0.5/Chart.lock rename stable/ngircd/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{nzbhydra/9.0.28 => ngircd/0.0.6}/CONFIG.md (100%) create mode 100644 stable/ngircd/0.0.6/Chart.lock rename stable/ngircd/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/ngircd/{0.0.5 => 0.0.6}/README.md (100%) rename stable/ngircd/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{nzbhydra/9.0.28 => ngircd/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/ngircd/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/ngircd/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/ngircd/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/ngircd/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{node-red/9.0.25 => ngircd/0.0.6}/templates/common.yaml (100%) rename stable/{nzbhydra/9.0.28 => ngircd/0.0.6}/values.yaml (100%) delete mode 100644 stable/nntp2nntp/0.0.5/Chart.lock rename stable/nntp2nntp/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{octoprint/4.0.26 => nntp2nntp/0.0.6}/CONFIG.md (100%) create mode 100644 stable/nntp2nntp/0.0.6/Chart.lock rename stable/nntp2nntp/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/README.md (100%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{octoprint/4.0.26 => nntp2nntp/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/nntp2nntp/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{nullserv/4.0.24 => nntp2nntp/0.0.6}/templates/common.yaml (100%) rename stable/{octoprint/4.0.26 => nntp2nntp/0.0.6}/values.yaml (100%) delete mode 100644 stable/node-red/9.0.25/Chart.lock rename stable/node-red/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{odoo/4.0.15 => node-red/9.0.26}/CONFIG.md (100%) create mode 100644 stable/node-red/9.0.26/Chart.lock rename stable/node-red/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/node-red/{9.0.25 => 9.0.26}/README.md (100%) rename stable/node-red/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{odoo/4.0.15 => node-red/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/node-red/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/node-red/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/node-red/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/node-red/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{nzbget/9.0.25 => node-red/9.0.26}/templates/common.yaml (100%) rename stable/{odoo/4.0.15 => node-red/9.0.26}/values.yaml (100%) delete mode 100644 stable/novnc/1.0.24/Chart.lock rename stable/novnc/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{ombi/9.0.27 => novnc/1.0.25}/CONFIG.md (100%) create mode 100644 stable/novnc/1.0.25/Chart.lock rename stable/novnc/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/novnc/{1.0.24 => 1.0.25}/README.md (100%) rename stable/novnc/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{ombi/9.0.27 => novnc/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/novnc/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/novnc/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/novnc/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/novnc/{1.0.24 => 1.0.25}/security.md (100%) rename stable/novnc/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{ombi/9.0.27 => novnc/1.0.25}/values.yaml (100%) delete mode 100644 stable/nullserv/4.0.24/Chart.lock rename stable/nullserv/{4.0.24 => 4.0.25}/CHANGELOG.md (85%) rename stable/{onlyoffice-document-server/3.0.5 => nullserv/4.0.25}/CONFIG.md (100%) create mode 100644 stable/nullserv/4.0.25/Chart.lock rename stable/nullserv/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/nullserv/{4.0.24 => 4.0.25}/README.md (100%) rename stable/nullserv/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{onlyoffice-document-server/3.0.5 => nullserv/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/nullserv/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/nullserv/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/nullserv/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/nullserv/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{nzbhydra/9.0.28 => nullserv/4.0.25}/templates/common.yaml (100%) rename stable/{onlyoffice-document-server/3.0.5 => nullserv/4.0.25}/values.yaml (100%) delete mode 100644 stable/nzbget/9.0.25/Chart.lock rename stable/nzbget/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{openkm/4.0.15 => nzbget/9.0.26}/CONFIG.md (100%) create mode 100644 stable/nzbget/9.0.26/Chart.lock rename stable/nzbget/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/nzbget/{9.0.25 => 9.0.26}/README.md (100%) rename stable/nzbget/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{openkm/4.0.15 => nzbget/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/nzbget/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/nzbget/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/nzbget/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/nzbget/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{octoprint/4.0.26 => nzbget/9.0.26}/templates/common.yaml (100%) rename stable/{openkm/4.0.15 => nzbget/9.0.26}/values.yaml (100%) delete mode 100644 stable/nzbhydra/9.0.28/Chart.lock rename stable/nzbhydra/{9.0.28 => 9.0.29}/CHANGELOG.md (89%) rename stable/{openldap/5.0.7 => nzbhydra/9.0.29}/CONFIG.md (100%) create mode 100644 stable/nzbhydra/9.0.29/Chart.lock rename stable/nzbhydra/{9.0.28 => 9.0.29}/Chart.yaml (97%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/README.md (100%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/app-readme.md (100%) rename stable/{openldap/5.0.7 => nzbhydra/9.0.29}/charts/common-8.9.24.tgz (100%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/helm-values.md (100%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/ix_values.yaml (100%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/questions.yaml (99%) rename stable/nzbhydra/{9.0.28 => 9.0.29}/security.md (100%) rename stable/{odoo/4.0.15 => nzbhydra/9.0.29}/templates/common.yaml (100%) rename stable/{openldap/5.0.7 => nzbhydra/9.0.29}/values.yaml (100%) delete mode 100644 stable/octoprint/4.0.26/Chart.lock rename stable/octoprint/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{openvscode-server/0.0.6 => octoprint/4.0.27}/CONFIG.md (100%) create mode 100644 stable/octoprint/4.0.27/Chart.lock rename stable/octoprint/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/octoprint/{4.0.26 => 4.0.27}/README.md (100%) rename stable/octoprint/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{openvscode-server/0.0.6 => octoprint/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/octoprint/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/octoprint/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/octoprint/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/octoprint/{4.0.26 => 4.0.27}/security.md (100%) rename stable/{ombi/9.0.27 => octoprint/4.0.27}/templates/common.yaml (100%) rename stable/{openvscode-server/0.0.6 => octoprint/4.0.27}/values.yaml (100%) delete mode 100644 stable/odoo/4.0.15/Chart.lock rename stable/odoo/{4.0.15 => 4.0.16}/CHANGELOG.md (83%) rename stable/{organizr/9.0.25 => odoo/4.0.16}/CONFIG.md (100%) create mode 100644 stable/odoo/4.0.16/Chart.lock rename stable/odoo/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/odoo/{4.0.15 => 4.0.16}/README.md (100%) rename stable/odoo/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{organizr/9.0.25 => odoo/4.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{quassel-core/0.0.6 => odoo/4.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/odoo/{4.0.15 => 4.0.16}/helm-values.md (95%) rename stable/odoo/{4.0.15 => 4.0.16}/ix_values.yaml (98%) rename stable/odoo/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/odoo/{4.0.15 => 4.0.16}/security.md (100%) rename stable/{onlyoffice-document-server/3.0.5 => odoo/4.0.16}/templates/common.yaml (100%) rename stable/{organizr/9.0.25 => odoo/4.0.16}/values.yaml (100%) delete mode 100644 stable/ombi/9.0.27/Chart.lock rename stable/ombi/{9.0.27 => 9.0.28}/CHANGELOG.md (80%) rename stable/{oscam/4.0.24 => ombi/9.0.28}/CONFIG.md (100%) create mode 100644 stable/ombi/9.0.28/Chart.lock rename stable/ombi/{9.0.27 => 9.0.28}/Chart.yaml (97%) rename stable/ombi/{9.0.27 => 9.0.28}/README.md (100%) rename stable/ombi/{9.0.27 => 9.0.28}/app-readme.md (100%) rename stable/{oscam/4.0.24 => ombi/9.0.28}/charts/common-8.9.24.tgz (100%) rename stable/ombi/{9.0.27 => 9.0.28}/helm-values.md (100%) rename stable/ombi/{9.0.27 => 9.0.28}/ix_values.yaml (100%) rename stable/ombi/{9.0.27 => 9.0.28}/questions.yaml (99%) rename stable/ombi/{9.0.27 => 9.0.28}/security.md (100%) rename stable/{openvscode-server/0.0.6 => ombi/9.0.28}/templates/common.yaml (100%) rename stable/{oscam/4.0.24 => ombi/9.0.28}/values.yaml (100%) delete mode 100644 stable/onlyoffice-document-server/3.0.5/Chart.lock rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/CHANGELOG.md (90%) rename stable/{overseerr/4.0.24 => onlyoffice-document-server/3.0.6}/CONFIG.md (100%) rename stable/{jdownloader2/5.0.5 => onlyoffice-document-server/3.0.6}/Chart.lock (79%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/Chart.yaml (98%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/README.md (100%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/app-readme.md (100%) rename stable/{overseerr/4.0.24 => onlyoffice-document-server/3.0.6}/charts/common-8.9.24.tgz (100%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/helm-values.md (100%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/ix_values.yaml (100%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/questions.yaml (99%) rename stable/onlyoffice-document-server/{3.0.5 => 3.0.6}/security.md (100%) rename stable/{organizr/9.0.25 => onlyoffice-document-server/3.0.6}/templates/common.yaml (100%) rename stable/{overseerr/4.0.24 => onlyoffice-document-server/3.0.6}/values.yaml (100%) delete mode 100644 stable/openkm/4.0.15/Chart.lock rename stable/openkm/{4.0.15 => 4.0.16}/CHANGELOG.md (90%) rename stable/{owncast/4.0.24 => openkm/4.0.16}/CONFIG.md (100%) create mode 100644 stable/openkm/4.0.16/Chart.lock rename stable/openkm/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/openkm/{4.0.15 => 4.0.16}/README.md (100%) rename stable/openkm/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{owncast/4.0.24 => openkm/4.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{recipes/5.0.1 => openkm/4.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/openkm/{4.0.15 => 4.0.16}/helm-values.md (100%) rename stable/openkm/{4.0.15 => 4.0.16}/ix_values.yaml (100%) rename stable/openkm/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/openkm/{4.0.15 => 4.0.16}/security.md (100%) rename stable/openkm/{4.0.15 => 4.0.16}/templates/_configmap.tpl (100%) rename stable/openkm/{4.0.15 => 4.0.16}/templates/common.yaml (100%) rename stable/{owncast/4.0.24 => openkm/4.0.16}/values.yaml (100%) delete mode 100644 stable/openldap/5.0.7/Chart.lock rename stable/openldap/{5.0.7 => 5.0.8}/CHANGELOG.md (84%) rename stable/{owncloud-ocis/4.0.26 => openldap/5.0.8}/CONFIG.md (100%) create mode 100644 stable/openldap/5.0.8/Chart.lock rename stable/openldap/{5.0.7 => 5.0.8}/Chart.yaml (97%) rename stable/openldap/{5.0.7 => 5.0.8}/README.md (100%) rename stable/openldap/{5.0.7 => 5.0.8}/app-readme.md (100%) rename stable/{owncloud-ocis/4.0.26 => openldap/5.0.8}/charts/common-8.9.24.tgz (100%) rename stable/openldap/{5.0.7 => 5.0.8}/helm-values.md (100%) rename stable/openldap/{5.0.7 => 5.0.8}/ix_values.yaml (100%) rename stable/openldap/{5.0.7 => 5.0.8}/questions.yaml (99%) rename stable/openldap/{5.0.7 => 5.0.8}/security.md (100%) rename stable/openldap/{5.0.7 => 5.0.8}/templates/_configmap.tpl (100%) rename stable/openldap/{5.0.7 => 5.0.8}/templates/common.yaml (100%) rename stable/{owncloud-ocis/4.0.26 => openldap/5.0.8}/values.yaml (100%) delete mode 100644 stable/openvscode-server/0.0.6/Chart.lock rename stable/openvscode-server/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{paperless-ng/1.0.3 => openvscode-server/0.0.7}/CONFIG.md (100%) create mode 100644 stable/openvscode-server/0.0.7/Chart.lock rename stable/openvscode-server/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/README.md (100%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{paperless-ng/1.0.3 => openvscode-server/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/openvscode-server/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{oscam/4.0.24 => openvscode-server/0.0.7}/templates/common.yaml (100%) rename stable/{paperless-ng/1.0.3 => openvscode-server/0.0.7}/values.yaml (100%) delete mode 100644 stable/organizr/9.0.25/Chart.lock rename stable/organizr/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{papermerge/0.0.6 => organizr/9.0.26}/CONFIG.md (100%) create mode 100644 stable/organizr/9.0.26/Chart.lock rename stable/organizr/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/organizr/{9.0.25 => 9.0.26}/README.md (100%) rename stable/organizr/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{papermerge/0.0.6 => organizr/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/organizr/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/organizr/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/organizr/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/organizr/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{overseerr/4.0.24 => organizr/9.0.26}/templates/common.yaml (100%) rename stable/{papermerge/0.0.6 => organizr/9.0.26}/values.yaml (100%) delete mode 100644 stable/oscam/4.0.24/Chart.lock rename stable/oscam/{4.0.24 => 4.0.25}/CHANGELOG.md (94%) rename stable/{pgadmin/5.0.5 => oscam/4.0.25}/CONFIG.md (100%) create mode 100644 stable/oscam/4.0.25/Chart.lock rename stable/oscam/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/oscam/{4.0.24 => 4.0.25}/README.md (100%) rename stable/oscam/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{pgadmin/5.0.5 => oscam/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/oscam/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/oscam/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/oscam/{4.0.24 => 4.0.25}/questions.yaml (100%) rename stable/oscam/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{owncast/4.0.24 => oscam/4.0.25}/templates/common.yaml (100%) rename stable/{pgadmin/5.0.5 => oscam/4.0.25}/values.yaml (100%) delete mode 100644 stable/overseerr/4.0.24/Chart.lock rename stable/overseerr/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{photoprism/7.0.7 => overseerr/4.0.25}/CONFIG.md (100%) create mode 100644 stable/overseerr/4.0.25/Chart.lock rename stable/overseerr/{4.0.24 => 4.0.25}/Chart.yaml (98%) rename stable/overseerr/{4.0.24 => 4.0.25}/README.md (100%) rename stable/overseerr/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{photoprism/7.0.7 => overseerr/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/overseerr/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/overseerr/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/overseerr/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/overseerr/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{owncloud-ocis/4.0.26 => overseerr/4.0.25}/templates/common.yaml (100%) rename stable/{photoprism/7.0.7 => overseerr/4.0.25}/values.yaml (100%) delete mode 100644 stable/owncast/4.0.24/Chart.lock rename stable/owncast/{4.0.24 => 4.0.25}/CHANGELOG.md (85%) rename stable/{photoshow/1.0.28 => owncast/4.0.25}/CONFIG.md (100%) create mode 100644 stable/owncast/4.0.25/Chart.lock rename stable/owncast/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/owncast/{4.0.24 => 4.0.25}/README.md (100%) rename stable/owncast/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{photoshow/1.0.28 => owncast/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/owncast/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/owncast/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/owncast/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/owncast/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{papermerge/0.0.6 => owncast/4.0.25}/templates/common.yaml (100%) rename stable/{photoshow/1.0.28 => owncast/4.0.25}/values.yaml (100%) delete mode 100644 stable/owncloud-ocis/4.0.26/Chart.lock rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{phpldapadmin/4.0.25 => owncloud-ocis/4.0.27}/CONFIG.md (100%) create mode 100644 stable/owncloud-ocis/4.0.27/Chart.lock rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/README.md (100%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{phpldapadmin/4.0.25 => owncloud-ocis/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/owncloud-ocis/{4.0.26 => 4.0.27}/security.md (100%) rename stable/{pgadmin/5.0.5 => owncloud-ocis/4.0.27}/templates/common.yaml (100%) rename stable/{phpldapadmin/4.0.25 => owncloud-ocis/4.0.27}/values.yaml (100%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/CHANGELOG.md (87%) rename stable/{piaware/4.0.28 => paperless-ng/1.0.4}/CONFIG.md (100%) create mode 100644 stable/paperless-ng/1.0.4/Chart.lock rename stable/paperless-ng/{1.0.3 => 1.0.4}/Chart.yaml (98%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/README.md (100%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/app-readme.md (100%) rename stable/{piaware/4.0.28 => paperless-ng/1.0.4}/charts/common-8.9.24.tgz (100%) rename stable/{shiori/4.0.15 => paperless-ng/1.0.4}/charts/postgresql-6.0.34.tgz (100%) create mode 100644 stable/paperless-ng/1.0.4/charts/redis-1.0.39.tgz rename stable/paperless-ng/{1.0.3 => 1.0.4}/helm-values.md (88%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/ix_values.yaml (99%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/questions.yaml (100%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/security.md (100%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/templates/_sercrets.tpl (100%) rename stable/paperless-ng/{1.0.3 => 1.0.4}/templates/common.yaml (100%) rename stable/{piaware/4.0.28 => paperless-ng/1.0.4}/values.yaml (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{pidgin/0.0.5 => papermerge/0.0.7}/CONFIG.md (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/Chart.lock (84%) rename stable/papermerge/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/papermerge/{0.0.6 => 0.0.7}/README.md (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{pidgin/0.0.5 => papermerge/0.0.7}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/papermerge/0.0.7/charts/redis-1.0.39.tgz rename stable/papermerge/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/papermerge/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{photoprism/7.0.7 => papermerge/0.0.7}/templates/common.yaml (100%) rename stable/{pidgin/0.0.5 => papermerge/0.0.7}/values.yaml (100%) delete mode 100644 stable/pgadmin/5.0.5/Chart.lock rename stable/pgadmin/{5.0.5 => 5.0.6}/CHANGELOG.md (89%) rename stable/{pihole/4.0.27 => pgadmin/5.0.6}/CONFIG.md (100%) create mode 100644 stable/pgadmin/5.0.6/Chart.lock rename stable/pgadmin/{5.0.5 => 5.0.6}/Chart.yaml (97%) rename stable/pgadmin/{5.0.5 => 5.0.6}/README.md (100%) rename stable/pgadmin/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{pihole/4.0.27 => pgadmin/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/pgadmin/{5.0.5 => 5.0.6}/helm-values.md (100%) rename stable/pgadmin/{5.0.5 => 5.0.6}/ix_values.yaml (100%) rename stable/pgadmin/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/pgadmin/{5.0.5 => 5.0.6}/security.md (100%) rename stable/{phpldapadmin/4.0.25 => pgadmin/5.0.6}/templates/common.yaml (100%) rename stable/{pihole/4.0.27 => pgadmin/5.0.6}/values.yaml (100%) delete mode 100644 stable/photoprism/7.0.7/Chart.lock delete mode 100644 stable/photoprism/7.0.7/questions.yaml rename stable/photoprism/{7.0.7 => 7.0.8}/CHANGELOG.md (86%) rename stable/{piwigo/1.0.25 => photoprism/7.0.8}/CONFIG.md (100%) rename stable/{fleet/0.0.5 => photoprism/7.0.8}/Chart.lock (84%) rename stable/photoprism/{7.0.7 => 7.0.8}/Chart.yaml (98%) rename stable/photoprism/{7.0.7 => 7.0.8}/README.md (100%) rename stable/photoprism/{7.0.7 => 7.0.8}/app-readme.md (100%) rename stable/{piwigo/1.0.25 => photoprism/7.0.8}/charts/common-8.9.24.tgz (100%) rename stable/photoprism/{7.0.7 => 7.0.8}/charts/mariadb-1.0.37.tgz (100%) rename stable/photoprism/{7.0.7 => 7.0.8}/helm-values.md (96%) rename stable/photoprism/{7.0.7 => 7.0.8}/ix_values.yaml (84%) create mode 100644 stable/photoprism/7.0.8/questions.yaml rename stable/photoprism/{7.0.7 => 7.0.8}/security.md (100%) rename stable/{piaware/4.0.28 => photoprism/7.0.8}/templates/common.yaml (100%) rename stable/{piwigo/1.0.25 => photoprism/7.0.8}/values.yaml (100%) delete mode 100644 stable/photoshow/1.0.28/Chart.lock rename stable/photoshow/{1.0.28 => 1.0.29}/CHANGELOG.md (90%) rename stable/{pixapop/1.0.24 => photoshow/1.0.29}/CONFIG.md (100%) create mode 100644 stable/photoshow/1.0.29/Chart.lock rename stable/photoshow/{1.0.28 => 1.0.29}/Chart.yaml (98%) rename stable/photoshow/{1.0.28 => 1.0.29}/README.md (100%) rename stable/photoshow/{1.0.28 => 1.0.29}/app-readme.md (100%) rename stable/{pixapop/1.0.24 => photoshow/1.0.29}/charts/common-8.9.24.tgz (100%) rename stable/photoshow/{1.0.28 => 1.0.29}/helm-values.md (100%) rename stable/photoshow/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename stable/photoshow/{1.0.28 => 1.0.29}/questions.yaml (99%) rename stable/photoshow/{1.0.28 => 1.0.29}/security.md (100%) rename stable/photoshow/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename stable/{pixapop/1.0.24 => photoshow/1.0.29}/values.yaml (100%) delete mode 100644 stable/phpldapadmin/4.0.25/Chart.lock rename stable/phpldapadmin/{4.0.25 => 4.0.26}/CHANGELOG.md (90%) rename stable/{plex/8.0.25 => phpldapadmin/4.0.26}/CONFIG.md (100%) create mode 100644 stable/phpldapadmin/4.0.26/Chart.lock rename stable/phpldapadmin/{4.0.25 => 4.0.26}/Chart.yaml (97%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/README.md (100%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/app-readme.md (100%) rename stable/{plex/8.0.25 => phpldapadmin/4.0.26}/charts/common-8.9.24.tgz (100%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/helm-values.md (100%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/ix_values.yaml (100%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/questions.yaml (99%) rename stable/phpldapadmin/{4.0.25 => 4.0.26}/security.md (100%) rename stable/{pidgin/0.0.5 => phpldapadmin/4.0.26}/templates/common.yaml (100%) rename stable/{plex/8.0.25 => phpldapadmin/4.0.26}/values.yaml (100%) delete mode 100644 stable/piaware/4.0.28/Chart.lock rename stable/piaware/{4.0.28 => 4.0.29}/CHANGELOG.md (90%) rename stable/{podgrab/8.0.5 => piaware/4.0.29}/CONFIG.md (100%) create mode 100644 stable/piaware/4.0.29/Chart.lock rename stable/piaware/{4.0.28 => 4.0.29}/Chart.yaml (97%) rename stable/piaware/{4.0.28 => 4.0.29}/README.md (100%) rename stable/piaware/{4.0.28 => 4.0.29}/app-readme.md (100%) rename stable/{podgrab/8.0.5 => piaware/4.0.29}/charts/common-8.9.24.tgz (100%) rename stable/piaware/{4.0.28 => 4.0.29}/ci/ct-values.yaml (100%) rename stable/piaware/{4.0.28 => 4.0.29}/helm-values.md (100%) rename stable/piaware/{4.0.28 => 4.0.29}/ix_values.yaml (100%) rename stable/piaware/{4.0.28 => 4.0.29}/questions.yaml (99%) rename stable/piaware/{4.0.28 => 4.0.29}/security.md (100%) rename stable/{plex/8.0.25 => piaware/4.0.29}/templates/common.yaml (100%) rename stable/{podgrab/8.0.5 => piaware/4.0.29}/values.yaml (100%) delete mode 100644 stable/pidgin/0.0.5/Chart.lock rename stable/pidgin/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{pretend-youre-xyzzy/4.0.24 => pidgin/0.0.6}/CONFIG.md (100%) create mode 100644 stable/pidgin/0.0.6/Chart.lock rename stable/pidgin/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/pidgin/{0.0.5 => 0.0.6}/README.md (100%) rename stable/pidgin/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{pretend-youre-xyzzy/4.0.24 => pidgin/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/pidgin/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/pidgin/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/pidgin/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/pidgin/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{podgrab/8.0.5 => pidgin/0.0.6}/templates/common.yaml (100%) rename stable/{pretend-youre-xyzzy/4.0.24 => pidgin/0.0.6}/values.yaml (100%) delete mode 100644 stable/pihole/4.0.27/Chart.lock rename stable/pihole/{4.0.27 => 4.0.28}/CHANGELOG.md (85%) rename stable/{projectsend/0.0.5 => pihole/4.0.28}/CONFIG.md (100%) create mode 100644 stable/pihole/4.0.28/Chart.lock rename stable/pihole/{4.0.27 => 4.0.28}/Chart.yaml (97%) rename stable/pihole/{4.0.27 => 4.0.28}/README.md (100%) rename stable/pihole/{4.0.27 => 4.0.28}/app-readme.md (100%) rename stable/{projectsend/0.0.5 => pihole/4.0.28}/charts/common-8.9.24.tgz (100%) rename stable/pihole/{4.0.27 => 4.0.28}/helm-values.md (100%) rename stable/pihole/{4.0.27 => 4.0.28}/ix_values.yaml (100%) rename stable/pihole/{4.0.27 => 4.0.28}/questions.yaml (99%) rename stable/pihole/{4.0.27 => 4.0.28}/security.md (100%) rename stable/pihole/{4.0.27 => 4.0.28}/templates/_configmap.tpl (100%) rename stable/pihole/{4.0.27 => 4.0.28}/templates/common.yaml (100%) rename stable/{projectsend/0.0.5 => pihole/4.0.28}/values.yaml (100%) delete mode 100644 stable/piwigo/1.0.25/Chart.lock rename stable/piwigo/{1.0.25 => 1.0.26}/CHANGELOG.md (90%) rename stable/{promcord/2.0.5 => piwigo/1.0.26}/CONFIG.md (100%) create mode 100644 stable/piwigo/1.0.26/Chart.lock rename stable/piwigo/{1.0.25 => 1.0.26}/Chart.yaml (97%) rename stable/piwigo/{1.0.25 => 1.0.26}/README.md (100%) rename stable/piwigo/{1.0.25 => 1.0.26}/app-readme.md (100%) rename stable/{promcord/2.0.5 => piwigo/1.0.26}/charts/common-8.9.24.tgz (100%) rename stable/piwigo/{1.0.25 => 1.0.26}/helm-values.md (100%) rename stable/piwigo/{1.0.25 => 1.0.26}/ix_values.yaml (100%) rename stable/piwigo/{1.0.25 => 1.0.26}/questions.yaml (99%) rename stable/piwigo/{1.0.25 => 1.0.26}/security.md (100%) rename stable/piwigo/{1.0.25 => 1.0.26}/templates/common.yaml (100%) rename stable/{promcord/2.0.5 => piwigo/1.0.26}/values.yaml (100%) delete mode 100644 stable/pixapop/1.0.24/Chart.lock rename stable/pixapop/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{protonmail-bridge/4.0.24 => pixapop/1.0.25}/CONFIG.md (100%) create mode 100644 stable/pixapop/1.0.25/Chart.lock rename stable/pixapop/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/pixapop/{1.0.24 => 1.0.25}/README.md (100%) rename stable/pixapop/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{protonmail-bridge/4.0.24 => pixapop/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/pixapop/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/pixapop/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/pixapop/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/pixapop/{1.0.24 => 1.0.25}/security.md (99%) rename stable/pixapop/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{protonmail-bridge/4.0.24 => pixapop/1.0.25}/values.yaml (100%) delete mode 100644 stable/plex/8.0.25/Chart.lock rename stable/plex/{8.0.25 => 8.0.26}/CHANGELOG.md (91%) rename stable/{prowlarr/4.0.43 => plex/8.0.26}/CONFIG.md (100%) create mode 100644 stable/plex/8.0.26/Chart.lock rename stable/plex/{8.0.25 => 8.0.26}/Chart.yaml (97%) rename stable/plex/{8.0.25 => 8.0.26}/README.md (100%) rename stable/plex/{8.0.25 => 8.0.26}/app-readme.md (100%) rename stable/{prowlarr/4.0.43 => plex/8.0.26}/charts/common-8.9.24.tgz (100%) rename stable/plex/{8.0.25 => 8.0.26}/helm-values.md (100%) rename stable/plex/{8.0.25 => 8.0.26}/ix_values.yaml (100%) rename stable/plex/{8.0.25 => 8.0.26}/questions.yaml (99%) rename stable/plex/{8.0.25 => 8.0.26}/security.md (100%) rename stable/{pretend-youre-xyzzy/4.0.24 => plex/8.0.26}/templates/common.yaml (100%) rename stable/{prowlarr/4.0.43 => plex/8.0.26}/values.yaml (100%) delete mode 100644 stable/podgrab/8.0.5/Chart.lock rename stable/podgrab/{8.0.5 => 8.0.6}/CHANGELOG.md (90%) rename stable/{pwndrop/0.0.5 => podgrab/8.0.6}/CONFIG.md (100%) create mode 100644 stable/podgrab/8.0.6/Chart.lock rename stable/podgrab/{8.0.5 => 8.0.6}/Chart.yaml (98%) rename stable/podgrab/{8.0.5 => 8.0.6}/README.md (100%) rename stable/podgrab/{8.0.5 => 8.0.6}/app-readme.md (100%) rename stable/{pwndrop/0.0.5 => podgrab/8.0.6}/charts/common-8.9.24.tgz (100%) rename stable/podgrab/{8.0.5 => 8.0.6}/helm-values.md (100%) rename stable/podgrab/{8.0.5 => 8.0.6}/ix_values.yaml (100%) rename stable/podgrab/{8.0.5 => 8.0.6}/questions.yaml (99%) rename stable/podgrab/{8.0.5 => 8.0.6}/security.md (100%) rename stable/{projectsend/0.0.5 => podgrab/8.0.6}/templates/common.yaml (100%) rename stable/{pwndrop/0.0.5 => podgrab/8.0.6}/values.yaml (100%) delete mode 100644 stable/pretend-youre-xyzzy/4.0.24/Chart.lock rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{pydio-cells/0.0.6 => pretend-youre-xyzzy/4.0.25}/CONFIG.md (100%) create mode 100644 stable/pretend-youre-xyzzy/4.0.25/Chart.lock rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/README.md (100%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{pydio-cells/0.0.6 => pretend-youre-xyzzy/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/pretend-youre-xyzzy/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{protonmail-bridge/4.0.24 => pretend-youre-xyzzy/4.0.25}/templates/common.yaml (100%) rename stable/{pydio-cells/0.0.6 => pretend-youre-xyzzy/4.0.25}/values.yaml (100%) delete mode 100644 stable/projectsend/0.0.5/Chart.lock rename stable/projectsend/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{pyload/4.0.24 => projectsend/0.0.6}/CONFIG.md (100%) create mode 100644 stable/projectsend/0.0.6/Chart.lock rename stable/projectsend/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/projectsend/{0.0.5 => 0.0.6}/README.md (100%) rename stable/projectsend/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{pyload/4.0.24 => projectsend/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/projectsend/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/projectsend/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/projectsend/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/projectsend/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{prowlarr/4.0.43 => projectsend/0.0.6}/templates/common.yaml (100%) rename stable/{pyload/4.0.24 => projectsend/0.0.6}/values.yaml (100%) delete mode 100644 stable/promcord/2.0.5/Chart.lock rename stable/promcord/{2.0.5 => 2.0.6}/CHANGELOG.md (92%) rename stable/{pylon/0.0.5 => promcord/2.0.6}/CONFIG.md (100%) create mode 100644 stable/promcord/2.0.6/Chart.lock rename stable/promcord/{2.0.5 => 2.0.6}/Chart.yaml (97%) rename stable/promcord/{2.0.5 => 2.0.6}/README.md (100%) rename stable/promcord/{2.0.5 => 2.0.6}/app-readme.md (100%) rename stable/{pylon/0.0.5 => promcord/2.0.6}/charts/common-8.9.24.tgz (100%) rename stable/promcord/{2.0.5 => 2.0.6}/ci/no-values.yaml (100%) rename stable/promcord/{2.0.5 => 2.0.6}/helm-values.md (100%) rename stable/promcord/{2.0.5 => 2.0.6}/ix_values.yaml (100%) rename stable/promcord/{2.0.5 => 2.0.6}/questions.yaml (100%) rename stable/promcord/{2.0.5 => 2.0.6}/security.md (100%) rename stable/promcord/{2.0.5 => 2.0.6}/templates/common.yaml (100%) rename stable/promcord/{2.0.5 => 2.0.6}/templates/prometheusrules.yaml (100%) rename stable/promcord/{2.0.5 => 2.0.6}/templates/servicemonitor.yaml (100%) rename stable/{pylon/0.0.5 => promcord/2.0.6}/values.yaml (100%) delete mode 100644 stable/protonmail-bridge/4.0.24/Chart.lock rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{qbittorrent/9.0.27 => protonmail-bridge/4.0.25}/CONFIG.md (100%) create mode 100644 stable/protonmail-bridge/4.0.25/Chart.lock rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/README.md (100%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{qbittorrent/9.0.27 => protonmail-bridge/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/protonmail-bridge/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{pwndrop/0.0.5 => protonmail-bridge/4.0.25}/templates/common.yaml (100%) rename stable/{qbittorrent/9.0.27 => protonmail-bridge/4.0.25}/values.yaml (100%) delete mode 100644 stable/prowlarr/4.0.43/Chart.lock rename stable/prowlarr/{4.0.43 => 4.0.44}/CHANGELOG.md (90%) rename stable/{quassel-core/0.0.6 => prowlarr/4.0.44}/CONFIG.md (100%) create mode 100644 stable/prowlarr/4.0.44/Chart.lock rename stable/prowlarr/{4.0.43 => 4.0.44}/Chart.yaml (97%) rename stable/prowlarr/{4.0.43 => 4.0.44}/README.md (100%) rename stable/prowlarr/{4.0.43 => 4.0.44}/app-readme.md (100%) rename stable/{quassel-core/0.0.6 => prowlarr/4.0.44}/charts/common-8.9.24.tgz (100%) rename stable/prowlarr/{4.0.43 => 4.0.44}/helm-values.md (100%) rename stable/prowlarr/{4.0.43 => 4.0.44}/ix_values.yaml (100%) rename stable/prowlarr/{4.0.43 => 4.0.44}/questions.yaml (99%) rename stable/prowlarr/{4.0.43 => 4.0.44}/security.md (100%) rename stable/{pydio-cells/0.0.6 => prowlarr/4.0.44}/templates/common.yaml (100%) rename stable/{quassel-core/0.0.6 => prowlarr/4.0.44}/values.yaml (100%) delete mode 100644 stable/pwndrop/0.0.5/Chart.lock rename stable/pwndrop/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{quassel-web/0.0.5 => pwndrop/0.0.6}/CONFIG.md (100%) create mode 100644 stable/pwndrop/0.0.6/Chart.lock rename stable/pwndrop/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/pwndrop/{0.0.5 => 0.0.6}/README.md (100%) rename stable/pwndrop/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{quassel-web/0.0.5 => pwndrop/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/pwndrop/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/pwndrop/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/pwndrop/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/pwndrop/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{pyload/4.0.24 => pwndrop/0.0.6}/templates/common.yaml (100%) rename stable/{quassel-web/0.0.5 => pwndrop/0.0.6}/values.yaml (100%) delete mode 100644 stable/pydio-cells/0.0.6/Chart.lock rename stable/pydio-cells/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{radarr/9.0.25 => pydio-cells/0.0.7}/CONFIG.md (100%) create mode 100644 stable/pydio-cells/0.0.7/Chart.lock rename stable/pydio-cells/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/README.md (100%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{radarr/9.0.25 => pydio-cells/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/pydio-cells/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{pylon/0.0.5 => pydio-cells/0.0.7}/templates/common.yaml (100%) rename stable/{radarr/9.0.25 => pydio-cells/0.0.7}/values.yaml (100%) delete mode 100644 stable/pyload/4.0.24/Chart.lock rename stable/pyload/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) rename stable/{readarr/9.0.38 => pyload/4.0.25}/CONFIG.md (100%) create mode 100644 stable/pyload/4.0.25/Chart.lock rename stable/pyload/{4.0.24 => 4.0.25}/Chart.yaml (98%) rename stable/pyload/{4.0.24 => 4.0.25}/README.md (100%) rename stable/pyload/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{readarr/9.0.38 => pyload/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/pyload/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/pyload/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/pyload/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/pyload/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{quassel-core/0.0.6 => pyload/4.0.25}/templates/common.yaml (100%) rename stable/{readarr/9.0.38 => pyload/4.0.25}/values.yaml (100%) delete mode 100644 stable/pylon/0.0.5/Chart.lock rename stable/pylon/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{recipes/5.0.1 => pylon/0.0.6}/CONFIG.md (100%) create mode 100644 stable/pylon/0.0.6/Chart.lock rename stable/pylon/{0.0.5 => 0.0.6}/Chart.yaml (97%) rename stable/pylon/{0.0.5 => 0.0.6}/README.md (100%) rename stable/pylon/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{recipes/5.0.1 => pylon/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/pylon/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/pylon/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/pylon/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/pylon/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{quassel-web/0.0.5 => pylon/0.0.6}/templates/common.yaml (100%) rename stable/{recipes/5.0.1 => pylon/0.0.6}/values.yaml (100%) delete mode 100644 stable/qbittorrent/9.0.27/Chart.lock rename stable/qbittorrent/{9.0.27 => 9.0.28}/CHANGELOG.md (86%) rename stable/{reg/4.0.23 => qbittorrent/9.0.28}/CONFIG.md (100%) create mode 100644 stable/qbittorrent/9.0.28/Chart.lock rename stable/qbittorrent/{9.0.27 => 9.0.28}/Chart.yaml (97%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/README.md (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/app-readme.md (100%) rename stable/{reg/4.0.23 => qbittorrent/9.0.28}/charts/common-8.9.24.tgz (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/helm-values.md (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/ix_values.yaml (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/questions.yaml (99%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/security.md (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/templates/_configmap.tpl (100%) rename stable/qbittorrent/{9.0.27 => 9.0.28}/templates/common.yaml (100%) rename stable/{reg/4.0.23 => qbittorrent/9.0.28}/values.yaml (100%) delete mode 100644 stable/quassel-core/0.0.6/Chart.lock rename stable/quassel-core/{0.0.6 => 0.0.7}/CHANGELOG.md (87%) rename stable/{remmina/1.0.28 => quassel-core/0.0.7}/CONFIG.md (100%) create mode 100644 stable/quassel-core/0.0.7/Chart.lock rename stable/quassel-core/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/quassel-core/{0.0.6 => 0.0.7}/README.md (100%) rename stable/quassel-core/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{remmina/1.0.28 => quassel-core/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/{statping/4.0.15 => quassel-core/0.0.7}/charts/postgresql-6.0.34.tgz (100%) rename stable/quassel-core/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/quassel-core/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/quassel-core/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/quassel-core/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{radarr/9.0.25 => quassel-core/0.0.7}/templates/common.yaml (100%) rename stable/{remmina/1.0.28 => quassel-core/0.0.7}/values.yaml (100%) delete mode 100644 stable/quassel-web/0.0.5/Chart.lock rename stable/quassel-web/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{requestrr/0.0.5 => quassel-web/0.0.6}/CONFIG.md (100%) create mode 100644 stable/quassel-web/0.0.6/Chart.lock rename stable/quassel-web/{0.0.5 => 0.0.6}/Chart.yaml (97%) rename stable/quassel-web/{0.0.5 => 0.0.6}/README.md (100%) rename stable/quassel-web/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{requestrr/0.0.5 => quassel-web/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/quassel-web/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/quassel-web/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/quassel-web/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/quassel-web/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{readarr/9.0.38 => quassel-web/0.0.6}/templates/common.yaml (100%) rename stable/{requestrr/0.0.5 => quassel-web/0.0.6}/values.yaml (100%) delete mode 100644 stable/radarr/9.0.25/Chart.lock rename stable/radarr/{9.0.25 => 9.0.26}/CHANGELOG.md (89%) rename stable/{resilio-sync/4.0.24 => radarr/9.0.26}/CONFIG.md (100%) create mode 100644 stable/radarr/9.0.26/Chart.lock rename stable/radarr/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/radarr/{9.0.25 => 9.0.26}/README.md (100%) rename stable/radarr/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{resilio-sync/4.0.24 => radarr/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/radarr/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/radarr/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/radarr/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/radarr/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{reg/4.0.23 => radarr/9.0.26}/templates/common.yaml (100%) rename stable/{resilio-sync/4.0.24 => radarr/9.0.26}/values.yaml (100%) delete mode 100644 stable/readarr/9.0.38/Chart.lock rename stable/readarr/{9.0.38 => 9.0.39}/CHANGELOG.md (90%) rename stable/{rsnapshot/0.0.5 => readarr/9.0.39}/CONFIG.md (100%) create mode 100644 stable/readarr/9.0.39/Chart.lock rename stable/readarr/{9.0.38 => 9.0.39}/Chart.yaml (97%) rename stable/readarr/{9.0.38 => 9.0.39}/README.md (100%) rename stable/readarr/{9.0.38 => 9.0.39}/app-readme.md (100%) rename stable/{rsnapshot/0.0.5 => readarr/9.0.39}/charts/common-8.9.24.tgz (100%) rename stable/readarr/{9.0.38 => 9.0.39}/helm-values.md (100%) rename stable/readarr/{9.0.38 => 9.0.39}/ix_values.yaml (100%) rename stable/readarr/{9.0.38 => 9.0.39}/questions.yaml (99%) rename stable/readarr/{9.0.38 => 9.0.39}/security.md (100%) rename stable/{requestrr/0.0.5 => readarr/9.0.39}/templates/common.yaml (100%) rename stable/{rsnapshot/0.0.5 => readarr/9.0.39}/values.yaml (100%) delete mode 100644 stable/recipes/5.0.1/Chart.lock rename stable/recipes/{5.0.1 => 5.0.2}/CHANGELOG.md (88%) rename stable/{sabnzbd/9.0.24 => recipes/5.0.2}/CONFIG.md (100%) create mode 100644 stable/recipes/5.0.2/Chart.lock rename stable/recipes/{5.0.1 => 5.0.2}/Chart.yaml (98%) rename stable/recipes/{5.0.1 => 5.0.2}/README.md (100%) rename stable/recipes/{5.0.1 => 5.0.2}/app-readme.md (100%) rename stable/{sabnzbd/9.0.24 => recipes/5.0.2}/charts/common-8.9.24.tgz (100%) rename stable/{teedy/4.0.15 => recipes/5.0.2}/charts/postgresql-6.0.34.tgz (100%) rename stable/recipes/{5.0.1 => 5.0.2}/helm-values.md (90%) rename stable/recipes/{5.0.1 => 5.0.2}/ix_values.yaml (99%) rename stable/recipes/{5.0.1 => 5.0.2}/questions.yaml (99%) rename stable/recipes/{5.0.1 => 5.0.2}/security.md (100%) rename stable/recipes/{5.0.1 => 5.0.2}/templates/_sercrets.tpl (100%) rename stable/recipes/{5.0.1 => 5.0.2}/templates/common.yaml (100%) rename stable/recipes/{5.0.1 => 5.0.2}/templates/configmap.yaml (100%) rename stable/{sabnzbd/9.0.24 => recipes/5.0.2}/values.yaml (100%) delete mode 100644 stable/reg/4.0.23/Chart.lock rename stable/reg/{4.0.23 => 4.0.24}/CHANGELOG.md (90%) rename stable/{scrutiny/0.0.6 => reg/4.0.24}/CONFIG.md (100%) create mode 100644 stable/reg/4.0.24/Chart.lock rename stable/reg/{4.0.23 => 4.0.24}/Chart.yaml (97%) rename stable/reg/{4.0.23 => 4.0.24}/README.md (100%) rename stable/reg/{4.0.23 => 4.0.24}/app-readme.md (100%) rename stable/{scrutiny/0.0.6 => reg/4.0.24}/charts/common-8.9.24.tgz (100%) rename stable/reg/{4.0.23 => 4.0.24}/ci/ct-values.yaml (100%) rename stable/reg/{4.0.23 => 4.0.24}/helm-values.md (100%) rename stable/reg/{4.0.23 => 4.0.24}/ix_values.yaml (100%) rename stable/reg/{4.0.23 => 4.0.24}/questions.yaml (99%) rename stable/reg/{4.0.23 => 4.0.24}/security.md (100%) rename stable/{resilio-sync => reg}/4.0.24/templates/common.yaml (100%) rename stable/{scrutiny/0.0.6 => reg/4.0.24}/values.yaml (100%) delete mode 100644 stable/remmina/1.0.28/Chart.lock rename stable/remmina/{1.0.28 => 1.0.29}/CHANGELOG.md (90%) rename stable/{ser2sock/4.0.24 => remmina/1.0.29}/CONFIG.md (100%) create mode 100644 stable/remmina/1.0.29/Chart.lock rename stable/remmina/{1.0.28 => 1.0.29}/Chart.yaml (97%) rename stable/remmina/{1.0.28 => 1.0.29}/README.md (100%) rename stable/remmina/{1.0.28 => 1.0.29}/app-readme.md (100%) rename stable/{ser2sock/4.0.24 => remmina/1.0.29}/charts/common-8.9.24.tgz (100%) rename stable/remmina/{1.0.28 => 1.0.29}/helm-values.md (100%) rename stable/remmina/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename stable/remmina/{1.0.28 => 1.0.29}/questions.yaml (99%) rename stable/remmina/{1.0.28 => 1.0.29}/security.md (100%) rename stable/remmina/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename stable/{ser2sock/4.0.24 => remmina/1.0.29}/values.yaml (100%) delete mode 100644 stable/requestrr/0.0.5/Chart.lock rename stable/requestrr/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{shiori/4.0.15 => requestrr/0.0.6}/CONFIG.md (100%) create mode 100644 stable/requestrr/0.0.6/Chart.lock rename stable/requestrr/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/requestrr/{0.0.5 => 0.0.6}/README.md (100%) rename stable/requestrr/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{shiori/4.0.15 => requestrr/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/requestrr/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/requestrr/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/requestrr/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/requestrr/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{rsnapshot/0.0.5 => requestrr/0.0.6}/templates/common.yaml (100%) rename stable/{shiori/4.0.15 => requestrr/0.0.6}/values.yaml (100%) delete mode 100644 stable/resilio-sync/4.0.24/Chart.lock rename stable/resilio-sync/{4.0.24 => 4.0.25}/CHANGELOG.md (86%) rename stable/{shorturl/1.0.24 => resilio-sync/4.0.25}/CONFIG.md (100%) create mode 100644 stable/resilio-sync/4.0.25/Chart.lock rename stable/resilio-sync/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/README.md (100%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{shorturl/1.0.24 => resilio-sync/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/resilio-sync/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{sabnzbd/9.0.24 => resilio-sync/4.0.25}/templates/common.yaml (100%) rename stable/{shorturl/1.0.24 => resilio-sync/4.0.25}/values.yaml (100%) delete mode 100644 stable/rsnapshot/0.0.5/Chart.lock rename stable/rsnapshot/{0.0.5 => 0.0.6}/CHANGELOG.md (87%) rename stable/{sickchill/1.0.24 => rsnapshot/0.0.6}/CONFIG.md (100%) create mode 100644 stable/rsnapshot/0.0.6/Chart.lock rename stable/rsnapshot/{0.0.5 => 0.0.6}/Chart.yaml (97%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/README.md (100%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{sickchill/1.0.24 => rsnapshot/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/rsnapshot/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{scrutiny => rsnapshot}/0.0.6/templates/common.yaml (100%) rename stable/{sickchill/1.0.24 => rsnapshot/0.0.6}/values.yaml (100%) delete mode 100644 stable/sabnzbd/9.0.24/Chart.lock rename stable/sabnzbd/{9.0.24 => 9.0.25}/CHANGELOG.md (90%) rename stable/{sickgear/1.0.24 => sabnzbd/9.0.25}/CONFIG.md (100%) create mode 100644 stable/sabnzbd/9.0.25/Chart.lock rename stable/sabnzbd/{9.0.24 => 9.0.25}/Chart.yaml (97%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/README.md (100%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/app-readme.md (100%) rename stable/{sickgear/1.0.24 => sabnzbd/9.0.25}/charts/common-8.9.24.tgz (100%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/helm-values.md (100%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/ix_values.yaml (100%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/questions.yaml (99%) rename stable/sabnzbd/{9.0.24 => 9.0.25}/security.md (100%) rename stable/{ser2sock/4.0.24 => sabnzbd/9.0.25}/templates/common.yaml (100%) rename stable/{sickgear/1.0.24 => sabnzbd/9.0.25}/values.yaml (100%) delete mode 100644 stable/scrutiny/0.0.6/Chart.lock rename stable/scrutiny/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{smokeping/1.0.26 => scrutiny/0.0.7}/CONFIG.md (100%) create mode 100644 stable/scrutiny/0.0.7/Chart.lock rename stable/scrutiny/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/scrutiny/{0.0.6 => 0.0.7}/README.md (100%) rename stable/scrutiny/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{smokeping/1.0.26 => scrutiny/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/scrutiny/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/scrutiny/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/scrutiny/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/scrutiny/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{shiori/4.0.15 => scrutiny/0.0.7}/templates/common.yaml (100%) rename stable/{smokeping/1.0.26 => scrutiny/0.0.7}/values.yaml (100%) delete mode 100644 stable/ser2sock/4.0.24/Chart.lock rename stable/ser2sock/{4.0.24 => 4.0.25}/CHANGELOG.md (86%) rename stable/{snipe-it/0.0.16 => ser2sock/4.0.25}/CONFIG.md (100%) create mode 100644 stable/ser2sock/4.0.25/Chart.lock rename stable/ser2sock/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/ser2sock/{4.0.24 => 4.0.25}/README.md (100%) rename stable/ser2sock/{4.0.24 => 4.0.25}/app-readme.md (100%) rename stable/{snipe-it/0.0.16 => ser2sock/4.0.25}/charts/common-8.9.24.tgz (100%) rename stable/ser2sock/{4.0.24 => 4.0.25}/ci/test-values.yaml (100%) rename stable/ser2sock/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/ser2sock/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/ser2sock/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/ser2sock/{4.0.24 => 4.0.25}/security.md (100%) rename stable/{sonarr/9.0.25 => ser2sock/4.0.25}/templates/common.yaml (100%) rename stable/{snipe-it/0.0.16 => ser2sock/4.0.25}/values.yaml (100%) delete mode 100644 stable/shiori/4.0.15/Chart.lock rename stable/shiori/{4.0.15 => 4.0.16}/CHANGELOG.md (88%) rename stable/{sonarr/9.0.25 => shiori/4.0.16}/CONFIG.md (100%) create mode 100644 stable/shiori/4.0.16/Chart.lock rename stable/shiori/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/shiori/{4.0.15 => 4.0.16}/README.md (100%) rename stable/shiori/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{sonarr/9.0.25 => shiori/4.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{traccar/4.0.15 => shiori/4.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/shiori/{4.0.15 => 4.0.16}/helm-values.md (92%) rename stable/shiori/{4.0.15 => 4.0.16}/ix_values.yaml (99%) rename stable/shiori/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/shiori/{4.0.15 => 4.0.16}/security.md (100%) rename stable/{speedtest-exporter/1.0.11 => shiori/4.0.16}/templates/common.yaml (100%) rename stable/{sonarr/9.0.25 => shiori/4.0.16}/values.yaml (100%) delete mode 100644 stable/shorturl/1.0.24/Chart.lock rename stable/shorturl/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{speedtest-exporter/1.0.11 => shorturl/1.0.25}/CONFIG.md (100%) create mode 100644 stable/shorturl/1.0.25/Chart.lock rename stable/shorturl/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/shorturl/{1.0.24 => 1.0.25}/README.md (100%) rename stable/shorturl/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{speedtest-exporter/1.0.11 => shorturl/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/shorturl/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/shorturl/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/shorturl/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/shorturl/{1.0.24 => 1.0.25}/security.md (100%) rename stable/shorturl/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{speedtest-exporter/1.0.11 => shorturl/1.0.25}/values.yaml (100%) delete mode 100644 stable/sickchill/1.0.24/Chart.lock rename stable/sickchill/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{sqlitebrowser/1.0.28 => sickchill/1.0.25}/CONFIG.md (100%) create mode 100644 stable/sickchill/1.0.25/Chart.lock rename stable/sickchill/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/sickchill/{1.0.24 => 1.0.25}/README.md (100%) rename stable/sickchill/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{sqlitebrowser/1.0.28 => sickchill/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/sickchill/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/sickchill/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/sickchill/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/sickchill/{1.0.24 => 1.0.25}/security.md (100%) rename stable/sickchill/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{sqlitebrowser/1.0.28 => sickchill/1.0.25}/values.yaml (100%) delete mode 100644 stable/sickgear/1.0.24/Chart.lock rename stable/sickgear/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{stash/5.0.5 => sickgear/1.0.25}/CONFIG.md (100%) create mode 100644 stable/sickgear/1.0.25/Chart.lock rename stable/sickgear/{1.0.24 => 1.0.25}/Chart.yaml (98%) rename stable/sickgear/{1.0.24 => 1.0.25}/README.md (100%) rename stable/sickgear/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{stash/5.0.5 => sickgear/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/sickgear/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/sickgear/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/sickgear/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/sickgear/{1.0.24 => 1.0.25}/security.md (100%) rename stable/sickgear/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{stash/5.0.5 => sickgear/1.0.25}/values.yaml (100%) delete mode 100644 stable/smokeping/1.0.26/Chart.lock rename stable/smokeping/{1.0.26 => 1.0.27}/CHANGELOG.md (90%) rename stable/{static/1.0.24 => smokeping/1.0.27}/CONFIG.md (100%) create mode 100644 stable/smokeping/1.0.27/Chart.lock rename stable/smokeping/{1.0.26 => 1.0.27}/Chart.yaml (97%) rename stable/smokeping/{1.0.26 => 1.0.27}/README.md (100%) rename stable/smokeping/{1.0.26 => 1.0.27}/app-readme.md (100%) rename stable/{static/1.0.24 => smokeping/1.0.27}/charts/common-8.9.24.tgz (100%) rename stable/smokeping/{1.0.26 => 1.0.27}/helm-values.md (100%) rename stable/smokeping/{1.0.26 => 1.0.27}/ix_values.yaml (100%) rename stable/smokeping/{1.0.26 => 1.0.27}/questions.yaml (99%) rename stable/smokeping/{1.0.26 => 1.0.27}/security.md (100%) rename stable/smokeping/{1.0.26 => 1.0.27}/templates/common.yaml (100%) rename stable/{static/1.0.24 => smokeping/1.0.27}/values.yaml (100%) delete mode 100644 stable/snipe-it/0.0.16/Chart.lock rename stable/snipe-it/{0.0.16 => 0.0.17}/CHANGELOG.md (91%) rename stable/{statping/4.0.15 => snipe-it/0.0.17}/CONFIG.md (100%) create mode 100644 stable/snipe-it/0.0.17/Chart.lock rename stable/snipe-it/{0.0.16 => 0.0.17}/Chart.yaml (98%) rename stable/snipe-it/{0.0.16 => 0.0.17}/README.md (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/app-readme.md (100%) rename stable/{statping/4.0.15 => snipe-it/0.0.17}/charts/common-8.9.24.tgz (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/charts/mariadb-1.0.37.tgz (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/helm-values.md (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/ix_values.yaml (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/questions.yaml (100%) rename stable/snipe-it/{0.0.16 => 0.0.17}/security.md (99%) rename stable/snipe-it/{0.0.16 => 0.0.17}/templates/common.yaml (100%) rename stable/{statping/4.0.15 => snipe-it/0.0.17}/values.yaml (100%) delete mode 100644 stable/sonarr/9.0.25/Chart.lock rename stable/sonarr/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{synclounge/0.0.5 => sonarr/9.0.26}/CONFIG.md (100%) create mode 100644 stable/sonarr/9.0.26/Chart.lock rename stable/sonarr/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/sonarr/{9.0.25 => 9.0.26}/README.md (100%) rename stable/sonarr/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{synclounge/0.0.5 => sonarr/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/sonarr/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/sonarr/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/sonarr/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/sonarr/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{stash/5.0.5 => sonarr/9.0.26}/templates/common.yaml (100%) rename stable/{synclounge/0.0.5 => sonarr/9.0.26}/values.yaml (100%) delete mode 100644 stable/speedtest-exporter/1.0.11/Chart.lock rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/CHANGELOG.md (93%) rename stable/{syncthing/9.0.26 => speedtest-exporter/1.0.12}/CONFIG.md (100%) create mode 100644 stable/speedtest-exporter/1.0.12/Chart.lock rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/Chart.yaml (98%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/README.md (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/app-readme.md (100%) rename stable/{syncthing/9.0.26 => speedtest-exporter/1.0.12}/charts/common-8.9.24.tgz (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/helm-values.md (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/ix_values.yaml (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/questions.yaml (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/security.md (100%) rename stable/{synclounge/0.0.5 => speedtest-exporter/1.0.12}/templates/common.yaml (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/templates/prometheusrules.yaml (100%) rename stable/speedtest-exporter/{1.0.11 => 1.0.12}/templates/servicemonitor.yaml (100%) rename stable/{syncthing/9.0.26 => speedtest-exporter/1.0.12}/values.yaml (100%) delete mode 100644 stable/sqlitebrowser/1.0.28/Chart.lock rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/CHANGELOG.md (90%) rename stable/{syslog-ng/0.0.6 => sqlitebrowser/1.0.29}/CONFIG.md (100%) create mode 100644 stable/sqlitebrowser/1.0.29/Chart.lock rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/Chart.yaml (98%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/README.md (100%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/app-readme.md (100%) rename stable/{syslog-ng/0.0.6 => sqlitebrowser/1.0.29}/charts/common-8.9.24.tgz (100%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/helm-values.md (100%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/ix_values.yaml (100%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/questions.yaml (99%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/security.md (100%) rename stable/sqlitebrowser/{1.0.28 => 1.0.29}/templates/common.yaml (100%) rename stable/{syslog-ng/0.0.6 => sqlitebrowser/1.0.29}/values.yaml (100%) delete mode 100644 stable/stash/5.0.5/Chart.lock rename stable/stash/{5.0.5 => 5.0.6}/CHANGELOG.md (90%) rename stable/{tautulli/9.0.24 => stash/5.0.6}/CONFIG.md (100%) create mode 100644 stable/stash/5.0.6/Chart.lock rename stable/stash/{5.0.5 => 5.0.6}/Chart.yaml (97%) rename stable/stash/{5.0.5 => 5.0.6}/README.md (100%) rename stable/stash/{5.0.5 => 5.0.6}/app-readme.md (100%) rename stable/{tautulli/9.0.24 => stash/5.0.6}/charts/common-8.9.24.tgz (100%) rename stable/stash/{5.0.5 => 5.0.6}/ci/ct-values.yaml (100%) rename stable/stash/{5.0.5 => 5.0.6}/helm-values.md (100%) rename stable/stash/{5.0.5 => 5.0.6}/ix_values.yaml (100%) rename stable/stash/{5.0.5 => 5.0.6}/questions.yaml (99%) rename stable/stash/{5.0.5 => 5.0.6}/security.md (100%) rename stable/{syncthing/9.0.26 => stash/5.0.6}/templates/common.yaml (100%) rename stable/{tautulli/9.0.24 => stash/5.0.6}/values.yaml (100%) delete mode 100644 stable/static/1.0.24/Chart.lock rename stable/static/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{teamspeak3/2.0.24 => static/1.0.25}/CONFIG.md (100%) create mode 100644 stable/static/1.0.25/Chart.lock rename stable/static/{1.0.24 => 1.0.25}/Chart.yaml (98%) rename stable/static/{1.0.24 => 1.0.25}/README.md (100%) rename stable/static/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{teamspeak3/2.0.24 => static/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/static/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/static/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/static/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/static/{1.0.24 => 1.0.25}/security.md (100%) rename stable/static/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{teamspeak3/2.0.24 => static/1.0.25}/values.yaml (100%) delete mode 100644 stable/statping/4.0.15/Chart.lock rename stable/statping/{4.0.15 => 4.0.16}/CHANGELOG.md (88%) rename stable/{teedy/4.0.15 => statping/4.0.16}/CONFIG.md (100%) create mode 100644 stable/statping/4.0.16/Chart.lock rename stable/statping/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/statping/{4.0.15 => 4.0.16}/README.md (100%) rename stable/statping/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{teedy/4.0.15 => statping/4.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{tt-rss/4.0.23 => statping/4.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/statping/{4.0.15 => 4.0.16}/helm-values.md (89%) rename stable/statping/{4.0.15 => 4.0.16}/ix_values.yaml (99%) rename stable/statping/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/statping/{4.0.15 => 4.0.16}/security.md (100%) rename stable/statping/{4.0.15 => 4.0.16}/templates/common.yaml (100%) rename stable/{teedy/4.0.15 => statping/4.0.16}/values.yaml (100%) delete mode 100644 stable/synclounge/0.0.5/Chart.lock rename stable/synclounge/{0.0.5 => 0.0.6}/CHANGELOG.md (85%) rename stable/{thelounge/4.0.26 => synclounge/0.0.6}/CONFIG.md (100%) create mode 100644 stable/synclounge/0.0.6/Chart.lock rename stable/synclounge/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/synclounge/{0.0.5 => 0.0.6}/README.md (100%) rename stable/synclounge/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{thelounge/4.0.26 => synclounge/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/synclounge/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/synclounge/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/synclounge/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/synclounge/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{syslog-ng => synclounge}/0.0.6/templates/common.yaml (100%) rename stable/{thelounge/4.0.26 => synclounge/0.0.6}/values.yaml (100%) delete mode 100644 stable/syncthing/9.0.26/Chart.lock rename stable/syncthing/{9.0.26 => 9.0.27}/CHANGELOG.md (86%) rename stable/{traccar/4.0.15 => syncthing/9.0.27}/CONFIG.md (100%) create mode 100644 stable/syncthing/9.0.27/Chart.lock rename stable/syncthing/{9.0.26 => 9.0.27}/Chart.yaml (97%) rename stable/syncthing/{9.0.26 => 9.0.27}/README.md (100%) rename stable/syncthing/{9.0.26 => 9.0.27}/app-readme.md (100%) rename stable/{traccar/4.0.15 => syncthing/9.0.27}/charts/common-8.9.24.tgz (100%) rename stable/syncthing/{9.0.26 => 9.0.27}/helm-values.md (100%) rename stable/syncthing/{9.0.26 => 9.0.27}/ix_values.yaml (100%) rename stable/syncthing/{9.0.26 => 9.0.27}/questions.yaml (98%) rename stable/syncthing/{9.0.26 => 9.0.27}/security.md (100%) rename stable/{tautulli/9.0.24 => syncthing/9.0.27}/templates/common.yaml (100%) rename stable/{traccar/4.0.15 => syncthing/9.0.27}/values.yaml (100%) delete mode 100644 stable/syslog-ng/0.0.6/Chart.lock rename stable/syslog-ng/{0.0.6 => 0.0.7}/CHANGELOG.md (88%) rename stable/{truecommand/9.0.25 => syslog-ng/0.0.7}/CONFIG.md (100%) create mode 100644 stable/syslog-ng/0.0.7/Chart.lock rename stable/syslog-ng/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/README.md (100%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/app-readme.md (100%) rename stable/{truecommand/9.0.25 => syslog-ng/0.0.7}/charts/common-8.9.24.tgz (100%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/syslog-ng/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{teamspeak3/2.0.24 => syslog-ng/0.0.7}/templates/common.yaml (100%) rename stable/{truecommand/9.0.25 => syslog-ng/0.0.7}/values.yaml (100%) delete mode 100644 stable/tautulli/9.0.24/Chart.lock rename stable/tautulli/{9.0.24 => 9.0.25}/CHANGELOG.md (90%) rename stable/{tt-rss/4.0.23 => tautulli/9.0.25}/CONFIG.md (100%) create mode 100644 stable/tautulli/9.0.25/Chart.lock rename stable/tautulli/{9.0.24 => 9.0.25}/Chart.yaml (97%) rename stable/tautulli/{9.0.24 => 9.0.25}/README.md (100%) rename stable/tautulli/{9.0.24 => 9.0.25}/app-readme.md (100%) rename stable/{tt-rss/4.0.23 => tautulli/9.0.25}/charts/common-8.9.24.tgz (100%) rename stable/tautulli/{9.0.24 => 9.0.25}/helm-values.md (100%) rename stable/tautulli/{9.0.24 => 9.0.25}/ix_values.yaml (100%) rename stable/tautulli/{9.0.24 => 9.0.25}/questions.yaml (99%) rename stable/tautulli/{9.0.24 => 9.0.25}/security.md (100%) rename stable/{teedy/4.0.15 => tautulli/9.0.25}/templates/common.yaml (100%) rename stable/{tt-rss/4.0.23 => tautulli/9.0.25}/values.yaml (100%) delete mode 100644 stable/teamspeak3/2.0.24/Chart.lock rename stable/teamspeak3/{2.0.24 => 2.0.25}/CHANGELOG.md (82%) rename stable/{twtxt/1.0.24 => teamspeak3/2.0.25}/CONFIG.md (100%) create mode 100644 stable/teamspeak3/2.0.25/Chart.lock rename stable/teamspeak3/{2.0.24 => 2.0.25}/Chart.yaml (98%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/README.md (100%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{twtxt/1.0.24 => teamspeak3/2.0.25}/charts/common-8.9.24.tgz (100%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/ix_values.yaml (96%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/questions.yaml (98%) rename stable/teamspeak3/{2.0.24 => 2.0.25}/security.md (100%) rename stable/{thelounge/4.0.26 => teamspeak3/2.0.25}/templates/common.yaml (100%) rename stable/{twtxt/1.0.24 => teamspeak3/2.0.25}/values.yaml (100%) delete mode 100644 stable/teedy/4.0.15/Chart.lock rename stable/teedy/{4.0.15 => 4.0.16}/CHANGELOG.md (88%) rename stable/{ubooquity/0.0.5 => teedy/4.0.16}/CONFIG.md (100%) create mode 100644 stable/teedy/4.0.16/Chart.lock rename stable/teedy/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/teedy/{4.0.15 => 4.0.16}/README.md (100%) rename stable/teedy/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{ubooquity/0.0.5 => teedy/4.0.16}/charts/common-8.9.24.tgz (100%) rename stable/{wikijs/4.0.14 => teedy/4.0.16}/charts/postgresql-6.0.34.tgz (100%) rename stable/teedy/{4.0.15 => 4.0.16}/helm-values.md (96%) rename stable/teedy/{4.0.15 => 4.0.16}/ix_values.yaml (99%) rename stable/teedy/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/teedy/{4.0.15 => 4.0.16}/security.md (100%) rename stable/{traccar/4.0.15 => teedy/4.0.16}/templates/common.yaml (100%) rename stable/{ubooquity/0.0.5 => teedy/4.0.16}/values.yaml (100%) delete mode 100644 stable/thelounge/4.0.26/Chart.lock rename stable/thelounge/{4.0.26 => 4.0.27}/CHANGELOG.md (90%) rename stable/{unifi/9.0.28 => thelounge/4.0.27}/CONFIG.md (100%) create mode 100644 stable/thelounge/4.0.27/Chart.lock rename stable/thelounge/{4.0.26 => 4.0.27}/Chart.yaml (97%) rename stable/thelounge/{4.0.26 => 4.0.27}/README.md (100%) rename stable/thelounge/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{unifi/9.0.28 => thelounge/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/thelounge/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/thelounge/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/thelounge/{4.0.26 => 4.0.27}/questions.yaml (99%) rename stable/thelounge/{4.0.26 => 4.0.27}/security.md (100%) rename stable/{truecommand/9.0.25 => thelounge/4.0.27}/templates/common.yaml (100%) rename stable/{unifi/9.0.28 => thelounge/4.0.27}/values.yaml (100%) delete mode 100644 stable/traccar/4.0.15/Chart.lock rename stable/traccar/{4.0.15 => 4.0.16}/CHANGELOG.md (88%) rename stable/{unpackerr/4.0.26 => traccar/4.0.16}/CONFIG.md (100%) rename stable/{wikijs/4.0.14 => traccar/4.0.16}/Chart.lock (84%) rename stable/traccar/{4.0.15 => 4.0.16}/Chart.yaml (98%) rename stable/traccar/{4.0.15 => 4.0.16}/README.md (100%) rename stable/traccar/{4.0.15 => 4.0.16}/app-readme.md (100%) rename stable/{unpackerr/4.0.26 => traccar/4.0.16}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/traccar/4.0.16/charts/postgresql-6.0.34.tgz rename stable/traccar/{4.0.15 => 4.0.16}/helm-values.md (93%) rename stable/traccar/{4.0.15 => 4.0.16}/ix_values.yaml (99%) rename stable/traccar/{4.0.15 => 4.0.16}/questions.yaml (99%) rename stable/traccar/{4.0.15 => 4.0.16}/security.md (100%) rename stable/{ubooquity/0.0.5 => traccar/4.0.16}/templates/common.yaml (100%) rename stable/{unpackerr/4.0.26 => traccar/4.0.16}/values.yaml (100%) create mode 100644 stable/transmission/10.0.6/CHANGELOG.md rename stable/{unpoller/1.0.15 => transmission/10.0.6}/CONFIG.md (100%) create mode 100644 stable/transmission/10.0.6/Chart.lock create mode 100644 stable/transmission/10.0.6/Chart.yaml create mode 100644 stable/transmission/10.0.6/README.md create mode 100644 stable/transmission/10.0.6/app-readme.md rename stable/{unpoller/1.0.15 => transmission/10.0.6}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/transmission/10.0.6/helm-values.md create mode 100644 stable/transmission/10.0.6/ix_values.yaml create mode 100644 stable/transmission/10.0.6/questions.yaml create mode 100644 stable/transmission/10.0.6/security.md create mode 100644 stable/transmission/10.0.6/templates/common.yaml rename stable/{unpoller/1.0.15 => transmission/10.0.6}/values.yaml (100%) delete mode 100644 stable/truecommand/9.0.25/Chart.lock rename stable/truecommand/{9.0.25 => 9.0.26}/CHANGELOG.md (90%) rename stable/{uptime-kuma/1.0.25 => truecommand/9.0.26}/CONFIG.md (100%) create mode 100644 stable/truecommand/9.0.26/Chart.lock rename stable/truecommand/{9.0.25 => 9.0.26}/Chart.yaml (97%) rename stable/truecommand/{9.0.25 => 9.0.26}/README.md (100%) rename stable/truecommand/{9.0.25 => 9.0.26}/app-readme.md (100%) rename stable/{uptime-kuma/1.0.25 => truecommand/9.0.26}/charts/common-8.9.24.tgz (100%) rename stable/truecommand/{9.0.25 => 9.0.26}/helm-values.md (100%) rename stable/truecommand/{9.0.25 => 9.0.26}/ix_values.yaml (100%) rename stable/truecommand/{9.0.25 => 9.0.26}/questions.yaml (99%) rename stable/truecommand/{9.0.25 => 9.0.26}/security.md (100%) rename stable/{unifi/9.0.28 => truecommand/9.0.26}/templates/common.yaml (100%) rename stable/{uptime-kuma/1.0.25 => truecommand/9.0.26}/values.yaml (100%) delete mode 100644 stable/tt-rss/4.0.23/Chart.lock rename stable/tt-rss/{4.0.23 => 4.0.24}/CHANGELOG.md (80%) rename stable/{uptimerobot-prometheus/2.0.5 => tt-rss/4.0.24}/CONFIG.md (100%) create mode 100644 stable/tt-rss/4.0.24/Chart.lock rename stable/tt-rss/{4.0.23 => 4.0.24}/Chart.yaml (98%) rename stable/tt-rss/{4.0.23 => 4.0.24}/README.md (100%) rename stable/tt-rss/{4.0.23 => 4.0.24}/app-readme.md (100%) rename stable/{uptimerobot-prometheus/2.0.5 => tt-rss/4.0.24}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/tt-rss/4.0.24/charts/postgresql-6.0.34.tgz rename stable/tt-rss/{4.0.23 => 4.0.24}/helm-values.md (91%) rename stable/tt-rss/{4.0.23 => 4.0.24}/ix_values.yaml (99%) rename stable/tt-rss/{4.0.23 => 4.0.24}/questions.yaml (99%) rename stable/tt-rss/{4.0.23 => 4.0.24}/security.md (100%) rename stable/tt-rss/{4.0.23 => 4.0.24}/templates/common.yaml (100%) rename stable/{uptimerobot-prometheus/2.0.5 => tt-rss/4.0.24}/values.yaml (100%) create mode 100644 stable/tvheadend/10.0.25/CHANGELOG.md rename stable/{valheim/2.0.5 => tvheadend/10.0.25}/CONFIG.md (100%) create mode 100644 stable/tvheadend/10.0.25/Chart.lock create mode 100644 stable/tvheadend/10.0.25/Chart.yaml create mode 100644 stable/tvheadend/10.0.25/README.md create mode 100644 stable/tvheadend/10.0.25/app-readme.md rename stable/{valheim/2.0.5 => tvheadend/10.0.25}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/tvheadend/10.0.25/helm-values.md create mode 100644 stable/tvheadend/10.0.25/ix_values.yaml create mode 100644 stable/tvheadend/10.0.25/questions.yaml create mode 100644 stable/tvheadend/10.0.25/security.md rename stable/{unpackerr/4.0.26 => tvheadend/10.0.25}/templates/common.yaml (100%) rename stable/{valheim/2.0.5 => tvheadend/10.0.25}/values.yaml (100%) delete mode 100644 stable/twtxt/1.0.24/Chart.lock rename stable/twtxt/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) rename stable/{webgrabplus/0.0.6 => twtxt/1.0.25}/CONFIG.md (100%) create mode 100644 stable/twtxt/1.0.25/Chart.lock rename stable/twtxt/{1.0.24 => 1.0.25}/Chart.yaml (98%) rename stable/twtxt/{1.0.24 => 1.0.25}/README.md (100%) rename stable/twtxt/{1.0.24 => 1.0.25}/app-readme.md (100%) rename stable/{webgrabplus/0.0.6 => twtxt/1.0.25}/charts/common-8.9.24.tgz (100%) rename stable/twtxt/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/twtxt/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/twtxt/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/twtxt/{1.0.24 => 1.0.25}/security.md (100%) rename stable/twtxt/{1.0.24 => 1.0.25}/templates/common.yaml (100%) rename stable/{webgrabplus/0.0.6 => twtxt/1.0.25}/values.yaml (100%) delete mode 100644 stable/ubooquity/0.0.5/Chart.lock rename stable/ubooquity/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) rename stable/{whoogle/1.0.24 => ubooquity/0.0.6}/CONFIG.md (100%) create mode 100644 stable/ubooquity/0.0.6/Chart.lock rename stable/ubooquity/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/ubooquity/{0.0.5 => 0.0.6}/README.md (100%) rename stable/ubooquity/{0.0.5 => 0.0.6}/app-readme.md (100%) rename stable/{whoogle/1.0.24 => ubooquity/0.0.6}/charts/common-8.9.24.tgz (100%) rename stable/ubooquity/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/ubooquity/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/ubooquity/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/ubooquity/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{unpoller/1.0.15 => ubooquity/0.0.6}/templates/common.yaml (100%) rename stable/{whoogle/1.0.24 => ubooquity/0.0.6}/values.yaml (100%) delete mode 100644 stable/unifi/9.0.28/Chart.lock rename stable/unifi/{9.0.28 => 9.0.29}/CHANGELOG.md (82%) rename stable/{wikijs/4.0.14 => unifi/9.0.29}/CONFIG.md (100%) create mode 100644 stable/unifi/9.0.29/Chart.lock rename stable/unifi/{9.0.28 => 9.0.29}/Chart.yaml (97%) rename stable/unifi/{9.0.28 => 9.0.29}/README.md (100%) rename stable/unifi/{9.0.28 => 9.0.29}/app-readme.md (100%) rename stable/{wikijs/4.0.14 => unifi/9.0.29}/charts/common-8.9.24.tgz (100%) rename stable/unifi/{9.0.28 => 9.0.29}/helm-values.md (95%) rename stable/unifi/{9.0.28 => 9.0.29}/ix_values.yaml (99%) rename stable/unifi/{9.0.28 => 9.0.29}/questions.yaml (98%) rename stable/unifi/{9.0.28 => 9.0.29}/security.md (99%) rename stable/{uptime-kuma/1.0.25 => unifi/9.0.29}/templates/common.yaml (100%) rename stable/{wikijs/4.0.14 => unifi/9.0.29}/values.yaml (100%) delete mode 100644 stable/unpackerr/4.0.26/Chart.lock rename stable/unpackerr/{4.0.26 => 4.0.27}/CHANGELOG.md (85%) rename stable/{wireshark/0.0.5 => unpackerr/4.0.27}/CONFIG.md (100%) create mode 100644 stable/unpackerr/4.0.27/Chart.lock rename stable/unpackerr/{4.0.26 => 4.0.27}/Chart.yaml (98%) rename stable/unpackerr/{4.0.26 => 4.0.27}/README.md (100%) rename stable/unpackerr/{4.0.26 => 4.0.27}/app-readme.md (100%) rename stable/{wireshark/0.0.5 => unpackerr/4.0.27}/charts/common-8.9.24.tgz (100%) rename stable/unpackerr/{4.0.26 => 4.0.27}/helm-values.md (100%) rename stable/unpackerr/{4.0.26 => 4.0.27}/ix_values.yaml (100%) rename stable/unpackerr/{4.0.26 => 4.0.27}/questions.yaml (100%) rename stable/unpackerr/{4.0.26 => 4.0.27}/security.md (100%) rename stable/{uptimerobot-prometheus/2.0.5 => unpackerr/4.0.27}/templates/common.yaml (100%) rename stable/{wireshark/0.0.5 => unpackerr/4.0.27}/values.yaml (100%) delete mode 100644 stable/unpoller/1.0.15/Chart.lock rename stable/unpoller/{1.0.15 => 1.0.16}/CHANGELOG.md (89%) rename stable/{xbackbone/0.0.13 => unpoller/1.0.16}/CONFIG.md (100%) create mode 100644 stable/unpoller/1.0.16/Chart.lock rename stable/unpoller/{1.0.15 => 1.0.16}/Chart.yaml (98%) rename stable/unpoller/{1.0.15 => 1.0.16}/README.md (100%) rename stable/unpoller/{1.0.15 => 1.0.16}/app-readme.md (100%) rename stable/{xbackbone/0.0.13 => unpoller/1.0.16}/charts/common-8.9.24.tgz (100%) rename stable/unpoller/{1.0.15 => 1.0.16}/helm-values.md (84%) rename stable/unpoller/{1.0.15 => 1.0.16}/ix_values.yaml (98%) rename stable/unpoller/{1.0.15 => 1.0.16}/questions.yaml (99%) rename stable/unpoller/{1.0.15 => 1.0.16}/security.md (100%) rename stable/{webgrabplus/0.0.6 => unpoller/1.0.16}/templates/common.yaml (100%) rename stable/unpoller/{1.0.15 => 1.0.16}/templates/prometheusrules.yaml (100%) rename stable/unpoller/{1.0.15 => 1.0.16}/templates/servicemonitor.yaml (100%) rename stable/{xbackbone/0.0.13 => unpoller/1.0.16}/values.yaml (100%) delete mode 100644 stable/uptime-kuma/1.0.25/Chart.lock rename stable/uptime-kuma/{1.0.25 => 1.0.26}/CHANGELOG.md (90%) rename stable/{xteve/4.0.24 => uptime-kuma/1.0.26}/CONFIG.md (100%) create mode 100644 stable/uptime-kuma/1.0.26/Chart.lock rename stable/uptime-kuma/{1.0.25 => 1.0.26}/Chart.yaml (97%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/README.md (100%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/app-readme.md (100%) rename stable/{xteve/4.0.24 => uptime-kuma/1.0.26}/charts/common-8.9.24.tgz (100%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/helm-values.md (100%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/ix_values.yaml (100%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/questions.yaml (99%) rename stable/uptime-kuma/{1.0.25 => 1.0.26}/security.md (100%) rename stable/{whoogle/1.0.24 => uptime-kuma/1.0.26}/templates/common.yaml (100%) rename stable/{xteve/4.0.24 => uptime-kuma/1.0.26}/values.yaml (100%) delete mode 100644 stable/uptimerobot-prometheus/2.0.5/Chart.lock rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/CHANGELOG.md (91%) rename stable/{zigbee2mqtt/1.0.25 => uptimerobot-prometheus/2.0.6}/CONFIG.md (100%) create mode 100644 stable/uptimerobot-prometheus/2.0.6/Chart.lock rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/Chart.yaml (98%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/README.md (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/app-readme.md (100%) rename stable/{zigbee2mqtt/1.0.25 => uptimerobot-prometheus/2.0.6}/charts/common-8.9.24.tgz (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/helm-values.md (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/ix_values.yaml (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/questions.yaml (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/security.md (100%) rename stable/{wikijs/4.0.14 => uptimerobot-prometheus/2.0.6}/templates/common.yaml (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/templates/prometheusrules.yaml (100%) rename stable/uptimerobot-prometheus/{2.0.5 => 2.0.6}/templates/servicemonitor.yaml (100%) rename stable/{zigbee2mqtt/1.0.25 => uptimerobot-prometheus/2.0.6}/values.yaml (100%) delete mode 100644 stable/valheim/2.0.5/Chart.lock rename stable/valheim/{2.0.5 => 2.0.6}/CHANGELOG.md (81%) rename stable/{znc/0.0.5 => valheim/2.0.6}/CONFIG.md (100%) create mode 100644 stable/valheim/2.0.6/Chart.lock rename stable/valheim/{2.0.5 => 2.0.6}/Chart.yaml (98%) rename stable/valheim/{2.0.5 => 2.0.6}/README.md (100%) rename stable/valheim/{2.0.5 => 2.0.6}/app-readme.md (100%) rename stable/{znc/0.0.5 => valheim/2.0.6}/charts/common-8.9.24.tgz (100%) rename stable/valheim/{2.0.5 => 2.0.6}/helm-values.md (100%) rename stable/valheim/{2.0.5 => 2.0.6}/ix_values.yaml (100%) rename stable/valheim/{2.0.5 => 2.0.6}/questions.yaml (98%) rename stable/valheim/{2.0.5 => 2.0.6}/security.md (100%) rename stable/valheim/{2.0.5 => 2.0.6}/templates/common.yaml (100%) rename stable/{znc/0.0.5 => valheim/2.0.6}/values.yaml (100%) create mode 100644 stable/vaultwarden/13.0.17/CHANGELOG.md rename stable/{zwavejs2mqtt/9.0.30 => vaultwarden/13.0.17}/CONFIG.md (100%) create mode 100644 stable/vaultwarden/13.0.17/Chart.lock create mode 100644 stable/vaultwarden/13.0.17/Chart.yaml create mode 100644 stable/vaultwarden/13.0.17/README.md create mode 100644 stable/vaultwarden/13.0.17/app-readme.md rename stable/{zwavejs2mqtt/9.0.30 => vaultwarden/13.0.17}/charts/common-8.9.24.tgz (100%) create mode 100644 stable/vaultwarden/13.0.17/charts/postgresql-6.0.34.tgz rename stable/{zigbee2mqtt/1.0.25/SKIPINSTALL => vaultwarden/13.0.17/ci/default-values.yaml} (100%) create mode 100644 stable/vaultwarden/13.0.17/ci/ingress-values.yaml create mode 100644 stable/vaultwarden/13.0.17/helm-values.md create mode 100644 stable/vaultwarden/13.0.17/ix_values.yaml create mode 100644 stable/vaultwarden/13.0.17/questions.yaml create mode 100644 stable/vaultwarden/13.0.17/security.md create mode 100644 stable/vaultwarden/13.0.17/templates/_configmap.tpl create mode 100644 stable/vaultwarden/13.0.17/templates/_secrets.tpl create mode 100644 stable/vaultwarden/13.0.17/templates/_validate.tpl create mode 100644 stable/vaultwarden/13.0.17/templates/common.yaml rename stable/{zwavejs2mqtt/9.0.30 => vaultwarden/13.0.17}/values.yaml (100%) delete mode 100644 stable/webgrabplus/0.0.6/Chart.lock rename stable/webgrabplus/{0.0.6 => 0.0.7}/CHANGELOG.md (89%) create mode 100644 stable/webgrabplus/0.0.7/CONFIG.md create mode 100644 stable/webgrabplus/0.0.7/Chart.lock rename stable/webgrabplus/{0.0.6 => 0.0.7}/Chart.yaml (98%) rename stable/webgrabplus/{0.0.6 => 0.0.7}/README.md (100%) rename stable/webgrabplus/{0.0.6 => 0.0.7}/app-readme.md (100%) create mode 100644 stable/webgrabplus/0.0.7/charts/common-8.9.24.tgz rename stable/webgrabplus/{0.0.6 => 0.0.7}/helm-values.md (100%) rename stable/webgrabplus/{0.0.6 => 0.0.7}/ix_values.yaml (100%) rename stable/webgrabplus/{0.0.6 => 0.0.7}/questions.yaml (100%) rename stable/webgrabplus/{0.0.6 => 0.0.7}/security.md (100%) rename stable/{wireshark/0.0.5 => webgrabplus/0.0.7}/templates/common.yaml (100%) create mode 100644 stable/webgrabplus/0.0.7/values.yaml delete mode 100644 stable/whoogle/1.0.24/Chart.lock rename stable/whoogle/{1.0.24 => 1.0.25}/CHANGELOG.md (90%) create mode 100644 stable/whoogle/1.0.25/CONFIG.md create mode 100644 stable/whoogle/1.0.25/Chart.lock rename stable/whoogle/{1.0.24 => 1.0.25}/Chart.yaml (97%) rename stable/whoogle/{1.0.24 => 1.0.25}/README.md (100%) rename stable/whoogle/{1.0.24 => 1.0.25}/app-readme.md (100%) create mode 100644 stable/whoogle/1.0.25/charts/common-8.9.24.tgz rename stable/whoogle/{1.0.24 => 1.0.25}/helm-values.md (100%) rename stable/whoogle/{1.0.24 => 1.0.25}/ix_values.yaml (100%) rename stable/whoogle/{1.0.24 => 1.0.25}/questions.yaml (99%) rename stable/whoogle/{1.0.24 => 1.0.25}/security.md (100%) rename stable/{xbackbone/0.0.13 => whoogle/1.0.25}/templates/common.yaml (100%) create mode 100644 stable/whoogle/1.0.25/values.yaml rename stable/wikijs/{4.0.14 => 4.0.15}/CHANGELOG.md (87%) create mode 100644 stable/wikijs/4.0.15/CONFIG.md create mode 100644 stable/wikijs/4.0.15/Chart.lock rename stable/wikijs/{4.0.14 => 4.0.15}/Chart.yaml (98%) rename stable/wikijs/{4.0.14 => 4.0.15}/README.md (100%) rename stable/wikijs/{4.0.14 => 4.0.15}/app-readme.md (100%) create mode 100644 stable/wikijs/4.0.15/charts/common-8.9.24.tgz create mode 100644 stable/wikijs/4.0.15/charts/postgresql-6.0.34.tgz rename stable/wikijs/{4.0.14 => 4.0.15}/helm-values.md (89%) rename stable/wikijs/{4.0.14 => 4.0.15}/ix_values.yaml (99%) rename stable/wikijs/{4.0.14 => 4.0.15}/questions.yaml (99%) rename stable/wikijs/{4.0.14 => 4.0.15}/security.md (100%) rename stable/{xteve/4.0.24 => wikijs/4.0.15}/templates/common.yaml (100%) create mode 100644 stable/wikijs/4.0.15/values.yaml delete mode 100644 stable/wireshark/0.0.5/Chart.lock rename stable/wireshark/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) create mode 100644 stable/wireshark/0.0.6/CONFIG.md create mode 100644 stable/wireshark/0.0.6/Chart.lock rename stable/wireshark/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/wireshark/{0.0.5 => 0.0.6}/README.md (100%) rename stable/wireshark/{0.0.5 => 0.0.6}/app-readme.md (100%) create mode 100644 stable/wireshark/0.0.6/charts/common-8.9.24.tgz rename stable/wireshark/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/wireshark/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/wireshark/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/wireshark/{0.0.5 => 0.0.6}/security.md (100%) rename stable/{znc/0.0.5 => wireshark/0.0.6}/templates/common.yaml (100%) create mode 100644 stable/wireshark/0.0.6/values.yaml delete mode 100644 stable/xbackbone/0.0.13/Chart.lock rename stable/xbackbone/{0.0.13 => 0.0.14}/CHANGELOG.md (93%) create mode 100644 stable/xbackbone/0.0.14/CONFIG.md create mode 100644 stable/xbackbone/0.0.14/Chart.lock rename stable/xbackbone/{0.0.13 => 0.0.14}/Chart.yaml (98%) rename stable/xbackbone/{0.0.13 => 0.0.14}/README.md (100%) rename stable/xbackbone/{0.0.13 => 0.0.14}/app-readme.md (100%) create mode 100644 stable/xbackbone/0.0.14/charts/common-8.9.24.tgz rename stable/xbackbone/{0.0.13 => 0.0.14}/charts/mariadb-1.0.37.tgz (100%) rename stable/xbackbone/{0.0.13 => 0.0.14}/helm-values.md (100%) rename stable/xbackbone/{0.0.13 => 0.0.14}/ix_values.yaml (100%) rename stable/xbackbone/{0.0.13 => 0.0.14}/questions.yaml (100%) rename stable/xbackbone/{0.0.13 => 0.0.14}/security.md (100%) rename stable/{zwavejs2mqtt/9.0.30 => xbackbone/0.0.14}/templates/common.yaml (100%) create mode 100644 stable/xbackbone/0.0.14/values.yaml delete mode 100644 stable/xteve/4.0.24/Chart.lock rename stable/xteve/{4.0.24 => 4.0.25}/CHANGELOG.md (90%) create mode 100644 stable/xteve/4.0.25/CONFIG.md create mode 100644 stable/xteve/4.0.25/Chart.lock rename stable/xteve/{4.0.24 => 4.0.25}/Chart.yaml (97%) rename stable/xteve/{4.0.24 => 4.0.25}/README.md (100%) rename stable/xteve/{4.0.24 => 4.0.25}/app-readme.md (100%) create mode 100644 stable/xteve/4.0.25/charts/common-8.9.24.tgz rename stable/xteve/{4.0.24 => 4.0.25}/helm-values.md (100%) rename stable/xteve/{4.0.24 => 4.0.25}/ix_values.yaml (100%) rename stable/xteve/{4.0.24 => 4.0.25}/questions.yaml (99%) rename stable/xteve/{4.0.24 => 4.0.25}/security.md (100%) create mode 100644 stable/xteve/4.0.25/templates/common.yaml create mode 100644 stable/xteve/4.0.25/values.yaml delete mode 100644 stable/zigbee2mqtt/1.0.25/Chart.lock rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/CHANGELOG.md (90%) create mode 100644 stable/zigbee2mqtt/1.0.26/CONFIG.md create mode 100644 stable/zigbee2mqtt/1.0.26/Chart.lock rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/Chart.yaml (97%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/README.md (100%) create mode 100644 stable/zigbee2mqtt/1.0.26/SKIPINSTALL rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/app-readme.md (100%) create mode 100644 stable/zigbee2mqtt/1.0.26/charts/common-8.9.24.tgz rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/helm-values.md (100%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/ix_values.yaml (100%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/questions.yaml (99%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/security.md (100%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/templates/common.yaml (100%) rename stable/zigbee2mqtt/{1.0.25 => 1.0.26}/templates/configmap.yaml (100%) create mode 100644 stable/zigbee2mqtt/1.0.26/values.yaml delete mode 100644 stable/znc/0.0.5/Chart.lock rename stable/znc/{0.0.5 => 0.0.6}/CHANGELOG.md (86%) create mode 100644 stable/znc/0.0.6/CONFIG.md create mode 100644 stable/znc/0.0.6/Chart.lock rename stable/znc/{0.0.5 => 0.0.6}/Chart.yaml (98%) rename stable/znc/{0.0.5 => 0.0.6}/README.md (100%) rename stable/znc/{0.0.5 => 0.0.6}/app-readme.md (100%) create mode 100644 stable/znc/0.0.6/charts/common-8.9.24.tgz rename stable/znc/{0.0.5 => 0.0.6}/helm-values.md (100%) rename stable/znc/{0.0.5 => 0.0.6}/ix_values.yaml (100%) rename stable/znc/{0.0.5 => 0.0.6}/questions.yaml (100%) rename stable/znc/{0.0.5 => 0.0.6}/security.md (100%) create mode 100644 stable/znc/0.0.6/templates/common.yaml create mode 100644 stable/znc/0.0.6/values.yaml delete mode 100644 stable/zwavejs2mqtt/9.0.30/Chart.lock rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/CHANGELOG.md (85%) create mode 100644 stable/zwavejs2mqtt/9.0.31/CONFIG.md create mode 100644 stable/zwavejs2mqtt/9.0.31/Chart.lock rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/Chart.yaml (98%) rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/README.md (100%) rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/app-readme.md (100%) create mode 100644 stable/zwavejs2mqtt/9.0.31/charts/common-8.9.24.tgz rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/helm-values.md (100%) rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/ix_values.yaml (100%) rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/questions.yaml (99%) rename stable/zwavejs2mqtt/{9.0.30 => 9.0.31}/security.md (100%) create mode 100644 stable/zwavejs2mqtt/9.0.31/templates/common.yaml create mode 100644 stable/zwavejs2mqtt/9.0.31/values.yaml diff --git a/core/k8s-gateway/4.0.24/CHANGELOG.md b/core/k8s-gateway/4.0.25/CHANGELOG.md similarity index 90% rename from core/k8s-gateway/4.0.24/CHANGELOG.md rename to core/k8s-gateway/4.0.25/CHANGELOG.md index bd72163c577..cc6a393b413 100644 --- a/core/k8s-gateway/4.0.24/CHANGELOG.md +++ b/core/k8s-gateway/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [k8s-gateway-4.0.25](https://github.com/truecharts/apps/compare/k8s-gateway-4.0.24...k8s-gateway-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [k8s-gateway-4.0.24](https://github.com/truecharts/apps/compare/k8s-gateway-4.0.23...k8s-gateway-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [k8s-gateway-4.0.16](https://github.com/truecharts/apps/compare/k8s-gateway-4.0.15...k8s-gateway-4.0.16) (2021-12-04) -#### Chore - -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) - - - - -### [k8s-gateway-4.0.15](https://github.com/truecharts/apps/compare/k8s-gateway-4.0.14...k8s-gateway-4.0.15) (2021-12-03) - -#### Chore diff --git a/core/k8s-gateway/4.0.24/CONFIG.md b/core/k8s-gateway/4.0.25/CONFIG.md similarity index 100% rename from core/k8s-gateway/4.0.24/CONFIG.md rename to core/k8s-gateway/4.0.25/CONFIG.md diff --git a/dependency/memcached/1.0.36/Chart.lock b/core/k8s-gateway/4.0.25/Chart.lock similarity index 78% rename from dependency/memcached/1.0.36/Chart.lock rename to core/k8s-gateway/4.0.25/Chart.lock index 9ec5125e25f..b594d933b2f 100644 --- a/dependency/memcached/1.0.36/Chart.lock +++ b/core/k8s-gateway/4.0.25/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T16:42:37.572435895Z" +generated: "2021-12-19T23:04:06.274527534Z" diff --git a/core/k8s-gateway/4.0.24/Chart.yaml b/core/k8s-gateway/4.0.25/Chart.yaml similarity index 97% rename from core/k8s-gateway/4.0.24/Chart.yaml rename to core/k8s-gateway/4.0.25/Chart.yaml index 21aa214c403..a34d88e4c23 100644 --- a/core/k8s-gateway/4.0.24/Chart.yaml +++ b/core/k8s-gateway/4.0.25/Chart.yaml @@ -20,7 +20,7 @@ name: k8s-gateway sources: - https://github.com/ori-edge/k8s_gateway type: application -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - networking diff --git a/core/k8s-gateway/4.0.24/README.md b/core/k8s-gateway/4.0.25/README.md similarity index 100% rename from core/k8s-gateway/4.0.24/README.md rename to core/k8s-gateway/4.0.25/README.md diff --git a/core/k8s-gateway/4.0.24/app-readme.md b/core/k8s-gateway/4.0.25/app-readme.md similarity index 100% rename from core/k8s-gateway/4.0.24/app-readme.md rename to core/k8s-gateway/4.0.25/app-readme.md diff --git a/core/k8s-gateway/4.0.24/charts/common-8.9.24.tgz b/core/k8s-gateway/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from core/k8s-gateway/4.0.24/charts/common-8.9.24.tgz rename to core/k8s-gateway/4.0.25/charts/common-8.9.24.tgz diff --git a/core/k8s-gateway/4.0.24/helm-values.md b/core/k8s-gateway/4.0.25/helm-values.md similarity index 100% rename from core/k8s-gateway/4.0.24/helm-values.md rename to core/k8s-gateway/4.0.25/helm-values.md diff --git a/core/k8s-gateway/4.0.24/ix_values.yaml b/core/k8s-gateway/4.0.25/ix_values.yaml similarity index 100% rename from core/k8s-gateway/4.0.24/ix_values.yaml rename to core/k8s-gateway/4.0.25/ix_values.yaml diff --git a/core/k8s-gateway/4.0.24/questions.yaml b/core/k8s-gateway/4.0.25/questions.yaml similarity index 99% rename from core/k8s-gateway/4.0.24/questions.yaml rename to core/k8s-gateway/4.0.25/questions.yaml index 319aa4b49c1..270609d4c09 100644 --- a/core/k8s-gateway/4.0.24/questions.yaml +++ b/core/k8s-gateway/4.0.25/questions.yaml @@ -426,7 +426,6 @@ questions: schema: type: int default: 53 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/core/k8s-gateway/4.0.24/security.md b/core/k8s-gateway/4.0.25/security.md similarity index 100% rename from core/k8s-gateway/4.0.24/security.md rename to core/k8s-gateway/4.0.25/security.md diff --git a/core/k8s-gateway/4.0.24/templates/_configmap.tpl b/core/k8s-gateway/4.0.25/templates/_configmap.tpl similarity index 100% rename from core/k8s-gateway/4.0.24/templates/_configmap.tpl rename to core/k8s-gateway/4.0.25/templates/_configmap.tpl diff --git a/core/k8s-gateway/4.0.24/templates/common.yaml b/core/k8s-gateway/4.0.25/templates/common.yaml similarity index 100% rename from core/k8s-gateway/4.0.24/templates/common.yaml rename to core/k8s-gateway/4.0.25/templates/common.yaml diff --git a/core/k8s-gateway/4.0.24/values.yaml b/core/k8s-gateway/4.0.25/values.yaml similarity index 100% rename from core/k8s-gateway/4.0.24/values.yaml rename to core/k8s-gateway/4.0.25/values.yaml diff --git a/core/metallb/1.0.2/CHANGELOG.md b/core/metallb/1.0.3/CHANGELOG.md similarity index 76% rename from core/metallb/1.0.2/CHANGELOG.md rename to core/metallb/1.0.3/CHANGELOG.md index d76fc1fd798..be0a05b377e 100644 --- a/core/metallb/1.0.2/CHANGELOG.md +++ b/core/metallb/1.0.3/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [metallb-1.0.3](https://github.com/truecharts/apps/compare/metallb-1.0.2...metallb-1.0.3) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + ### metallb-1.0.2 (2021-12-13) diff --git a/core/metallb/1.0.2/CONFIG.md b/core/metallb/1.0.3/CONFIG.md similarity index 100% rename from core/metallb/1.0.2/CONFIG.md rename to core/metallb/1.0.3/CONFIG.md diff --git a/core/metallb/1.0.2/Chart.lock b/core/metallb/1.0.3/Chart.lock similarity index 80% rename from core/metallb/1.0.2/Chart.lock rename to core/metallb/1.0.3/Chart.lock index 278f6883be3..f2fa8d1f20f 100644 --- a/core/metallb/1.0.2/Chart.lock +++ b/core/metallb/1.0.3/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://metallb.github.io/metallb version: 0.11.0 digest: sha256:a8dc776d571e5b6647b6c32be39afb92ddece6271c6d135d9da48a18d740d859 -generated: "2021-12-13T11:59:04.60671559Z" +generated: "2021-12-19T23:04:05.849732371Z" diff --git a/core/metallb/1.0.2/Chart.yaml b/core/metallb/1.0.3/Chart.yaml similarity index 89% rename from core/metallb/1.0.2/Chart.yaml rename to core/metallb/1.0.3/Chart.yaml index b971abd0700..6be03c0dc07 100644 --- a/core/metallb/1.0.2/Chart.yaml +++ b/core/metallb/1.0.3/Chart.yaml @@ -3,7 +3,7 @@ appVersion: "upstream" deprecated: false description: A network load-balancer implementation for Kubernetes using standard routing protocols home: https://github.com/truecharts/apps/tree/master/charts/stable/metallb -icon: https://metallb.universe.tf/images/logo/metallb-white.png +icon: https://truecharts.org/_static/img/appicons/metallb-icon.png keywords: - metallb - loadbalancer @@ -21,7 +21,7 @@ sources: - https://github.com/metallb/metallb - https://metallb.universe.tf type: application -version: 1.0.2 +version: 1.0.3 annotations: truecharts.org/catagories: | - core diff --git a/core/metallb/1.0.2/README.md b/core/metallb/1.0.3/README.md similarity index 100% rename from core/metallb/1.0.2/README.md rename to core/metallb/1.0.3/README.md diff --git a/core/metallb/1.0.2/app-readme.md b/core/metallb/1.0.3/app-readme.md similarity index 100% rename from core/metallb/1.0.2/app-readme.md rename to core/metallb/1.0.3/app-readme.md diff --git a/core/metallb/1.0.2/charts/metallb-0.11.0.tgz b/core/metallb/1.0.3/charts/metallb-0.11.0.tgz similarity index 100% rename from core/metallb/1.0.2/charts/metallb-0.11.0.tgz rename to core/metallb/1.0.3/charts/metallb-0.11.0.tgz diff --git a/core/metallb/1.0.2/helm-values.md b/core/metallb/1.0.3/helm-values.md similarity index 100% rename from core/metallb/1.0.2/helm-values.md rename to core/metallb/1.0.3/helm-values.md diff --git a/core/metallb/1.0.2/ix_values.yaml b/core/metallb/1.0.3/ix_values.yaml similarity index 100% rename from core/metallb/1.0.2/ix_values.yaml rename to core/metallb/1.0.3/ix_values.yaml diff --git a/core/metallb/1.0.2/questions.yaml b/core/metallb/1.0.3/questions.yaml similarity index 100% rename from core/metallb/1.0.2/questions.yaml rename to core/metallb/1.0.3/questions.yaml diff --git a/core/metallb/1.0.2/security.md b/core/metallb/1.0.3/security.md similarity index 100% rename from core/metallb/1.0.2/security.md rename to core/metallb/1.0.3/security.md diff --git a/core/metallb/1.0.2/values.yaml b/core/metallb/1.0.3/values.yaml similarity index 100% rename from core/metallb/1.0.2/values.yaml rename to core/metallb/1.0.3/values.yaml diff --git a/core/metallb/item.yaml b/core/metallb/item.yaml index 49e6400d039..311937c3ac0 100644 --- a/core/metallb/item.yaml +++ b/core/metallb/item.yaml @@ -1,4 +1,4 @@ -icon_url: https://metallb.universe.tf/images/logo/metallb-white.png +icon_url: https://truecharts.org/_static/img/appicons/metallb-icon.png categories: - core diff --git a/core/prometheus/1.1.22/CHANGELOG.md b/core/prometheus/1.1.23/CHANGELOG.md similarity index 91% rename from core/prometheus/1.1.22/CHANGELOG.md rename to core/prometheus/1.1.23/CHANGELOG.md index 6a0770a4dff..ab82efb8799 100644 --- a/core/prometheus/1.1.22/CHANGELOG.md +++ b/core/prometheus/1.1.23/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-1.1.23](https://github.com/truecharts/apps/compare/prometheus-1.1.22...prometheus-1.1.23) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [prometheus-1.1.22](https://github.com/truecharts/apps/compare/prometheus-1.1.21...prometheus-1.1.22) (2021-12-19) @@ -88,12 +97,3 @@ #### Chore * update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [prometheus-1.1.12](https://github.com/truecharts/apps/compare/prometheus-1.1.11...prometheus-1.1.12) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) diff --git a/core/prometheus/1.1.22/CONFIG.md b/core/prometheus/1.1.23/CONFIG.md similarity index 100% rename from core/prometheus/1.1.22/CONFIG.md rename to core/prometheus/1.1.23/CONFIG.md diff --git a/core/prometheus/1.1.22/Chart.lock b/core/prometheus/1.1.23/Chart.lock similarity index 88% rename from core/prometheus/1.1.22/Chart.lock rename to core/prometheus/1.1.23/Chart.lock index 9456f05306c..14763ba3d97 100644 --- a/core/prometheus/1.1.22/Chart.lock +++ b/core/prometheus/1.1.23/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 2.1.19 digest: sha256:9996c081f33e1a636bcbb3b060bcb8ea425ad59e6bf5c808f6e88c2a3e136ab1 -generated: "2021-12-19T18:17:53.736120337Z" +generated: "2021-12-19T23:04:14.799042413Z" diff --git a/core/prometheus/1.1.22/Chart.yaml b/core/prometheus/1.1.23/Chart.yaml similarity index 98% rename from core/prometheus/1.1.22/Chart.yaml rename to core/prometheus/1.1.23/Chart.yaml index 066e9e69364..f0c090c905e 100644 --- a/core/prometheus/1.1.22/Chart.yaml +++ b/core/prometheus/1.1.23/Chart.yaml @@ -28,7 +28,7 @@ sources: - https://github.com/prometheus-community/helm-charts - https://github.com/prometheus-operator/kube-prometheus type: application -version: 1.1.22 +version: 1.1.23 annotations: truecharts.org/catagories: | - metrics diff --git a/core/prometheus/1.1.22/README.md b/core/prometheus/1.1.23/README.md similarity index 100% rename from core/prometheus/1.1.22/README.md rename to core/prometheus/1.1.23/README.md diff --git a/core/prometheus/1.1.22/app-readme.md b/core/prometheus/1.1.23/app-readme.md similarity index 100% rename from core/prometheus/1.1.22/app-readme.md rename to core/prometheus/1.1.23/app-readme.md diff --git a/core/prometheus/1.1.22/charts/common-8.9.24.tgz b/core/prometheus/1.1.23/charts/common-8.9.24.tgz similarity index 100% rename from core/prometheus/1.1.22/charts/common-8.9.24.tgz rename to core/prometheus/1.1.23/charts/common-8.9.24.tgz diff --git a/core/prometheus/1.1.22/charts/kube-state-metrics-2.1.19.tgz b/core/prometheus/1.1.23/charts/kube-state-metrics-2.1.19.tgz similarity index 100% rename from core/prometheus/1.1.22/charts/kube-state-metrics-2.1.19.tgz rename to core/prometheus/1.1.23/charts/kube-state-metrics-2.1.19.tgz diff --git a/core/prometheus/1.1.22/charts/node-exporter-2.3.17.tgz b/core/prometheus/1.1.23/charts/node-exporter-2.3.17.tgz similarity index 100% rename from core/prometheus/1.1.22/charts/node-exporter-2.3.17.tgz rename to core/prometheus/1.1.23/charts/node-exporter-2.3.17.tgz diff --git a/core/prometheus/1.1.22/crds/crd-alertmanager-config.yaml b/core/prometheus/1.1.23/crds/crd-alertmanager-config.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-alertmanager-config.yaml rename to core/prometheus/1.1.23/crds/crd-alertmanager-config.yaml diff --git a/core/prometheus/1.1.22/crds/crd-alertmanager.yaml b/core/prometheus/1.1.23/crds/crd-alertmanager.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-alertmanager.yaml rename to core/prometheus/1.1.23/crds/crd-alertmanager.yaml diff --git a/core/prometheus/1.1.22/crds/crd-podmonitor.yaml b/core/prometheus/1.1.23/crds/crd-podmonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-podmonitor.yaml rename to core/prometheus/1.1.23/crds/crd-podmonitor.yaml diff --git a/core/prometheus/1.1.22/crds/crd-probes.yaml b/core/prometheus/1.1.23/crds/crd-probes.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-probes.yaml rename to core/prometheus/1.1.23/crds/crd-probes.yaml diff --git a/core/prometheus/1.1.22/crds/crd-prometheus.yaml b/core/prometheus/1.1.23/crds/crd-prometheus.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-prometheus.yaml rename to core/prometheus/1.1.23/crds/crd-prometheus.yaml diff --git a/core/prometheus/1.1.22/crds/crd-prometheusrules.yaml b/core/prometheus/1.1.23/crds/crd-prometheusrules.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-prometheusrules.yaml rename to core/prometheus/1.1.23/crds/crd-prometheusrules.yaml diff --git a/core/prometheus/1.1.22/crds/crd-servicemonitor.yaml b/core/prometheus/1.1.23/crds/crd-servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-servicemonitor.yaml rename to core/prometheus/1.1.23/crds/crd-servicemonitor.yaml diff --git a/core/prometheus/1.1.22/crds/crd-thanosrulers.yaml b/core/prometheus/1.1.23/crds/crd-thanosrulers.yaml similarity index 100% rename from core/prometheus/1.1.22/crds/crd-thanosrulers.yaml rename to core/prometheus/1.1.23/crds/crd-thanosrulers.yaml diff --git a/core/prometheus/1.1.22/helm-values.md b/core/prometheus/1.1.23/helm-values.md similarity index 100% rename from core/prometheus/1.1.22/helm-values.md rename to core/prometheus/1.1.23/helm-values.md diff --git a/core/prometheus/1.1.22/ix_values.yaml b/core/prometheus/1.1.23/ix_values.yaml similarity index 100% rename from core/prometheus/1.1.22/ix_values.yaml rename to core/prometheus/1.1.23/ix_values.yaml diff --git a/core/prometheus/1.1.22/questions.yaml b/core/prometheus/1.1.23/questions.yaml similarity index 100% rename from core/prometheus/1.1.22/questions.yaml rename to core/prometheus/1.1.23/questions.yaml diff --git a/core/prometheus/1.1.22/security.md b/core/prometheus/1.1.23/security.md similarity index 100% rename from core/prometheus/1.1.22/security.md rename to core/prometheus/1.1.23/security.md diff --git a/core/prometheus/1.1.22/templates/_helpers.tpl b/core/prometheus/1.1.23/templates/_helpers.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/_helpers.tpl rename to core/prometheus/1.1.23/templates/_helpers.tpl diff --git a/core/prometheus/1.1.22/templates/alertmanager/_alertmanager.tpl b/core/prometheus/1.1.23/templates/alertmanager/_alertmanager.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/alertmanager/_alertmanager.tpl rename to core/prometheus/1.1.23/templates/alertmanager/_alertmanager.tpl diff --git a/core/prometheus/1.1.22/templates/alertmanager/secrets.yaml b/core/prometheus/1.1.23/templates/alertmanager/secrets.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/alertmanager/secrets.yaml rename to core/prometheus/1.1.23/templates/alertmanager/secrets.yaml diff --git a/core/prometheus/1.1.22/templates/alertmanager/serviceaccount.yaml b/core/prometheus/1.1.23/templates/alertmanager/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/alertmanager/serviceaccount.yaml rename to core/prometheus/1.1.23/templates/alertmanager/serviceaccount.yaml diff --git a/core/prometheus/1.1.22/templates/alertmanager/servicemonitor.yaml b/core/prometheus/1.1.23/templates/alertmanager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/alertmanager/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/alertmanager/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/common.yaml b/core/prometheus/1.1.23/templates/common.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/common.yaml rename to core/prometheus/1.1.23/templates/common.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/core-dns/service.yaml b/core/prometheus/1.1.23/templates/exporters/core-dns/service.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/core-dns/service.yaml rename to core/prometheus/1.1.23/templates/exporters/core-dns/service.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/core-dns/servicemonitor.yaml b/core/prometheus/1.1.23/templates/exporters/core-dns/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/core-dns/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/exporters/core-dns/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-apiserver/servicemonitor.yaml b/core/prometheus/1.1.23/templates/exporters/kube-apiserver/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-apiserver/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-apiserver/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-controller-manager/endpoints.yaml b/core/prometheus/1.1.23/templates/exporters/kube-controller-manager/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-controller-manager/endpoints.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-controller-manager/endpoints.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-controller-manager/service.yaml b/core/prometheus/1.1.23/templates/exporters/kube-controller-manager/service.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-controller-manager/service.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-controller-manager/service.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-controller-manager/servicemonitor.yaml b/core/prometheus/1.1.23/templates/exporters/kube-controller-manager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-controller-manager/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-controller-manager/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-scheduler/endpoints.yaml b/core/prometheus/1.1.23/templates/exporters/kube-scheduler/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-scheduler/endpoints.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-scheduler/endpoints.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-scheduler/service.yaml b/core/prometheus/1.1.23/templates/exporters/kube-scheduler/service.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-scheduler/service.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-scheduler/service.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kube-scheduler/servicemonitor.yaml b/core/prometheus/1.1.23/templates/exporters/kube-scheduler/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kube-scheduler/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/exporters/kube-scheduler/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/exporters/kubelet/servicemonitor.yaml b/core/prometheus/1.1.23/templates/exporters/kubelet/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/exporters/kubelet/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/exporters/kubelet/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/operator/_args.tpl b/core/prometheus/1.1.23/templates/operator/_args.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/operator/_args.tpl rename to core/prometheus/1.1.23/templates/operator/_args.tpl diff --git a/core/prometheus/1.1.22/templates/operator/configmap.yaml b/core/prometheus/1.1.23/templates/operator/configmap.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/operator/configmap.yaml rename to core/prometheus/1.1.23/templates/operator/configmap.yaml diff --git a/core/prometheus/1.1.22/templates/operator/servicemonitor.yaml b/core/prometheus/1.1.23/templates/operator/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/operator/servicemonitor.yaml rename to core/prometheus/1.1.23/templates/operator/servicemonitor.yaml diff --git a/core/prometheus/1.1.22/templates/prometheus/_additionalPrometheusRules.tpl b/core/prometheus/1.1.23/templates/prometheus/_additionalPrometheusRules.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/_additionalPrometheusRules.tpl rename to core/prometheus/1.1.23/templates/prometheus/_additionalPrometheusRules.tpl diff --git a/core/prometheus/1.1.22/templates/prometheus/_additionalScrapeJobs.tpl b/core/prometheus/1.1.23/templates/prometheus/_additionalScrapeJobs.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/_additionalScrapeJobs.tpl rename to core/prometheus/1.1.23/templates/prometheus/_additionalScrapeJobs.tpl diff --git a/core/prometheus/1.1.22/templates/prometheus/_prometheus.tpl b/core/prometheus/1.1.23/templates/prometheus/_prometheus.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/_prometheus.tpl rename to core/prometheus/1.1.23/templates/prometheus/_prometheus.tpl diff --git a/core/prometheus/1.1.22/templates/prometheus/_servicemonitor.tpl b/core/prometheus/1.1.23/templates/prometheus/_servicemonitor.tpl similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/_servicemonitor.tpl rename to core/prometheus/1.1.23/templates/prometheus/_servicemonitor.tpl diff --git a/core/prometheus/1.1.22/templates/prometheus/clusterrole.yaml b/core/prometheus/1.1.23/templates/prometheus/clusterrole.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/clusterrole.yaml rename to core/prometheus/1.1.23/templates/prometheus/clusterrole.yaml diff --git a/core/prometheus/1.1.22/templates/prometheus/clusterrolebinding.yaml b/core/prometheus/1.1.23/templates/prometheus/clusterrolebinding.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/clusterrolebinding.yaml rename to core/prometheus/1.1.23/templates/prometheus/clusterrolebinding.yaml diff --git a/core/prometheus/1.1.22/templates/prometheus/serviceaccount.yaml b/core/prometheus/1.1.23/templates/prometheus/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.22/templates/prometheus/serviceaccount.yaml rename to core/prometheus/1.1.23/templates/prometheus/serviceaccount.yaml diff --git a/core/prometheus/1.1.22/values.yaml b/core/prometheus/1.1.23/values.yaml similarity index 100% rename from core/prometheus/1.1.22/values.yaml rename to core/prometheus/1.1.23/values.yaml diff --git a/core/traefik/10.0.28/CHANGELOG.md b/core/traefik/10.0.28/CHANGELOG.md new file mode 100644 index 00000000000..5fd3131bc7e --- /dev/null +++ b/core/traefik/10.0.28/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [traefik-10.0.28](https://github.com/truecharts/apps/compare/traefik-10.0.27...traefik-10.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [traefik-10.0.27](https://github.com/truecharts/apps/compare/traefik-10.0.26...traefik-10.0.27) (2021-12-19) + +#### Chore + +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [traefik-10.0.26](https://github.com/truecharts/apps/compare/traefik-10.0.25...traefik-10.0.26) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [traefik-10.0.25](https://github.com/truecharts/apps/compare/traefik-10.0.24...traefik-10.0.25) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [traefik-10.0.24](https://github.com/truecharts/apps/compare/traefik-10.0.23...traefik-10.0.24) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + + +### [traefik-10.0.23](https://github.com/truecharts/apps/compare/traefik-10.0.22...traefik-10.0.23) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [traefik-10.0.22](https://github.com/truecharts/apps/compare/traefik-10.0.21...traefik-10.0.22) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### traefik-10.0.21 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + + + +### [traefik-10.0.20](https://github.com/truecharts/apps/compare/traefik-10.0.19...traefik-10.0.20) (2021-12-05) + +#### Chore + +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) + + + + +### [traefik-10.0.19](https://github.com/truecharts/apps/compare/traefik-10.0.18...traefik-10.0.19) (2021-12-04) + diff --git a/dependency/mariadb/1.0.37/CONFIG.md b/core/traefik/10.0.28/CONFIG.md similarity index 100% rename from dependency/mariadb/1.0.37/CONFIG.md rename to core/traefik/10.0.28/CONFIG.md diff --git a/core/k8s-gateway/4.0.24/Chart.lock b/core/traefik/10.0.28/Chart.lock similarity index 78% rename from core/k8s-gateway/4.0.24/Chart.lock rename to core/traefik/10.0.28/Chart.lock index 65d517f8dce..b20e1669db9 100644 --- a/core/k8s-gateway/4.0.24/Chart.lock +++ b/core/traefik/10.0.28/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:17:45.476439692Z" +generated: "2021-12-19T23:04:06.282067633Z" diff --git a/core/traefik/10.0.28/Chart.yaml b/core/traefik/10.0.28/Chart.yaml new file mode 100644 index 00000000000..5d9eb74d126 --- /dev/null +++ b/core/traefik/10.0.28/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "2.5.5" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +deprecated: false +description: Test App for Traefik +home: https://github.com/truecharts/apps/tree/master/charts/stable/traefik +icon: https://truecharts.org/_static/img/appicons/traefik-icon.png +keywords: +- traefik +- ingress +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: traefik +sources: +- https://github.com/traefik/traefik +- https://github.com/traefik/traefik-helm-chart +- https://traefik.io/ +type: application +version: 10.0.28 +annotations: + truecharts.org/catagories: | + - network + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/core/traefik/10.0.28/README.md b/core/traefik/10.0.28/README.md new file mode 100644 index 00000000000..ef22a86294b --- /dev/null +++ b/core/traefik/10.0.28/README.md @@ -0,0 +1,39 @@ +# Introduction + +Test App for Traefik + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/core/traefik/10.0.28/app-readme.md b/core/traefik/10.0.28/app-readme.md new file mode 100644 index 00000000000..823c75135e0 --- /dev/null +++ b/core/traefik/10.0.28/app-readme.md @@ -0,0 +1,3 @@ +Test App for Traefik + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/dependency/mariadb/1.0.37/charts/common-8.9.24.tgz b/core/traefik/10.0.28/charts/common-8.9.24.tgz similarity index 100% rename from dependency/mariadb/1.0.37/charts/common-8.9.24.tgz rename to core/traefik/10.0.28/charts/common-8.9.24.tgz diff --git a/core/traefik/10.0.28/crds/ingressroute.yaml b/core/traefik/10.0.28/crds/ingressroute.yaml new file mode 100644 index 00000000000..3391ba532a4 --- /dev/null +++ b/core/traefik/10.0.28/crds/ingressroute.yaml @@ -0,0 +1,198 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressroutes.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRoute + listKind: IngressRouteList + plural: ingressroutes + singular: ingressroute + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRoute is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteSpec is a specification for a IngressRouteSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: Route contains the set of routes. + properties: + kind: + enum: + - Rule + type: string + match: + type: string + middlewares: + items: + description: MiddlewareRef is a ref to the Middleware resources. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + priority: + type: integer + services: + items: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The + differentiation between the two is specified in the + Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration + based on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name + references a TraefikService object (and to be precise, + one that embeds a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + required: + - kind + - match + type: object + type: array + tls: + description: "TLS contains the TLS certificates configuration of the + routes. To enable Let's Encrypt, use an empty TLS struct, e.g. in + YAML: \n \t tls: {} # inline format \n \t tls: \t secretName: + # block format" + properties: + certResolver: + type: string + domains: + items: + description: Domain holds a domain name with SANs. + properties: + main: + type: string + sans: + items: + type: string + type: array + type: object + type: array + options: + description: Options is a reference to a TLSOption, that specifies + the parameters of the TLS connection. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + store: + description: Store is a reference to a TLSStore, that specifies + the parameters of the TLS store. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: object + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/ingressroutetcp.yaml b/core/traefik/10.0.28/crds/ingressroutetcp.yaml new file mode 100644 index 00000000000..67e099b47da --- /dev/null +++ b/core/traefik/10.0.28/crds/ingressroutetcp.yaml @@ -0,0 +1,160 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressroutetcps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRouteTCP + listKind: IngressRouteTCPList + plural: ingressroutetcps + singular: ingressroutetcp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRouteTCP is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteTCPSpec is a specification for a IngressRouteTCPSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: RouteTCP contains the set of routes. + properties: + match: + type: string + middlewares: + description: Middlewares contains references to MiddlewareTCP + resources. + items: + description: ObjectReference is a generic reference to a Traefik + resource. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + services: + items: + description: ServiceTCP defines an upstream to proxy traffic. + properties: + name: + type: string + namespace: + type: string + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + proxyProtocol: + description: ProxyProtocol holds the ProxyProtocol configuration. + properties: + version: + type: integer + type: object + terminationDelay: + type: integer + weight: + type: integer + required: + - name + - port + type: object + type: array + required: + - match + type: object + type: array + tls: + description: "TLSTCP contains the TLS certificates configuration of + the routes. To enable Let's Encrypt, use an empty TLS struct, e.g. + in YAML: \n \t tls: {} # inline format \n \t tls: \t secretName: + # block format" + properties: + certResolver: + type: string + domains: + items: + description: Domain holds a domain name with SANs. + properties: + main: + type: string + sans: + items: + type: string + type: array + type: object + type: array + options: + description: Options is a reference to a TLSOption, that specifies + the parameters of the TLS connection. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + passthrough: + type: boolean + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + store: + description: Store is a reference to a TLSStore, that specifies + the parameters of the TLS store. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: object + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/ingressrouteudp.yaml b/core/traefik/10.0.28/crds/ingressrouteudp.yaml new file mode 100644 index 00000000000..910acd6c270 --- /dev/null +++ b/core/traefik/10.0.28/crds/ingressrouteudp.yaml @@ -0,0 +1,84 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressrouteudps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRouteUDP + listKind: IngressRouteUDPList + plural: ingressrouteudps + singular: ingressrouteudp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRouteUDP is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteUDPSpec is a specification for a IngressRouteUDPSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: RouteUDP contains the set of routes. + properties: + services: + items: + description: ServiceUDP defines an upstream to proxy traffic. + properties: + name: + type: string + namespace: + type: string + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + weight: + type: integer + required: + - name + - port + type: object + type: array + type: object + type: array + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/middlewares.yaml b/core/traefik/10.0.28/crds/middlewares.yaml new file mode 100644 index 00000000000..1770587a327 --- /dev/null +++ b/core/traefik/10.0.28/crds/middlewares.yaml @@ -0,0 +1,563 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: middlewares.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: Middleware + listKind: MiddlewareList + plural: middlewares + singular: middleware + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: Middleware is a specification for a Middleware resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: MiddlewareSpec holds the Middleware configuration. + properties: + addPrefix: + description: AddPrefix holds the AddPrefix configuration. + properties: + prefix: + type: string + type: object + basicAuth: + description: BasicAuth holds the HTTP basic authentication configuration. + properties: + headerField: + type: string + realm: + type: string + removeHeader: + type: boolean + secret: + type: string + type: object + buffering: + description: Buffering holds the request/response buffering configuration. + properties: + maxRequestBodyBytes: + format: int64 + type: integer + maxResponseBodyBytes: + format: int64 + type: integer + memRequestBodyBytes: + format: int64 + type: integer + memResponseBodyBytes: + format: int64 + type: integer + retryExpression: + type: string + type: object + chain: + description: Chain holds a chain of middlewares. + properties: + middlewares: + items: + description: MiddlewareRef is a ref to the Middleware resources. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + type: object + circuitBreaker: + description: CircuitBreaker holds the circuit breaker configuration. + properties: + expression: + type: string + type: object + compress: + description: Compress holds the compress configuration. + properties: + excludedContentTypes: + items: + type: string + type: array + type: object + contentType: + description: ContentType middleware - or rather its unique `autoDetect` + option - specifies whether to let the `Content-Type` header, if + it has not been set by the backend, be automatically set to a value + derived from the contents of the response. As a proxy, the default + behavior should be to leave the header alone, regardless of what + the backend did with it. However, the historic default was to always + auto-detect and set the header if it was nil, and it is going to + be kept that way in order to support users currently relying on + it. This middleware exists to enable the correct behavior until + at least the default one can be changed in a future version. + properties: + autoDetect: + type: boolean + type: object + digestAuth: + description: DigestAuth holds the Digest HTTP authentication configuration. + properties: + headerField: + type: string + realm: + type: string + removeHeader: + type: boolean + secret: + type: string + type: object + errors: + description: ErrorPage holds the custom error page configuration. + properties: + query: + type: string + service: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service object + (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for the + forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + status: + items: + type: string + type: array + type: object + forwardAuth: + description: ForwardAuth holds the http forward authentication configuration. + properties: + address: + type: string + authRequestHeaders: + items: + type: string + type: array + authResponseHeaders: + items: + type: string + type: array + authResponseHeadersRegex: + type: string + tls: + description: ClientTLS holds TLS specific configurations as client. + properties: + caOptional: + type: boolean + caSecret: + type: string + certSecret: + type: string + insecureSkipVerify: + type: boolean + type: object + trustForwardHeader: + type: boolean + type: object + headers: + description: Headers holds the custom header configuration. + properties: + accessControlAllowCredentials: + description: AccessControlAllowCredentials is only valid if true. + false is ignored. + type: boolean + accessControlAllowHeaders: + description: AccessControlAllowHeaders must be used in response + to a preflight request with Access-Control-Request-Headers set. + items: + type: string + type: array + accessControlAllowMethods: + description: AccessControlAllowMethods must be used in response + to a preflight request with Access-Control-Request-Method set. + items: + type: string + type: array + accessControlAllowOriginList: + description: AccessControlAllowOriginList is a list of allowable + origins. Can also be a wildcard origin "*". + items: + type: string + type: array + accessControlAllowOriginListRegex: + description: AccessControlAllowOriginListRegex is a list of allowable + origins written following the Regular Expression syntax (https://golang.org/pkg/regexp/). + items: + type: string + type: array + accessControlExposeHeaders: + description: AccessControlExposeHeaders sets valid headers for + the response. + items: + type: string + type: array + accessControlMaxAge: + description: AccessControlMaxAge sets the time that a preflight + request may be cached. + format: int64 + type: integer + addVaryHeader: + description: AddVaryHeader controls if the Vary header is automatically + added/updated when the AccessControlAllowOriginList is set. + type: boolean + allowedHosts: + items: + type: string + type: array + browserXssFilter: + type: boolean + contentSecurityPolicy: + type: string + contentTypeNosniff: + type: boolean + customBrowserXSSValue: + type: string + customFrameOptionsValue: + type: string + customRequestHeaders: + additionalProperties: + type: string + type: object + customResponseHeaders: + additionalProperties: + type: string + type: object + featurePolicy: + type: string + forceSTSHeader: + type: boolean + frameDeny: + type: boolean + hostsProxyHeaders: + items: + type: string + type: array + isDevelopment: + type: boolean + publicKey: + type: string + referrerPolicy: + type: string + sslForceHost: + description: 'Deprecated: use RedirectRegex instead.' + type: boolean + sslHost: + description: 'Deprecated: use RedirectRegex instead.' + type: string + sslProxyHeaders: + additionalProperties: + type: string + type: object + sslRedirect: + description: 'Deprecated: use EntryPoint redirection or RedirectScheme + instead.' + type: boolean + sslTemporaryRedirect: + description: 'Deprecated: use EntryPoint redirection or RedirectScheme + instead.' + type: boolean + stsIncludeSubdomains: + type: boolean + stsPreload: + type: boolean + stsSeconds: + format: int64 + type: integer + type: object + inFlightReq: + description: InFlightReq limits the number of requests being processed + and served concurrently. + properties: + amount: + format: int64 + type: integer + sourceCriterion: + description: SourceCriterion defines what criterion is used to + group requests as originating from a common source. If none + are set, the default is to use the request's remote address + field. All fields are mutually exclusive. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + requestHeaderName: + type: string + requestHost: + type: boolean + type: object + type: object + ipWhiteList: + description: IPWhiteList holds the ip white list configuration. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + sourceRange: + items: + type: string + type: array + type: object + passTLSClientCert: + description: PassTLSClientCert holds the TLS client cert headers configuration. + properties: + info: + description: TLSClientCertificateInfo holds the client TLS certificate + info configuration. + properties: + issuer: + description: TLSCLientCertificateDNInfo holds the client TLS + certificate distinguished name info configuration. cf https://tools.ietf.org/html/rfc3739 + properties: + commonName: + type: boolean + country: + type: boolean + domainComponent: + type: boolean + locality: + type: boolean + organization: + type: boolean + province: + type: boolean + serialNumber: + type: boolean + type: object + notAfter: + type: boolean + notBefore: + type: boolean + sans: + type: boolean + serialNumber: + type: boolean + subject: + description: TLSCLientCertificateDNInfo holds the client TLS + certificate distinguished name info configuration. cf https://tools.ietf.org/html/rfc3739 + properties: + commonName: + type: boolean + country: + type: boolean + domainComponent: + type: boolean + locality: + type: boolean + organization: + type: boolean + province: + type: boolean + serialNumber: + type: boolean + type: object + type: object + pem: + type: boolean + type: object + plugin: + additionalProperties: + x-kubernetes-preserve-unknown-fields: true + type: object + rateLimit: + description: RateLimit holds the rate limiting configuration for a + given router. + properties: + average: + format: int64 + type: integer + burst: + format: int64 + type: integer + period: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + sourceCriterion: + description: SourceCriterion defines what criterion is used to + group requests as originating from a common source. If none + are set, the default is to use the request's remote address + field. All fields are mutually exclusive. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + requestHeaderName: + type: string + requestHost: + type: boolean + type: object + type: object + redirectRegex: + description: RedirectRegex holds the redirection configuration. + properties: + permanent: + type: boolean + regex: + type: string + replacement: + type: string + type: object + redirectScheme: + description: RedirectScheme holds the scheme redirection configuration. + properties: + permanent: + type: boolean + port: + type: string + scheme: + type: string + type: object + replacePath: + description: ReplacePath holds the ReplacePath configuration. + properties: + path: + type: string + type: object + replacePathRegex: + description: ReplacePathRegex holds the ReplacePathRegex configuration. + properties: + regex: + type: string + replacement: + type: string + type: object + retry: + description: Retry holds the retry configuration. + properties: + attempts: + type: integer + initialInterval: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + type: object + stripPrefix: + description: StripPrefix holds the StripPrefix configuration. + properties: + forceSlash: + type: boolean + prefixes: + items: + type: string + type: array + type: object + stripPrefixRegex: + description: StripPrefixRegex holds the StripPrefixRegex configuration. + properties: + regex: + items: + type: string + type: array + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/middlewarestcp.yaml b/core/traefik/10.0.28/crds/middlewarestcp.yaml new file mode 100644 index 00000000000..f0d1d5640bd --- /dev/null +++ b/core/traefik/10.0.28/crds/middlewarestcp.yaml @@ -0,0 +1,59 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: middlewaretcps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: MiddlewareTCP + listKind: MiddlewareTCPList + plural: middlewaretcps + singular: middlewaretcp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: MiddlewareTCP is a specification for a MiddlewareTCP resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: MiddlewareTCPSpec holds the MiddlewareTCP configuration. + properties: + ipWhiteList: + description: TCPIPWhiteList holds the TCP ip white list configuration. + properties: + sourceRange: + items: + type: string + type: array + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/serverstransports.yaml b/core/traefik/10.0.28/crds/serverstransports.yaml new file mode 100644 index 00000000000..78241697d1a --- /dev/null +++ b/core/traefik/10.0.28/crds/serverstransports.yaml @@ -0,0 +1,101 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: serverstransports.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: ServersTransport + listKind: ServersTransportList + plural: serverstransports + singular: serverstransport + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: ServersTransport is a specification for a ServersTransport resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: ServersTransportSpec options to configure communication between + Traefik and the servers. + properties: + certificatesSecrets: + description: Certificates for mTLS. + items: + type: string + type: array + disableHTTP2: + description: Disable HTTP/2 for connections with backend servers. + type: boolean + forwardingTimeouts: + description: Timeouts for requests forwarded to the backend servers. + properties: + dialTimeout: + anyOf: + - type: integer + - type: string + description: The amount of time to wait until a connection to + a backend server can be established. If zero, no timeout exists. + x-kubernetes-int-or-string: true + idleConnTimeout: + anyOf: + - type: integer + - type: string + description: The maximum period for which an idle HTTP keep-alive + connection will remain open before closing itself. + x-kubernetes-int-or-string: true + responseHeaderTimeout: + anyOf: + - type: integer + - type: string + description: The amount of time to wait for a server's response + headers after fully writing the request (including its body, + if any). If zero, no timeout exists. + x-kubernetes-int-or-string: true + type: object + insecureSkipVerify: + description: Disable SSL certificate verification. + type: boolean + maxIdleConnsPerHost: + description: If non-zero, controls the maximum idle (keep-alive) to + keep per-host. If zero, DefaultMaxIdleConnsPerHost is used. + type: integer + rootCAsSecrets: + description: Add cert file for self-signed certificate. + items: + type: string + type: array + serverName: + description: ServerName used to contact the server. + type: string + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/tlsoptions.yaml b/core/traefik/10.0.28/crds/tlsoptions.yaml new file mode 100644 index 00000000000..c901ac2df5e --- /dev/null +++ b/core/traefik/10.0.28/crds/tlsoptions.yaml @@ -0,0 +1,87 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: tlsoptions.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TLSOption + listKind: TLSOptionList + plural: tlsoptions + singular: tlsoption + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TLSOption is a specification for a TLSOption resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: TLSOptionSpec configures TLS for an entry point. + properties: + cipherSuites: + items: + type: string + type: array + clientAuth: + description: ClientAuth defines the parameters of the client authentication + part of the TLS connection, if any. + properties: + clientAuthType: + description: ClientAuthType defines the client authentication + type to apply. + enum: + - NoClientCert + - RequestClientCert + - VerifyClientCertIfGiven + - RequireAndVerifyClientCert + type: string + secretNames: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + items: + type: string + type: array + type: object + curvePreferences: + items: + type: string + type: array + maxVersion: + type: string + minVersion: + type: string + preferServerCipherSuites: + type: boolean + sniStrict: + type: boolean + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/tlsstores.yaml b/core/traefik/10.0.28/crds/tlsstores.yaml new file mode 100644 index 00000000000..7bb6193b026 --- /dev/null +++ b/core/traefik/10.0.28/crds/tlsstores.yaml @@ -0,0 +1,64 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: tlsstores.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TLSStore + listKind: TLSStoreList + plural: tlsstores + singular: tlsstore + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TLSStore is a specification for a TLSStore resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: TLSStoreSpec configures a TLSStore resource. + properties: + defaultCertificate: + description: DefaultCertificate holds a secret name for the TLSOption + resource. + properties: + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + required: + - secretName + type: object + required: + - defaultCertificate + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/crds/traefikservices.yaml b/core/traefik/10.0.28/crds/traefikservices.yaml new file mode 100644 index 00000000000..1d98c25d68d --- /dev/null +++ b/core/traefik/10.0.28/crds/traefikservices.yaml @@ -0,0 +1,270 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: traefikservices.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TraefikService + listKind: TraefikServiceList + plural: traefikservices + singular: traefikservice + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TraefikService is the specification for a service (that an IngressRoute + refers to) that is usually not a terminal service (i.e. not a pod of servers), + as opposed to a Kubernetes Service. That is to say, it usually refers to + other (children) services, which themselves can be TraefikServices or Services. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: ServiceSpec defines whether a TraefikService is a load-balancer + of services or a mirroring service. + properties: + mirroring: + description: Mirroring defines a mirroring service, which is composed + of a main load-balancer, and a list of mirrors. + properties: + kind: + enum: + - Service + - TraefikService + type: string + maxBodySize: + format: int64 + type: integer + mirrors: + items: + description: MirrorService defines one of the mirrors of a Mirroring + service. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + percent: + type: integer + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + name: + description: Name is a reference to a Kubernetes Service object + (for a load-balancer of servers), or to a TraefikService object + (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for the forward + of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based on + cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + weighted: + description: WeightedRoundRobin defines a load-balancer of services. + properties: + services: + items: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based on + cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.28/helm-values.md b/core/traefik/10.0.28/helm-values.md new file mode 100644 index 00000000000..b0900e7e4ee --- /dev/null +++ b/core/traefik/10.0.28/helm-values.md @@ -0,0 +1,48 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| additionalArguments[0] | string | `"--metrics.prometheus"` | | +| additionalArguments[1] | string | `"--ping"` | | +| additionalArguments[2] | string | `"--serverstransport.insecureskipverify=true"` | | +| additionalArguments[3] | string | `"--providers.kubernetesingress.allowexternalnameservices=true"` | | +| globalArguments[0] | string | `"--global.checknewversion"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/traefik"` | | +| image.tag | string | `"v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769"` | | +| ingressClass | object | `{"enabled":false,"fallbackApiVersion":"","isDefaultClass":false}` | Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x | +| ingressRoute | object | `{"dashboard":{"annotations":{},"enabled":true,"labels":{}}}` | Create an IngressRoute for the dashboard | +| logs | object | `{"access":{"enabled":false,"fields":{"general":{"defaultmode":"keep","names":{}},"headers":{"defaultmode":"drop","names":{}}},"filters":{}},"general":{"level":"ERROR"}}` | Logs https://docs.traefik.io/observability/logs/ | +| metrics.prometheus.entryPoint | string | `"metrics"` | | +| middlewares | object | `{"basicAuth":[],"chain":[],"forwardAuth":[],"ipWhiteList":[],"rateLimit":[],"redirectRegex":[],"redirectScheme":[]}` | SCALE Middleware Handlers | +| pilot | object | `{"enabled":false,"token":""}` | Activate Pilot integration | +| portalhook.enabled | bool | `true` | | +| probes.liveness | object | See below | Liveness probe configuration | +| probes.liveness.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.liveness.type | string | "TCP" | sets the probe type when not using a custom probe | +| probes.readiness | object | See below | Redainess probe configuration | +| probes.readiness.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.readiness.type | string | "TCP" | sets the probe type when not using a custom probe | +| probes.startup | object | See below | Startup probe configuration | +| probes.startup.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.startup.type | string | "TCP" | sets the probe type when not using a custom probe | +| providers.kubernetesCRD.enabled | bool | `true` | | +| providers.kubernetesCRD.namespaces | list | `[]` | | +| providers.kubernetesIngress.enabled | bool | `true` | | +| providers.kubernetesIngress.namespaces | list | `[]` | | +| providers.kubernetesIngress.publishedService.enabled | bool | `true` | | +| rbac | object | `{"enabled":true,"rules":[{"apiGroups":[""],"resources":["services","endpoints","secrets"],"verbs":["get","list","watch"]},{"apiGroups":["extensions","networking.k8s.io"],"resources":["ingresses","ingressclasses"],"verbs":["get","list","watch"]},{"apiGroups":["extensions","networking.k8s.io"],"resources":["ingresses/status"],"verbs":["update"]},{"apiGroups":["traefik.containo.us"],"resources":["ingressroutes","ingressroutetcps","ingressrouteudps","middlewares","middlewaretcps","tlsoptions","tlsstores","traefikservices","serverstransports"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | +| service | object | `{"main":{"ports":{"main":{"port":9000,"protocol":"HTTP","targetPort":9000}},"type":"LoadBalancer"},"metrics":{"enabled":true,"ports":{"metrics":{"enabled":true,"port":9100,"protocol":"HTTP","targetPort":9100}},"type":"LoadBalancer"},"tcp":{"enabled":true,"ports":{"web":{"enabled":true,"port":9080,"protocol":"HTTP","redirectTo":"websecure"},"websecure":{"enabled":true,"port":9443,"protocol":"HTTPS"}},"type":"LoadBalancer"},"udp":{"enabled":false}}` | Options for the main traefik service, where the entrypoints traffic comes from from. | +| serviceAccount | object | `{"create":true}` | The service account the pods will use to interact with the Kubernetes API | +| tlsOptions | object | `{"default":{"cipherSuites":["TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305","TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256"],"curvePreferences":["CurveP521","CurveP384"],"minVersion":"VersionTLS12","sniStrict":false}}` | TLS Options to be created as TLSOption CRDs https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options Example: | + +All Rights Reserved - The TrueCharts Project diff --git a/core/traefik/10.0.28/ix_values.yaml b/core/traefik/10.0.28/ix_values.yaml new file mode 100644 index 00000000000..bce4dd7b848 --- /dev/null +++ b/core/traefik/10.0.28/ix_values.yaml @@ -0,0 +1,309 @@ +image: + repository: tccr.io/truecharts/traefik + # defaults to appVersion + tag: v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 + pullPolicy: IfNotPresent + +# -- Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: "" + +# -- Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# -- Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +# +# -- Configure providers +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: true + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# -- Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: ERROR + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +metrics: + # datadog: + # address: 127.0.0.1:8125 + # influxdb: + # address: localhost:8089 + # protocol: udp + prometheus: + entryPoint: metrics + # statsd: + # address: localhost:8125 + +globalArguments: + - "--global.checknewversion" + +## +# -- Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + - "--providers.kubernetesingress.allowexternalnameservices=true" + +# -- TLS Options to be created as TLSOption CRDs +# https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# -- Options for the main traefik service, where the entrypoints traffic comes from +# from. +service: + main: + type: LoadBalancer + ports: + main: + port: 9000 + targetPort: 9000 + protocol: HTTP + tcp: + enabled: true + type: LoadBalancer + ports: + web: + enabled: true + port: 9080 + protocol: HTTP + redirectTo: websecure + websecure: + enabled: true + port: 9443 + protocol: HTTPS +# tcpexample: +# enabled: true +# targetPort: 9443 +# protocol: TCP +# tls: +# enabled: false +# # this is the name of a TLSOption definition +# options: "" +# certResolver: "" +# domains: [] +# # - main: example.com +# # sans: +# # - foo.example.com +# # - bar.example.com + metrics: + enabled: true + type: LoadBalancer + ports: + metrics: + enabled: true + port: 9100 + targetPort: 9100 + protocol: HTTP + udp: + enabled: false + +probes: + # -- Liveness probe configuration + # @default -- See below + liveness: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + + # -- Redainess probe configuration + # @default -- See below + readiness: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + + # -- Startup probe configuration + # @default -- See below + startup: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + +# -- Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - middlewaretcps + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch + +# -- The service account the pods will use to interact with the Kubernetes API +serviceAccount: + create: true + +# -- SCALE Middleware Handlers +middlewares: + basicAuth: [] + # - name: basicauthexample + # users: + # - username: testuser + # password: testpassword + forwardAuth: [] + # - name: forwardAuthexample + # address: https://auth.example.com/ + # authResponseHeaders: + # - X-Secret + # - X-Auth-User + # authRequestHeaders: + # - "Accept" + # - "X-CustomHeader" + # authResponseHeadersRegex: "^X-" + # trustForwardHeader: true + chain: [] + # - name: chainname + # middlewares: + # - name: compress + redirectScheme: [] + # - name: redirectSchemeName + # scheme: https + # permanent: true + rateLimit: [] + # - name: rateLimitName + # average: 300 + # burst: 200 + redirectRegex: [] + # - name: redirectRegexName + # regex: putregexhere + # replacement: replacementurlhere + # permanent: false + ipWhiteList: [] + # - name: ipWhiteListName + # sourceRange: [] + # ipStrategy: + # depth: 2 + # excludedIPs: [] + +portalhook: + enabled: true diff --git a/core/traefik/10.0.28/questions.yaml b/core/traefik/10.0.28/questions.yaml new file mode 100644 index 00000000000..ae974aac4ba --- /dev/null +++ b/core/traefik/10.0.28/questions.yaml @@ -0,0 +1,2006 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "http" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/dashboard/" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "RollingUpdate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: pilot + label: "Traefik Pilot" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: token + label: "token" + schema: + type: string + default: "" + - variable: dashboard + label: "Pilot Dashboard" + schema: + type: boolean + default: false + + - variable: ingressClass + label: "ingressClass" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: isDefaultClass + label: "isDefaultClass" + schema: + type: boolean + default: false + + - variable: logs + label: "Logs" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: general + label: "General Logs" + schema: + type: dict + attrs: + - variable: level + label: "Log Level" + schema: + type: string + default: "ERROR" + enum: + - value: "INFO" + description: "Info" + - value: "WARN" + description: "Warnings" + - value: "ERROR" + description: "Errors" + - value: "FATAL" + description: "Fatal Errors" + - value: "PANIC" + description: "Panics" + - value: "DEBUG" + description: "Debug" + - variable: access + label: "Access Logs" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabledFilters + label: "Enable Filters" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: filters + label: "Filters" + schema: + type: dict + attrs: + - variable: statuscodes + label: "Status codes" + schema: + type: string + default: "200,300-302" + - variable: retryattempts + label: "retryattempts" + schema: + type: boolean + default: true + - variable: minduration + label: "minduration" + schema: + type: string + default: "10ms" + - variable: fields + label: "Fields" + schema: + type: dict + attrs: + - variable: general + label: "General" + schema: + type: dict + attrs: + - variable: defaultmode + label: "Default Mode" + schema: + type: string + default: "keep" + enum: + - value: "keep" + description: "Keep" + - value: "drop" + description: "Drop" + - variable: headers + label: "Headers" + schema: + type: dict + attrs: + - variable: defaultmode + label: "Default Mode" + schema: + type: string + default: "drop" + enum: + - value: "keep" + description: "Keep" + - value: "drop" + description: "Drop" + + - variable: middlewares + label: "" + group: "Middlewares" + schema: + type: dict + attrs: + - variable: basicAuth + label: "basicAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: users + label: "Users" + schema: + type: list + default: [] + items: + - variable: usersEntry + label: "" + schema: + type: dict + attrs: + - variable: username + label: "Username" + schema: + type: string + required: true + default: "" + - variable: password + label: "Password" + schema: + type: string + required: true + default: "" + + - variable: forwardAuth + label: "forwardAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: address + label: "Address" + schema: + type: string + required: true + default: "" + - variable: trustForwardHeader + label: "trustForwardHeader" + schema: + type: boolean + default: false + - variable: authResponseHeadersRegex + label: "authResponseHeadersRegex" + schema: + type: string + default: "" + - variable: authResponseHeaders + label: "authResponseHeaders" + schema: + type: list + default: [] + items: + - variable: authResponseHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: authRequestHeaders + label: "authRequestHeaders" + schema: + type: list + default: [] + items: + - variable: authRequestHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: chain + label: "chain" + schema: + type: list + default: [] + items: + - variable: chainEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: middlewares + label: "Middlewares to Chain" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + + - variable: redirectScheme + label: "redirectScheme" + schema: + type: list + default: [] + items: + - variable: redirectSchemeEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: scheme + label: "Scheme" + schema: + type: string + required: true + default: "https" + enum: + - value: "https" + description: "https" + - value: "http" + description: "http" + - variable: permanent + label: "Permanent" + schema: + type: boolean + required: true + default: false + + - variable: rateLimit + label: "rateLimit" + schema: + type: list + default: [] + items: + - variable: rateLimitEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: average + label: "Average" + schema: + type: int + required: true + default: 300 + - variable: burst + label: "Burst" + schema: + type: int + required: true + default: 200 + - variable: redirectRegex + label: "redirectRegex" + schema: + type: list + default: [] + items: + - variable: redirectRegexEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: regex + label: "Regex" + schema: + type: string + required: true + default: "" + - variable: replacement + label: "Replacement" + schema: + type: string + required: true + default: "" + - variable: permanent + label: "Permanent" + schema: + type: boolean + required: true + default: false + + - variable: ipWhiteList + label: "ipWhiteList" + schema: + type: list + default: [] + items: + - variable: ipWhiteListEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: sourceRange + label: "Source Range" + schema: + type: list + default: [] + items: + - variable: sourceRangeEntry + label: "" + schema: + type: string + required: true + default: "" + - variable: ipStrategy + label: "IP Strategy" + schema: + type: dict + attrs: + - variable: depth + label: "Depth" + schema: + type: int + required: true + - variable: excludedIPs + label: "Excluded IPs" + schema: + type: list + default: [] + items: + - variable: excludedIPsEntry + label: "" + schema: + type: string + required: true + default: "" + + + - variable: service + group: "Networking and Services" + label: "Configure Service Entrypoint" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Entrypoint Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9000 + + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9000 + required: true + - variable: tcp + label: "TCP Service" + description: "The tcp Entrypoint service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: web + label: "web Entrypoint Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9080 + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9080 + required: true + - variable: redirectTo + label: "Redirect to" + schema: + type: string + default: "websecure" + - variable: websecure + label: "websecure Entrypoints Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTPS" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9443 + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9443 + required: true + - variable: tls + label: "websecure Entrypoints Configuration" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enabled" + schema: + type: boolean + default: true + hidden: true + - variable: portsList + label: "Additional TCP Entrypoints" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom Entrypoints" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Entrypoints Name" + schema: + type: string + default: "" + - variable: protocol + label: "Entrypoints Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: tls + label: "websecure Entrypoints Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enabled" + schema: + type: boolean + default: true + - variable: metrics + label: "metrics Service" + description: "The metrics Entrypoint service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: metrics + label: "metrics Entrypoints Configurations" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 9100 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9100 + + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/core/traefik/10.0.28/security.md b/core/traefik/10.0.28/security.md new file mode 100644 index 00000000000..3ab59e498a0 --- /dev/null +++ b/core/traefik/10.0.28/security.md @@ -0,0 +1,104 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: traefik/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| + + +| No Misconfigurations found | +|:---------------------------------| + + + + +| No Misconfigurations found | +|:---------------------------------| + + + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/traefik:v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/traefik:v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 (alpine 3.14.3) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/core/traefik/10.0.28/templates/_args.tpl b/core/traefik/10.0.28/templates/_args.tpl new file mode 100644 index 00000000000..41e7e44b8fd --- /dev/null +++ b/core/traefik/10.0.28/templates/_args.tpl @@ -0,0 +1,141 @@ +{{/* Define the args */}} +{{- define "traefik.args" -}} +args: + {{/* merge all ports */}} + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{/* start of actual arguments */}} + {{- with .Values.globalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- range $name, $config := $ports }} + {{- if $config }} + {{- if or ( eq $config.protocol "HTTP" ) ( eq $config.protocol "HTTPS" ) ( eq $config.protocol "TCP" ) }} + {{- $_ := set $config "protocol" "TCP" }} + {{- end }} + - "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}" + {{- end }} + {{- end }} + - "--api.dashboard=true" + - "--ping=true" + {{- if .Values.metrics }} + {{- if .Values.metrics.datadog }} + - "--metrics.datadog=true" + - "--metrics.datadog.address={{ .Values.metrics.datadog.address }}" + {{- end }} + {{- if .Values.metrics.influxdb }} + - "--metrics.influxdb=true" + - "--metrics.influxdb.address={{ .Values.metrics.influxdb.address }}" + - "--metrics.influxdb.protocol={{ .Values.metrics.influxdb.protocol }}" + {{- end }} + {{- if .Values.metrics.prometheus }} + - "--metrics.prometheus=true" + - "--metrics.prometheus.entrypoint={{ .Values.metrics.prometheus.entryPoint }}" + {{- end }} + {{- if .Values.metrics.statsd }} + - "--metrics.statsd=true" + - "--metrics.statsd.address={{ .Values.metrics.statsd.address }}" + {{- end }} + {{- end }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress" + {{- if and .Values.providers.kubernetesIngress.publishedService.enabled }} + - "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.labelSelector }} + - "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}" + {{- end }} + {{- end }} + {{- if and .Values.rbac.enabled .Values.rbac.namespaced }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}" + {{- end }} + {{- end }} + {{- range $entrypoint, $config := $ports }} + {{- if $config.redirectTo }} + {{- $toPort := index $ports $config.redirectTo }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.port }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- end }} + {{- if or ( $config.tls ) ( eq $config.protocol "HTTPS" ) }} + {{- if or ( $config.tls.enabled ) ( eq $config.protocol "HTTPS" ) }} + - "--entrypoints.{{ $entrypoint }}.http.tls=true" + {{- if $config.tls.options }} + - "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}" + {{- end }} + {{- if $config.tls.certResolver }} + - "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}" + {{- end }} + {{- if $config.tls.domains }} + {{- range $index, $domain := $config.tls.domains }} + {{- if $domain.main }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}" + {{- end }} + {{- if $domain.sans }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}" + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- with .Values.logs }} + {{- if .general.format }} + - "--log.format={{ .general.format }}" + {{- end }} + {{- if ne .general.level "ERROR" }} + - "--log.level={{ .general.level | upper }}" + {{- end }} + {{- if .access.enabled }} + - "--accesslog=true" + {{- if .access.format }} + - "--accesslog.format={{ .access.format }}" + {{- end }} + {{- if .access.bufferingsize }} + - "--accesslog.bufferingsize={{ .access.bufferingsize }}" + {{- end }} + {{- if .access.filters }} + {{- if .access.filters.statuscodes }} + - "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}" + {{- end }} + {{- if .access.filters.retryattempts }} + - "--accesslog.filters.retryattempts" + {{- end }} + {{- if .access.filters.minduration }} + - "--accesslog.filters.minduration={{ .access.filters.minduration }}" + {{- end }} + {{- end }} + - "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.general.names }} + - "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + - "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.headers.names }} + - "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.pilot.enabled }} + - "--pilot.token={{ .Values.pilot.token }}" + {{- end }} + {{- if hasKey .Values.pilot "dashboard" }} + - "--pilot.dashboard={{ .Values.pilot.dashboard }}" + {{- end }} + {{- with .Values.additionalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} +{{- end -}} diff --git a/core/traefik/10.0.28/templates/_helpers.tpl b/core/traefik/10.0.28/templates/_helpers.tpl new file mode 100644 index 00000000000..8c6c4ac96bc --- /dev/null +++ b/core/traefik/10.0.28/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{/* +Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice. +By convention this will simply use the / to match the name of the +service generated. +Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride` +*/}} +{{- define "providers.kubernetesIngress.publishedServicePath" -}} +{{- $fullName := include "common.names.fullname" . -}} +{{- $defServiceName := printf "%s/%s-tcp" .Release.Namespace $fullName -}} +{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }} +{{- print $servicePath | trimSuffix "-" -}} +{{- end -}} + +{{/* +Construct a comma-separated list of whitelisted namespaces +*/}} +{{- define "providers.kubernetesIngress.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }} +{{- end -}} +{{- define "providers.kubernetesCRD.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }} +{{- end -}} diff --git a/core/traefik/10.0.28/templates/_ingressclass.tpl b/core/traefik/10.0.28/templates/_ingressclass.tpl new file mode 100644 index 00000000000..27f8467fc9e --- /dev/null +++ b/core/traefik/10.0.28/templates/_ingressclass.tpl @@ -0,0 +1,24 @@ +{{/* Define the ingressClass */}} +{{- define "traefik.ingressClass" -}} +{{- if .Values.ingressClass.enabled }} + {{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }} +apiVersion: networking.k8s.io/v1 + {{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }} +apiVersion: networking.k8s.io/v1beta1 + {{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }} +apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }} + {{- else }} + {{- fail "\n\n ERROR: You must have at least networking.k8s.io/v1beta1 to use ingressClass" }} + {{- end }} +--- +kind: IngressClass +metadata: + annotations: + ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }} + labels: + {{- include "common.labels" . | nindent 4 }} + name: {{ .Release.Name }} +spec: + controller: traefik.io/ingress-controller +{{- end }} +{{- end }} diff --git a/core/traefik/10.0.28/templates/_ingressroute.tpl b/core/traefik/10.0.28/templates/_ingressroute.tpl new file mode 100644 index 00000000000..f848bc108fc --- /dev/null +++ b/core/traefik/10.0.28/templates/_ingressroute.tpl @@ -0,0 +1,25 @@ +{{/* Define the ingressRoute */}} +{{- define "traefik.ingressRoute" -}} +{{- if .Values.ingressRoute.dashboard.enabled }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: {{ include "common.names.fullname" . }}-dashboard + annotations: + {{- with .Values.ingressRoute.dashboard.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + {{- include "common.labels" . | nindent 4 }} +spec: + entryPoints: + - main + routes: + - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`) + kind: Rule + services: + - name: api@internal + kind: TraefikService +{{- end -}} +{{- end -}} diff --git a/core/traefik/10.0.28/templates/_portalhook.tpl b/core/traefik/10.0.28/templates/_portalhook.tpl new file mode 100644 index 00000000000..e3586c5d4e9 --- /dev/null +++ b/core/traefik/10.0.28/templates/_portalhook.tpl @@ -0,0 +1,26 @@ +{{/* Define the portalHook */}} +{{- define "traefik.portalhook" -}} +{{- if .Values.portalhook.enabled }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portalhook + namespace: {{ $namespace }} +data: + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{- range $name, $value := $ports }} + {{ $name }}: {{ $value.port | quote }} + {{- end }} +{{- end }} +{{- end -}} diff --git a/core/traefik/10.0.28/templates/_tlsoptions.tpl b/core/traefik/10.0.28/templates/_tlsoptions.tpl new file mode 100644 index 00000000000..3e5aad3bee9 --- /dev/null +++ b/core/traefik/10.0.28/templates/_tlsoptions.tpl @@ -0,0 +1,12 @@ +{{/* Define the tlsOptions */}} +{{- define "traefik.tlsOptions" -}} +{{- range $name, $config := .Values.tlsOptions }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: TLSOption +metadata: + name: {{ $name }} +spec: + {{- toYaml $config | nindent 2 }} +{{- end }} +{{- end -}} diff --git a/core/traefik/10.0.28/templates/common.yaml b/core/traefik/10.0.28/templates/common.yaml new file mode 100644 index 00000000000..72c57659973 --- /dev/null +++ b/core/traefik/10.0.28/templates/common.yaml @@ -0,0 +1,24 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{- if .Values.metrics }} +{{- if .Values.metrics.prometheus }} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "true" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/path" "/metrics" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "9100" -}} +{{- end }} +{{- end }} + +{{- $newArgs := (include "traefik.args" . | fromYaml) }} +{{- $_ := set .Values "newArgs" $newArgs -}} +{{- $mergedargs := concat .Values.args .Values.newArgs.args }} +{{- $_ := set .Values "args" $mergedargs -}} + +{{- include "traefik.portalhook" . }} +{{- include "traefik.tlsOptions" . }} +{{- include "traefik.ingressRoute" . }} +{{- include "traefik.ingressClass" . }} + + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/core/traefik/10.0.28/templates/middlewares/basic-middleware.yaml b/core/traefik/10.0.28/templates/middlewares/basic-middleware.yaml new file mode 100644 index 00000000000..fca94384953 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/basic-middleware.yaml @@ -0,0 +1,65 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: compress + namespace: {{ $namespace }} +spec: + compress: {} +--- +# Here, an average of 300 requests per second is allowed. +# In addition, a burst of 200 requests is allowed. +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-ratelimit + namespace: {{ $namespace }} +spec: + rateLimit: + average: 300 + burst: 200 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-secure-headers + namespace: {{ $namespace }} +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + sslRedirect: true + stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customRequestHeaders: + X-Forwarded-Proto: "https" + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: chain-basic + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: basic-secure-headers + - name: compress diff --git a/core/traefik/10.0.28/templates/middlewares/basicauth.yaml b/core/traefik/10.0.28/templates/middlewares/basicauth.yaml new file mode 100644 index 00000000000..ccb541742f0 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/basicauth.yaml @@ -0,0 +1,34 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.basicAuth }} +--- +{{- $users := list }} +{{ range $index, $userdata := $middlewareData.users }} + {{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }} +{{ end }} + +apiVersion: v1 +kind: Secret +metadata: + name: {{printf "%v-%v" $middlewareData.name "secret" }} + namespace: {{ $namespace }} +type: Opaque +stringData: + users: | + {{- range $index, $user := $users }} + {{ printf "%s" $user }} + {{- end }} +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + basicAuth: + secret: {{printf "%v-%v" $middlewareData.name "secret" }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/chain.yaml b/core/traefik/10.0.28/templates/middlewares/chain.yaml new file mode 100644 index 00000000000..e22eb312207 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/chain.yaml @@ -0,0 +1,21 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.chain }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + chain: + middlewares: + {{ range $index, $chainData := . }} + - name: {{ printf "%v-%v@%v" $namespace $chainData.name "kubernetescrd" }} + {{ end }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/forwardauth.yaml b/core/traefik/10.0.28/templates/middlewares/forwardauth.yaml new file mode 100644 index 00000000000..7a3e32fdbf7 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/forwardauth.yaml @@ -0,0 +1,30 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + forwardAuth: + address: {{ $middlewareData.address }} + {{- with $middlewareData.authResponseHeaders }} + authResponseHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- with $middlewareData.authRequestHeaders }} + authRequestHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- if $middlewareData.authResponseHeadersRegex }} + authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }} + {{- end }} + {{- if $middlewareData.trustForwardHeader }} + trustForwardHeader: true + {{- end }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/ipwhitelist.yaml b/core/traefik/10.0.28/templates/middlewares/ipwhitelist.yaml new file mode 100644 index 00000000000..82467dea0b9 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/ipwhitelist.yaml @@ -0,0 +1,33 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.ipWhiteList }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + ipWhiteList: + sourceRange: + {{- range $middlewareData.sourceRange }} + - {{ . }} + {{- end }} + {{- if $middlewareData.ipStrategy }} + ipStrategy: + {{- if $middlewareData.ipStrategy.depth }} + depth: {{ $middlewareData.ipStrategy.depth }} + {{- end }} + {{- if $middlewareData.ipStrategy.excludedIPs }} + excludedIPs: + {{- range $middlewareData.ipStrategy.excludedIPs }} + - {{ . }} + {{- end }} + {{- end }} + {{- end }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/ratelimit.yaml b/core/traefik/10.0.28/templates/middlewares/ratelimit.yaml new file mode 100644 index 00000000000..144b9d8bf38 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/ratelimit.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.rateLimit }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + rateLimit: + average: {{ $middlewareData.average }} + burst: {{ $middlewareData.burst }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/redirectScheme.yaml b/core/traefik/10.0.28/templates/middlewares/redirectScheme.yaml new file mode 100644 index 00000000000..f2413f84e19 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/redirectScheme.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectScheme }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectScheme: + scheme: {{ $middlewareData.scheme }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/redirectregex.yaml b/core/traefik/10.0.28/templates/middlewares/redirectregex.yaml new file mode 100644 index 00000000000..46e3e724dd6 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/redirectregex.yaml @@ -0,0 +1,20 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectRegex }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: {{ $middlewareData.regex | quote }} + replacement: {{ $middlewareData.replacement | quote }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/core/traefik/10.0.28/templates/middlewares/tc-nextcloud.yaml b/core/traefik/10.0.28/templates/middlewares/tc-nextcloud.yaml new file mode 100644 index 00000000000..6a3019d56c5 --- /dev/null +++ b/core/traefik/10.0.28/templates/middlewares/tc-nextcloud.yaml @@ -0,0 +1,25 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-redirectregex-dav + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: "https://(.*)/.well-known/(card|cal)dav" + replacement: "https://${1}/remote.php/dav/" +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-chain + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: tc-nextcloud-redirectregex-dav diff --git a/dependency/mariadb/1.0.37/values.yaml b/core/traefik/10.0.28/values.yaml similarity index 100% rename from dependency/mariadb/1.0.37/values.yaml rename to core/traefik/10.0.28/values.yaml diff --git a/dependency/mariadb/1.0.37/CHANGELOG.md b/dependency/mariadb/1.0.38/CHANGELOG.md similarity index 89% rename from dependency/mariadb/1.0.37/CHANGELOG.md rename to dependency/mariadb/1.0.38/CHANGELOG.md index 3258a53e7ba..f453ead618d 100644 --- a/dependency/mariadb/1.0.37/CHANGELOG.md +++ b/dependency/mariadb/1.0.38/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [mariadb-1.0.38](https://github.com/truecharts/apps/compare/mariadb-1.0.37...mariadb-1.0.38) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [mariadb-1.0.37](https://github.com/truecharts/apps/compare/mariadb-1.0.36...mariadb-1.0.37) (2021-12-19) @@ -87,13 +97,3 @@ ### [mariadb-1.0.28](https://github.com/truecharts/apps/compare/mariadb-1.0.27...mariadb-1.0.28) (2021-12-08) #### Chore - -* update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [mariadb-1.0.27](https://github.com/truecharts/apps/compare/mariadb-1.0.26...mariadb-1.0.27) (2021-12-07) - -#### Chore - diff --git a/dependency/memcached/1.0.36/CONFIG.md b/dependency/mariadb/1.0.38/CONFIG.md similarity index 100% rename from dependency/memcached/1.0.36/CONFIG.md rename to dependency/mariadb/1.0.38/CONFIG.md diff --git a/dependency/postgresql/6.0.34/Chart.lock b/dependency/mariadb/1.0.38/Chart.lock similarity index 78% rename from dependency/postgresql/6.0.34/Chart.lock rename to dependency/mariadb/1.0.38/Chart.lock index 546368872f9..c0bb0026d5c 100644 --- a/dependency/postgresql/6.0.34/Chart.lock +++ b/dependency/mariadb/1.0.38/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T16:42:37.523999262Z" +generated: "2021-12-19T23:04:34.151094832Z" diff --git a/dependency/mariadb/1.0.37/Chart.yaml b/dependency/mariadb/1.0.38/Chart.yaml similarity index 98% rename from dependency/mariadb/1.0.37/Chart.yaml rename to dependency/mariadb/1.0.38/Chart.yaml index 925bdccb211..f29039a325a 100644 --- a/dependency/mariadb/1.0.37/Chart.yaml +++ b/dependency/mariadb/1.0.38/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/prometheus/mysqld_exporter - https://mariadb.org type: application -version: 1.0.37 +version: 1.0.38 annotations: truecharts.org/catagories: | - database diff --git a/dependency/mariadb/1.0.37/README.md b/dependency/mariadb/1.0.38/README.md similarity index 100% rename from dependency/mariadb/1.0.37/README.md rename to dependency/mariadb/1.0.38/README.md diff --git a/dependency/mariadb/1.0.37/app-readme.md b/dependency/mariadb/1.0.38/app-readme.md similarity index 100% rename from dependency/mariadb/1.0.37/app-readme.md rename to dependency/mariadb/1.0.38/app-readme.md diff --git a/dependency/memcached/1.0.36/charts/common-8.9.24.tgz b/dependency/mariadb/1.0.38/charts/common-8.9.24.tgz similarity index 100% rename from dependency/memcached/1.0.36/charts/common-8.9.24.tgz rename to dependency/mariadb/1.0.38/charts/common-8.9.24.tgz diff --git a/dependency/mariadb/1.0.37/helm-values.md b/dependency/mariadb/1.0.38/helm-values.md similarity index 100% rename from dependency/mariadb/1.0.37/helm-values.md rename to dependency/mariadb/1.0.38/helm-values.md diff --git a/dependency/mariadb/1.0.37/ix_values.yaml b/dependency/mariadb/1.0.38/ix_values.yaml similarity index 100% rename from dependency/mariadb/1.0.37/ix_values.yaml rename to dependency/mariadb/1.0.38/ix_values.yaml diff --git a/dependency/mariadb/1.0.37/questions.yaml b/dependency/mariadb/1.0.38/questions.yaml similarity index 99% rename from dependency/mariadb/1.0.37/questions.yaml rename to dependency/mariadb/1.0.38/questions.yaml index cfca324ab58..d6c3a9a27c7 100644 --- a/dependency/mariadb/1.0.37/questions.yaml +++ b/dependency/mariadb/1.0.38/questions.yaml @@ -359,7 +359,6 @@ questions: schema: type: int default: 3306 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/dependency/mariadb/1.0.37/security.md b/dependency/mariadb/1.0.38/security.md similarity index 100% rename from dependency/mariadb/1.0.37/security.md rename to dependency/mariadb/1.0.38/security.md diff --git a/dependency/mariadb/1.0.37/templates/common.yaml b/dependency/mariadb/1.0.38/templates/common.yaml similarity index 100% rename from dependency/mariadb/1.0.37/templates/common.yaml rename to dependency/mariadb/1.0.38/templates/common.yaml diff --git a/dependency/mariadb/1.0.37/templates/secret.yaml b/dependency/mariadb/1.0.38/templates/secret.yaml similarity index 100% rename from dependency/mariadb/1.0.37/templates/secret.yaml rename to dependency/mariadb/1.0.38/templates/secret.yaml diff --git a/dependency/memcached/1.0.36/values.yaml b/dependency/mariadb/1.0.38/values.yaml similarity index 100% rename from dependency/memcached/1.0.36/values.yaml rename to dependency/mariadb/1.0.38/values.yaml diff --git a/dependency/memcached/1.0.36/CHANGELOG.md b/dependency/memcached/1.0.37/CHANGELOG.md similarity index 89% rename from dependency/memcached/1.0.36/CHANGELOG.md rename to dependency/memcached/1.0.37/CHANGELOG.md index f2c6575c4c2..cad620cef81 100644 --- a/dependency/memcached/1.0.36/CHANGELOG.md +++ b/dependency/memcached/1.0.37/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [memcached-1.0.37](https://github.com/truecharts/apps/compare/memcached-1.0.36...memcached-1.0.37) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [memcached-1.0.36](https://github.com/truecharts/apps/compare/memcached-1.0.35...memcached-1.0.36) (2021-12-19) @@ -87,13 +97,3 @@ ### [memcached-1.0.27](https://github.com/truecharts/apps/compare/memcached-1.0.26...memcached-1.0.27) (2021-12-07) #### Chore - -* bump common on deps ([#1486](https://github.com/truecharts/apps/issues/1486)) - - - - -### [memcached-1.0.26](https://github.com/truecharts/apps/compare/memcached-1.0.25...memcached-1.0.26) (2021-12-07) - -#### Chore - diff --git a/dependency/postgresql/6.0.34/CONFIG.md b/dependency/memcached/1.0.37/CONFIG.md similarity index 100% rename from dependency/postgresql/6.0.34/CONFIG.md rename to dependency/memcached/1.0.37/CONFIG.md diff --git a/dependency/mariadb/1.0.37/Chart.lock b/dependency/memcached/1.0.37/Chart.lock similarity index 78% rename from dependency/mariadb/1.0.37/Chart.lock rename to dependency/memcached/1.0.37/Chart.lock index 1baaf946f44..01c850567f9 100644 --- a/dependency/mariadb/1.0.37/Chart.lock +++ b/dependency/memcached/1.0.37/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T16:42:37.453590232Z" +generated: "2021-12-19T23:04:36.947026692Z" diff --git a/dependency/memcached/1.0.36/Chart.yaml b/dependency/memcached/1.0.37/Chart.yaml similarity index 97% rename from dependency/memcached/1.0.36/Chart.yaml rename to dependency/memcached/1.0.37/Chart.yaml index d941142f39f..a988da962d5 100644 --- a/dependency/memcached/1.0.36/Chart.yaml +++ b/dependency/memcached/1.0.37/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-memcached - http://memcached.org/ type: application -version: 1.0.36 +version: 1.0.37 annotations: truecharts.org/catagories: | - database diff --git a/dependency/memcached/1.0.36/README.md b/dependency/memcached/1.0.37/README.md similarity index 100% rename from dependency/memcached/1.0.36/README.md rename to dependency/memcached/1.0.37/README.md diff --git a/dependency/memcached/1.0.36/app-readme.md b/dependency/memcached/1.0.37/app-readme.md similarity index 100% rename from dependency/memcached/1.0.36/app-readme.md rename to dependency/memcached/1.0.37/app-readme.md diff --git a/dependency/postgresql/6.0.34/charts/common-8.9.24.tgz b/dependency/memcached/1.0.37/charts/common-8.9.24.tgz similarity index 100% rename from dependency/postgresql/6.0.34/charts/common-8.9.24.tgz rename to dependency/memcached/1.0.37/charts/common-8.9.24.tgz diff --git a/dependency/memcached/1.0.36/helm-values.md b/dependency/memcached/1.0.37/helm-values.md similarity index 100% rename from dependency/memcached/1.0.36/helm-values.md rename to dependency/memcached/1.0.37/helm-values.md diff --git a/dependency/memcached/1.0.36/ix_values.yaml b/dependency/memcached/1.0.37/ix_values.yaml similarity index 100% rename from dependency/memcached/1.0.36/ix_values.yaml rename to dependency/memcached/1.0.37/ix_values.yaml diff --git a/dependency/memcached/1.0.36/questions.yaml b/dependency/memcached/1.0.37/questions.yaml similarity index 99% rename from dependency/memcached/1.0.36/questions.yaml rename to dependency/memcached/1.0.37/questions.yaml index 98a3fd80f21..d20253e5a82 100644 --- a/dependency/memcached/1.0.36/questions.yaml +++ b/dependency/memcached/1.0.37/questions.yaml @@ -359,7 +359,6 @@ questions: schema: type: int default: 11211 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/dependency/memcached/1.0.36/security.md b/dependency/memcached/1.0.37/security.md similarity index 100% rename from dependency/memcached/1.0.36/security.md rename to dependency/memcached/1.0.37/security.md diff --git a/dependency/memcached/1.0.36/templates/common.yaml b/dependency/memcached/1.0.37/templates/common.yaml similarity index 100% rename from dependency/memcached/1.0.36/templates/common.yaml rename to dependency/memcached/1.0.37/templates/common.yaml diff --git a/dependency/postgresql/6.0.34/values.yaml b/dependency/memcached/1.0.37/values.yaml similarity index 100% rename from dependency/postgresql/6.0.34/values.yaml rename to dependency/memcached/1.0.37/values.yaml diff --git a/dependency/postgresql/6.0.34/CHANGELOG.md b/dependency/postgresql/6.0.35/CHANGELOG.md similarity index 89% rename from dependency/postgresql/6.0.34/CHANGELOG.md rename to dependency/postgresql/6.0.35/CHANGELOG.md index 60b7fe98f4b..1d91ceb4f77 100644 --- a/dependency/postgresql/6.0.34/CHANGELOG.md +++ b/dependency/postgresql/6.0.35/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [postgresql-6.0.35](https://github.com/truecharts/apps/compare/postgresql-6.0.34...postgresql-6.0.35) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [postgresql-6.0.34](https://github.com/truecharts/apps/compare/postgresql-6.0.33...postgresql-6.0.34) (2021-12-19) @@ -87,13 +97,3 @@ ### [postgresql-6.0.25](https://github.com/truecharts/apps/compare/postgresql-6.0.24...postgresql-6.0.25) (2021-12-08) #### Chore - -* update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [postgresql-6.0.24](https://github.com/truecharts/apps/compare/postgresql-6.0.23...postgresql-6.0.24) (2021-12-07) - -#### Chore - diff --git a/dependency/promtail/1.0.15/CONFIG.md b/dependency/postgresql/6.0.35/CONFIG.md similarity index 100% rename from dependency/promtail/1.0.15/CONFIG.md rename to dependency/postgresql/6.0.35/CONFIG.md diff --git a/dependency/postgresql/6.0.35/Chart.lock b/dependency/postgresql/6.0.35/Chart.lock new file mode 100644 index 00000000000..5981fff8601 --- /dev/null +++ b/dependency/postgresql/6.0.35/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:04:50.393234744Z" diff --git a/dependency/postgresql/6.0.34/Chart.yaml b/dependency/postgresql/6.0.35/Chart.yaml similarity index 97% rename from dependency/postgresql/6.0.34/Chart.yaml rename to dependency/postgresql/6.0.35/Chart.yaml index 32a06c951d9..192483ca69d 100644 --- a/dependency/postgresql/6.0.34/Chart.yaml +++ b/dependency/postgresql/6.0.35/Chart.yaml @@ -22,7 +22,7 @@ name: postgresql sources: - https://www.postgresql.org/ type: application -version: 6.0.34 +version: 6.0.35 annotations: truecharts.org/catagories: | - database diff --git a/dependency/postgresql/6.0.34/README.md b/dependency/postgresql/6.0.35/README.md similarity index 100% rename from dependency/postgresql/6.0.34/README.md rename to dependency/postgresql/6.0.35/README.md diff --git a/dependency/postgresql/6.0.34/app-readme.md b/dependency/postgresql/6.0.35/app-readme.md similarity index 100% rename from dependency/postgresql/6.0.34/app-readme.md rename to dependency/postgresql/6.0.35/app-readme.md diff --git a/dependency/promtail/1.0.15/charts/common-8.9.24.tgz b/dependency/postgresql/6.0.35/charts/common-8.9.24.tgz similarity index 100% rename from dependency/promtail/1.0.15/charts/common-8.9.24.tgz rename to dependency/postgresql/6.0.35/charts/common-8.9.24.tgz diff --git a/dependency/postgresql/6.0.34/helm-values.md b/dependency/postgresql/6.0.35/helm-values.md similarity index 100% rename from dependency/postgresql/6.0.34/helm-values.md rename to dependency/postgresql/6.0.35/helm-values.md diff --git a/dependency/postgresql/6.0.34/ix_values.yaml b/dependency/postgresql/6.0.35/ix_values.yaml similarity index 100% rename from dependency/postgresql/6.0.34/ix_values.yaml rename to dependency/postgresql/6.0.35/ix_values.yaml diff --git a/dependency/postgresql/6.0.34/questions.yaml b/dependency/postgresql/6.0.35/questions.yaml similarity index 99% rename from dependency/postgresql/6.0.34/questions.yaml rename to dependency/postgresql/6.0.35/questions.yaml index d0276631cee..0df868c0c80 100644 --- a/dependency/postgresql/6.0.34/questions.yaml +++ b/dependency/postgresql/6.0.35/questions.yaml @@ -359,7 +359,6 @@ questions: schema: type: int default: 5432 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/dependency/postgresql/6.0.34/security.md b/dependency/postgresql/6.0.35/security.md similarity index 100% rename from dependency/postgresql/6.0.34/security.md rename to dependency/postgresql/6.0.35/security.md diff --git a/dependency/postgresql/6.0.34/templates/backup-postgres-config.yaml b/dependency/postgresql/6.0.35/templates/backup-postgres-config.yaml similarity index 100% rename from dependency/postgresql/6.0.34/templates/backup-postgres-config.yaml rename to dependency/postgresql/6.0.35/templates/backup-postgres-config.yaml diff --git a/dependency/postgresql/6.0.34/templates/common.yaml b/dependency/postgresql/6.0.35/templates/common.yaml similarity index 100% rename from dependency/postgresql/6.0.34/templates/common.yaml rename to dependency/postgresql/6.0.35/templates/common.yaml diff --git a/dependency/postgresql/6.0.34/templates/secret.yaml b/dependency/postgresql/6.0.35/templates/secret.yaml similarity index 100% rename from dependency/postgresql/6.0.34/templates/secret.yaml rename to dependency/postgresql/6.0.35/templates/secret.yaml diff --git a/dependency/postgresql/6.0.34/templates/upgrade-backup-postgres-hook.yaml b/dependency/postgresql/6.0.35/templates/upgrade-backup-postgres-hook.yaml similarity index 100% rename from dependency/postgresql/6.0.34/templates/upgrade-backup-postgres-hook.yaml rename to dependency/postgresql/6.0.35/templates/upgrade-backup-postgres-hook.yaml diff --git a/dependency/promtail/1.0.15/values.yaml b/dependency/postgresql/6.0.35/values.yaml similarity index 100% rename from dependency/promtail/1.0.15/values.yaml rename to dependency/postgresql/6.0.35/values.yaml diff --git a/dependency/promtail/1.0.15/Chart.lock b/dependency/promtail/1.0.15/Chart.lock deleted file mode 100644 index 50783ee4048..00000000000 --- a/dependency/promtail/1.0.15/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T16:42:37.475652331Z" diff --git a/dependency/promtail/1.0.15/CHANGELOG.md b/dependency/promtail/1.0.16/CHANGELOG.md similarity index 93% rename from dependency/promtail/1.0.15/CHANGELOG.md rename to dependency/promtail/1.0.16/CHANGELOG.md index 778555e9a4b..b4eb809659f 100644 --- a/dependency/promtail/1.0.15/CHANGELOG.md +++ b/dependency/promtail/1.0.16/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [promtail-1.0.16](https://github.com/truecharts/apps/compare/promtail-1.0.15...promtail-1.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [promtail-1.0.15](https://github.com/truecharts/apps/compare/promtail-1.0.14...promtail-1.0.15) (2021-12-19) @@ -88,12 +97,3 @@ ### [promtail-1.0.7](https://github.com/truecharts/apps/compare/promtail-1.0.6...promtail-1.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page -* cleanup the ci for the security page a bit - - - - diff --git a/dependency/redis/1.0.39/CONFIG.md b/dependency/promtail/1.0.16/CONFIG.md similarity index 100% rename from dependency/redis/1.0.39/CONFIG.md rename to dependency/promtail/1.0.16/CONFIG.md diff --git a/dependency/promtail/1.0.16/Chart.lock b/dependency/promtail/1.0.16/Chart.lock new file mode 100644 index 00000000000..e39ad80a370 --- /dev/null +++ b/dependency/promtail/1.0.16/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:07.388236451Z" diff --git a/dependency/promtail/1.0.15/Chart.yaml b/dependency/promtail/1.0.16/Chart.yaml similarity index 98% rename from dependency/promtail/1.0.15/Chart.yaml rename to dependency/promtail/1.0.16/Chart.yaml index 392cea1a191..0df61a39da1 100644 --- a/dependency/promtail/1.0.15/Chart.yaml +++ b/dependency/promtail/1.0.16/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://grafana.com/oss/loki/ - https://grafana.com/docs/loki/latest/ type: application -version: 1.0.15 +version: 1.0.16 annotations: truecharts.org/catagories: | - metrics diff --git a/dependency/promtail/1.0.15/README.md b/dependency/promtail/1.0.16/README.md similarity index 100% rename from dependency/promtail/1.0.15/README.md rename to dependency/promtail/1.0.16/README.md diff --git a/dependency/promtail/1.0.15/app-readme.md b/dependency/promtail/1.0.16/app-readme.md similarity index 100% rename from dependency/promtail/1.0.15/app-readme.md rename to dependency/promtail/1.0.16/app-readme.md diff --git a/dependency/redis/1.0.39/charts/common-8.9.24.tgz b/dependency/promtail/1.0.16/charts/common-8.9.24.tgz similarity index 100% rename from dependency/redis/1.0.39/charts/common-8.9.24.tgz rename to dependency/promtail/1.0.16/charts/common-8.9.24.tgz diff --git a/dependency/promtail/1.0.15/helm-values.md b/dependency/promtail/1.0.16/helm-values.md similarity index 100% rename from dependency/promtail/1.0.15/helm-values.md rename to dependency/promtail/1.0.16/helm-values.md diff --git a/dependency/promtail/1.0.15/ix_values.yaml b/dependency/promtail/1.0.16/ix_values.yaml similarity index 100% rename from dependency/promtail/1.0.15/ix_values.yaml rename to dependency/promtail/1.0.16/ix_values.yaml diff --git a/dependency/promtail/1.0.15/questions.yaml b/dependency/promtail/1.0.16/questions.yaml similarity index 100% rename from dependency/promtail/1.0.15/questions.yaml rename to dependency/promtail/1.0.16/questions.yaml diff --git a/dependency/promtail/1.0.15/security.md b/dependency/promtail/1.0.16/security.md similarity index 100% rename from dependency/promtail/1.0.15/security.md rename to dependency/promtail/1.0.16/security.md diff --git a/dependency/promtail/1.0.15/templates/common.yaml b/dependency/promtail/1.0.16/templates/common.yaml similarity index 100% rename from dependency/promtail/1.0.15/templates/common.yaml rename to dependency/promtail/1.0.16/templates/common.yaml diff --git a/dependency/promtail/1.0.15/templates/secret.yaml b/dependency/promtail/1.0.16/templates/secret.yaml similarity index 100% rename from dependency/promtail/1.0.15/templates/secret.yaml rename to dependency/promtail/1.0.16/templates/secret.yaml diff --git a/dependency/promtail/1.0.15/templates/servicemonitor.yaml b/dependency/promtail/1.0.16/templates/servicemonitor.yaml similarity index 100% rename from dependency/promtail/1.0.15/templates/servicemonitor.yaml rename to dependency/promtail/1.0.16/templates/servicemonitor.yaml diff --git a/dependency/redis/1.0.39/values.yaml b/dependency/promtail/1.0.16/values.yaml similarity index 100% rename from dependency/redis/1.0.39/values.yaml rename to dependency/promtail/1.0.16/values.yaml diff --git a/dependency/redis/1.0.39/Chart.lock b/dependency/redis/1.0.39/Chart.lock deleted file mode 100644 index 894dcc6d42b..00000000000 --- a/dependency/redis/1.0.39/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T16:43:05.477324855Z" diff --git a/dependency/redis/1.0.39/CHANGELOG.md b/dependency/redis/1.0.40/CHANGELOG.md similarity index 89% rename from dependency/redis/1.0.39/CHANGELOG.md rename to dependency/redis/1.0.40/CHANGELOG.md index 938c2530f72..6ab9f60f6ad 100644 --- a/dependency/redis/1.0.39/CHANGELOG.md +++ b/dependency/redis/1.0.40/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [redis-1.0.40](https://github.com/truecharts/apps/compare/redis-1.0.39...redis-1.0.40) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [redis-1.0.39](https://github.com/truecharts/apps/compare/redis-1.0.38...redis-1.0.39) (2021-12-19) @@ -87,13 +97,3 @@ ### [redis-1.0.30](https://github.com/truecharts/apps/compare/redis-1.0.29...redis-1.0.30) (2021-12-08) #### Chore - -* update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [redis-1.0.29](https://github.com/truecharts/apps/compare/redis-1.0.28...redis-1.0.29) (2021-12-07) - -#### Chore - diff --git a/incubator/omada-controller/4.0.34/CONFIG.md b/dependency/redis/1.0.40/CONFIG.md similarity index 100% rename from incubator/omada-controller/4.0.34/CONFIG.md rename to dependency/redis/1.0.40/CONFIG.md diff --git a/dependency/redis/1.0.40/Chart.lock b/dependency/redis/1.0.40/Chart.lock new file mode 100644 index 00000000000..e1e3936f477 --- /dev/null +++ b/dependency/redis/1.0.40/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:07.604769836Z" diff --git a/dependency/redis/1.0.39/Chart.yaml b/dependency/redis/1.0.40/Chart.yaml similarity index 97% rename from dependency/redis/1.0.39/Chart.yaml rename to dependency/redis/1.0.40/Chart.yaml index b6e3d5a8130..bc51f4fc9c8 100644 --- a/dependency/redis/1.0.39/Chart.yaml +++ b/dependency/redis/1.0.40/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-redis - http://redis.io/ type: application -version: 1.0.39 +version: 1.0.40 annotations: truecharts.org/catagories: | - database diff --git a/dependency/redis/1.0.39/README.md b/dependency/redis/1.0.40/README.md similarity index 100% rename from dependency/redis/1.0.39/README.md rename to dependency/redis/1.0.40/README.md diff --git a/dependency/redis/1.0.39/app-readme.md b/dependency/redis/1.0.40/app-readme.md similarity index 100% rename from dependency/redis/1.0.39/app-readme.md rename to dependency/redis/1.0.40/app-readme.md diff --git a/incubator/omada-controller/4.0.34/charts/common-8.9.24.tgz b/dependency/redis/1.0.40/charts/common-8.9.24.tgz similarity index 100% rename from incubator/omada-controller/4.0.34/charts/common-8.9.24.tgz rename to dependency/redis/1.0.40/charts/common-8.9.24.tgz diff --git a/dependency/redis/1.0.39/helm-values.md b/dependency/redis/1.0.40/helm-values.md similarity index 100% rename from dependency/redis/1.0.39/helm-values.md rename to dependency/redis/1.0.40/helm-values.md diff --git a/dependency/redis/1.0.39/ix_values.yaml b/dependency/redis/1.0.40/ix_values.yaml similarity index 100% rename from dependency/redis/1.0.39/ix_values.yaml rename to dependency/redis/1.0.40/ix_values.yaml diff --git a/dependency/redis/1.0.39/questions.yaml b/dependency/redis/1.0.40/questions.yaml similarity index 99% rename from dependency/redis/1.0.39/questions.yaml rename to dependency/redis/1.0.40/questions.yaml index 6a6f46467cc..78f4b8044b1 100644 --- a/dependency/redis/1.0.39/questions.yaml +++ b/dependency/redis/1.0.40/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 6379 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/dependency/redis/1.0.39/security.md b/dependency/redis/1.0.40/security.md similarity index 100% rename from dependency/redis/1.0.39/security.md rename to dependency/redis/1.0.40/security.md diff --git a/dependency/redis/1.0.39/templates/common.yaml b/dependency/redis/1.0.40/templates/common.yaml similarity index 100% rename from dependency/redis/1.0.39/templates/common.yaml rename to dependency/redis/1.0.40/templates/common.yaml diff --git a/dependency/redis/1.0.39/templates/health-configmap.yaml b/dependency/redis/1.0.40/templates/health-configmap.yaml similarity index 100% rename from dependency/redis/1.0.39/templates/health-configmap.yaml rename to dependency/redis/1.0.40/templates/health-configmap.yaml diff --git a/dependency/redis/1.0.39/templates/secret.yaml b/dependency/redis/1.0.40/templates/secret.yaml similarity index 100% rename from dependency/redis/1.0.39/templates/secret.yaml rename to dependency/redis/1.0.40/templates/secret.yaml diff --git a/incubator/omada-controller/4.0.34/values.yaml b/dependency/redis/1.0.40/values.yaml similarity index 100% rename from incubator/omada-controller/4.0.34/values.yaml rename to dependency/redis/1.0.40/values.yaml diff --git a/incubator/omada-controller/4.0.34/Chart.lock b/incubator/omada-controller/4.0.34/Chart.lock deleted file mode 100644 index 07e7ac94f21..00000000000 --- a/incubator/omada-controller/4.0.34/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:17:45.493935251Z" diff --git a/incubator/omada-controller/4.0.34/CHANGELOG.md b/incubator/omada-controller/4.0.35/CHANGELOG.md similarity index 81% rename from incubator/omada-controller/4.0.34/CHANGELOG.md rename to incubator/omada-controller/4.0.35/CHANGELOG.md index eb11fc373d5..17d4e7c8c4c 100644 --- a/incubator/omada-controller/4.0.34/CHANGELOG.md +++ b/incubator/omada-controller/4.0.35/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [omada-controller-4.0.35](https://github.com/truecharts/apps/compare/omada-controller-4.0.34...omada-controller-4.0.35) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [omada-controller-4.0.34](https://github.com/truecharts/apps/compare/omada-controller-4.0.33...omada-controller-4.0.34) (2021-12-19) @@ -87,13 +97,3 @@ ### omada-controller-4.0.25 (2021-12-05) -#### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* ensure container references are prefixed with v -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) diff --git a/incubator/tdarr-node/1.0.28/CONFIG.md b/incubator/omada-controller/4.0.35/CONFIG.md similarity index 100% rename from incubator/tdarr-node/1.0.28/CONFIG.md rename to incubator/omada-controller/4.0.35/CONFIG.md diff --git a/incubator/omada-controller/4.0.35/Chart.lock b/incubator/omada-controller/4.0.35/Chart.lock new file mode 100644 index 00000000000..9ee9adf3b83 --- /dev/null +++ b/incubator/omada-controller/4.0.35/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:08.814365937Z" diff --git a/incubator/omada-controller/4.0.34/Chart.yaml b/incubator/omada-controller/4.0.35/Chart.yaml similarity index 97% rename from incubator/omada-controller/4.0.34/Chart.yaml rename to incubator/omada-controller/4.0.35/Chart.yaml index 9ce78a62de2..82bee5aa6be 100644 --- a/incubator/omada-controller/4.0.34/Chart.yaml +++ b/incubator/omada-controller/4.0.35/Chart.yaml @@ -18,7 +18,7 @@ name: omada-controller sources: - https://github.com/mbentley/docker-omada-controller - https://github.com/truechartsapps/tree/master/charts/omada-controller -version: 4.0.34 +version: 4.0.35 annotations: truecharts.org/catagories: | - media diff --git a/incubator/omada-controller/4.0.34/README.md b/incubator/omada-controller/4.0.35/README.md similarity index 100% rename from incubator/omada-controller/4.0.34/README.md rename to incubator/omada-controller/4.0.35/README.md diff --git a/incubator/omada-controller/4.0.34/app-readme.md b/incubator/omada-controller/4.0.35/app-readme.md similarity index 100% rename from incubator/omada-controller/4.0.34/app-readme.md rename to incubator/omada-controller/4.0.35/app-readme.md diff --git a/incubator/tdarr-node/1.0.28/charts/common-8.9.24.tgz b/incubator/omada-controller/4.0.35/charts/common-8.9.24.tgz similarity index 100% rename from incubator/tdarr-node/1.0.28/charts/common-8.9.24.tgz rename to incubator/omada-controller/4.0.35/charts/common-8.9.24.tgz diff --git a/incubator/omada-controller/4.0.34/helm-values.md b/incubator/omada-controller/4.0.35/helm-values.md similarity index 100% rename from incubator/omada-controller/4.0.34/helm-values.md rename to incubator/omada-controller/4.0.35/helm-values.md diff --git a/incubator/omada-controller/4.0.34/ix_values.yaml b/incubator/omada-controller/4.0.35/ix_values.yaml similarity index 100% rename from incubator/omada-controller/4.0.34/ix_values.yaml rename to incubator/omada-controller/4.0.35/ix_values.yaml diff --git a/incubator/omada-controller/4.0.34/questions.yaml b/incubator/omada-controller/4.0.35/questions.yaml similarity index 99% rename from incubator/omada-controller/4.0.34/questions.yaml rename to incubator/omada-controller/4.0.35/questions.yaml index 75bebf873dd..7da6f9bc92e 100644 --- a/incubator/omada-controller/4.0.34/questions.yaml +++ b/incubator/omada-controller/4.0.35/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8043 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/incubator/omada-controller/4.0.34/security.md b/incubator/omada-controller/4.0.35/security.md similarity index 99% rename from incubator/omada-controller/4.0.34/security.md rename to incubator/omada-controller/4.0.35/security.md index e1f5486fcac..f0b299e7338 100644 --- a/incubator/omada-controller/4.0.34/security.md +++ b/incubator/omada-controller/4.0.35/security.md @@ -243,8 +243,8 @@ hide: | commons-beanutils:commons-beanutils | CVE-2019-10086 | HIGH | 1.9.3 | 1.9.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html
http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e
https://access.redhat.com/errata/RHSA-2019:4317
https://access.redhat.com/errata/RHSA-2020:0057
https://access.redhat.com/errata/RHSA-2020:0194
https://access.redhat.com/errata/RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0811
https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086
https://github.com/advisories/GHSA-6phf-73q6-gh87
https://github.com/apache/commons-beanutils/commit/dd48f4e589462a8cdb1f29bbbccb35d6b0291d58
https://github.com/apache/commons-beanutils/pull/7
https://issues.apache.org/jira/browse/BEANUTILS-520
https://linux.oracle.com/cve/CVE-2019-10086.html
https://linux.oracle.com/errata/ELSA-2020-0194.html
https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E
https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E
https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E
https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E
https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E
https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/
https://nvd.nist.gov/vuln/detail/CVE-2019-10086
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | commons-io:commons-io | CVE-2021-29425 | MEDIUM | 2.2 | 2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
https://github.com/advisories/GHSA-gwrp-pvrq-jmwv
https://issues.apache.org/jira/browse/IO-556
https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E
https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29425
https://ubuntu.com/security/notices/USN-5095-1
https://www.openwall.com/lists/oss-security/2021/04/12/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.7 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| -| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| +| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.poi:poi | CVE-2017-12626 | HIGH | 3.15 | 3.17 |
Expand...http://www.securityfocus.com/bid/102879
https://access.redhat.com/errata/RHSA-2018:1322
https://bz.apache.org/bugzilla/show_bug.cgi?id=52372
https://bz.apache.org/bugzilla/show_bug.cgi?id=61294
https://bz.apache.org/bugzilla/show_bug.cgi?id=61295
https://bz.apache.org/bugzilla/show_bug.cgi?id=61338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12626
https://github.com/advisories/GHSA-523c-xh4g-mh5m
https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12626
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| | org.apache.poi:poi | CVE-2019-12415 | MEDIUM | 3.15 | 4.1.1 |
Expand...https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-12415
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.shiro:shiro-core | CVE-2020-11989 | CRITICAL | 1.4.0 | 1.5.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11989
https://github.com/advisories/GHSA-72w9-fcj5-3fcg
https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E
https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-11989
https://ubuntu.com/security/notices/USN-4740-1
https://www.openwall.com/lists/oss-security/2020/06/22/1
| diff --git a/incubator/omada-controller/4.0.34/templates/common.yaml b/incubator/omada-controller/4.0.35/templates/common.yaml similarity index 100% rename from incubator/omada-controller/4.0.34/templates/common.yaml rename to incubator/omada-controller/4.0.35/templates/common.yaml diff --git a/incubator/tdarr-node/1.0.28/values.yaml b/incubator/omada-controller/4.0.35/values.yaml similarity index 100% rename from incubator/tdarr-node/1.0.28/values.yaml rename to incubator/omada-controller/4.0.35/values.yaml diff --git a/incubator/tdarr-node/1.0.28/Chart.lock b/incubator/tdarr-node/1.0.28/Chart.lock deleted file mode 100644 index f4db2c0741d..00000000000 --- a/incubator/tdarr-node/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:18:08.064948854Z" diff --git a/incubator/tdarr-node/1.0.28/CHANGELOG.md b/incubator/tdarr-node/1.0.29/CHANGELOG.md similarity index 78% rename from incubator/tdarr-node/1.0.28/CHANGELOG.md rename to incubator/tdarr-node/1.0.29/CHANGELOG.md index eeaa4a8d5b9..9c85cbd8017 100644 --- a/incubator/tdarr-node/1.0.28/CHANGELOG.md +++ b/incubator/tdarr-node/1.0.29/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [tdarr-node-1.0.29](https://github.com/truecharts/apps/compare/tdarr-node-1.0.28...tdarr-node-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [tdarr-node-1.0.28](https://github.com/truecharts/apps/compare/tdarr-node-1.0.27...tdarr-node-1.0.28) (2021-12-19) @@ -86,14 +97,3 @@ ### tdarr-node-1.0.20 (2021-12-05) #### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* ensure container references are prefixed with v -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix diff --git a/incubator/tdarr/1.0.28/CONFIG.md b/incubator/tdarr-node/1.0.29/CONFIG.md similarity index 100% rename from incubator/tdarr/1.0.28/CONFIG.md rename to incubator/tdarr-node/1.0.29/CONFIG.md diff --git a/stable/couchpotato/0.0.5/Chart.lock b/incubator/tdarr-node/1.0.29/Chart.lock similarity index 79% rename from stable/couchpotato/0.0.5/Chart.lock rename to incubator/tdarr-node/1.0.29/Chart.lock index badff10e8b7..dcbb9127ebb 100644 --- a/stable/couchpotato/0.0.5/Chart.lock +++ b/incubator/tdarr-node/1.0.29/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:23:45.04684257Z" +generated: "2021-12-19T23:05:17.10040104Z" diff --git a/incubator/tdarr-node/1.0.28/Chart.yaml b/incubator/tdarr-node/1.0.29/Chart.yaml similarity index 97% rename from incubator/tdarr-node/1.0.28/Chart.yaml rename to incubator/tdarr-node/1.0.29/Chart.yaml index e28f78a231c..2d971dc8c4a 100644 --- a/incubator/tdarr-node/1.0.28/Chart.yaml +++ b/incubator/tdarr-node/1.0.29/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/HaveAGitGat/Tdarr - https://hub.docker.com/r/haveagitgat/tdarr_node type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/incubator/tdarr-node/1.0.28/README.md b/incubator/tdarr-node/1.0.29/README.md similarity index 100% rename from incubator/tdarr-node/1.0.28/README.md rename to incubator/tdarr-node/1.0.29/README.md diff --git a/incubator/tdarr-node/1.0.28/app-readme.md b/incubator/tdarr-node/1.0.29/app-readme.md similarity index 100% rename from incubator/tdarr-node/1.0.28/app-readme.md rename to incubator/tdarr-node/1.0.29/app-readme.md diff --git a/incubator/tdarr/1.0.28/charts/common-8.9.24.tgz b/incubator/tdarr-node/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from incubator/tdarr/1.0.28/charts/common-8.9.24.tgz rename to incubator/tdarr-node/1.0.29/charts/common-8.9.24.tgz diff --git a/incubator/tdarr-node/1.0.28/helm-values.md b/incubator/tdarr-node/1.0.29/helm-values.md similarity index 100% rename from incubator/tdarr-node/1.0.28/helm-values.md rename to incubator/tdarr-node/1.0.29/helm-values.md diff --git a/incubator/tdarr-node/1.0.28/ix_values.yaml b/incubator/tdarr-node/1.0.29/ix_values.yaml similarity index 100% rename from incubator/tdarr-node/1.0.28/ix_values.yaml rename to incubator/tdarr-node/1.0.29/ix_values.yaml diff --git a/incubator/tdarr-node/1.0.28/questions.yaml b/incubator/tdarr-node/1.0.29/questions.yaml similarity index 99% rename from incubator/tdarr-node/1.0.28/questions.yaml rename to incubator/tdarr-node/1.0.29/questions.yaml index 5b34717f1b0..98553c26a5a 100644 --- a/incubator/tdarr-node/1.0.28/questions.yaml +++ b/incubator/tdarr-node/1.0.29/questions.yaml @@ -210,14 +210,6 @@ questions: required: true $ref: - "definitions/nodeIP" - - variable: nodePort - label: "nodePort" - description: "Sets the port of this node." - schema: - type: int - required: true - hidden: true - default: 8267 - variable: serverIP label: "serverIP" description: "Sets the serverIP, to which this node will connect. Use the service name if the node is in the same cluster" @@ -384,7 +376,6 @@ questions: schema: type: int default: 8267 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/incubator/tdarr-node/1.0.28/security.md b/incubator/tdarr-node/1.0.29/security.md similarity index 100% rename from incubator/tdarr-node/1.0.28/security.md rename to incubator/tdarr-node/1.0.29/security.md diff --git a/incubator/tdarr-node/1.0.28/templates/common.yaml b/incubator/tdarr-node/1.0.29/templates/common.yaml similarity index 100% rename from incubator/tdarr-node/1.0.28/templates/common.yaml rename to incubator/tdarr-node/1.0.29/templates/common.yaml diff --git a/incubator/tdarr/1.0.28/values.yaml b/incubator/tdarr-node/1.0.29/values.yaml similarity index 100% rename from incubator/tdarr/1.0.28/values.yaml rename to incubator/tdarr-node/1.0.29/values.yaml diff --git a/incubator/tdarr/1.0.28/Chart.lock b/incubator/tdarr/1.0.28/Chart.lock deleted file mode 100644 index 3cf12225834..00000000000 --- a/incubator/tdarr/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:18:14.709880517Z" diff --git a/incubator/tdarr/1.0.28/CHANGELOG.md b/incubator/tdarr/1.0.29/CHANGELOG.md similarity index 78% rename from incubator/tdarr/1.0.28/CHANGELOG.md rename to incubator/tdarr/1.0.29/CHANGELOG.md index 6eab2ed88d8..af47ccb27ad 100644 --- a/incubator/tdarr/1.0.28/CHANGELOG.md +++ b/incubator/tdarr/1.0.29/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [tdarr-1.0.29](https://github.com/truecharts/apps/compare/tdarr-node-1.0.28...tdarr-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [tdarr-1.0.28](https://github.com/truecharts/apps/compare/tdarr-node-1.0.27...tdarr-1.0.28) (2021-12-19) @@ -85,15 +97,3 @@ * bump apps to generate security page * move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* ensure container references are prefixed with v -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - diff --git a/stable/airsonic/4.0.26/CONFIG.md b/incubator/tdarr/1.0.29/CONFIG.md similarity index 100% rename from stable/airsonic/4.0.26/CONFIG.md rename to incubator/tdarr/1.0.29/CONFIG.md diff --git a/incubator/tdarr/1.0.29/Chart.lock b/incubator/tdarr/1.0.29/Chart.lock new file mode 100644 index 00000000000..ea896545a7f --- /dev/null +++ b/incubator/tdarr/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:30.440821866Z" diff --git a/incubator/tdarr/1.0.28/Chart.yaml b/incubator/tdarr/1.0.29/Chart.yaml similarity index 97% rename from incubator/tdarr/1.0.28/Chart.yaml rename to incubator/tdarr/1.0.29/Chart.yaml index 05225dc713e..2c1cc04c4fc 100644 --- a/incubator/tdarr/1.0.28/Chart.yaml +++ b/incubator/tdarr/1.0.29/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/HaveAGitGat/Tdarr - https://hub.docker.com/r/haveagitgat/tdarr type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/incubator/tdarr/1.0.28/README.md b/incubator/tdarr/1.0.29/README.md similarity index 100% rename from incubator/tdarr/1.0.28/README.md rename to incubator/tdarr/1.0.29/README.md diff --git a/incubator/tdarr/1.0.28/app-readme.md b/incubator/tdarr/1.0.29/app-readme.md similarity index 100% rename from incubator/tdarr/1.0.28/app-readme.md rename to incubator/tdarr/1.0.29/app-readme.md diff --git a/stable/airsonic/4.0.26/charts/common-8.9.24.tgz b/incubator/tdarr/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/airsonic/4.0.26/charts/common-8.9.24.tgz rename to incubator/tdarr/1.0.29/charts/common-8.9.24.tgz diff --git a/incubator/tdarr/1.0.28/helm-values.md b/incubator/tdarr/1.0.29/helm-values.md similarity index 100% rename from incubator/tdarr/1.0.28/helm-values.md rename to incubator/tdarr/1.0.29/helm-values.md diff --git a/incubator/tdarr/1.0.28/ix_values.yaml b/incubator/tdarr/1.0.29/ix_values.yaml similarity index 100% rename from incubator/tdarr/1.0.28/ix_values.yaml rename to incubator/tdarr/1.0.29/ix_values.yaml diff --git a/incubator/tdarr/1.0.28/questions.yaml b/incubator/tdarr/1.0.29/questions.yaml similarity index 98% rename from incubator/tdarr/1.0.28/questions.yaml rename to incubator/tdarr/1.0.29/questions.yaml index 144e9c9fb7d..953636e51a0 100644 --- a/incubator/tdarr/1.0.28/questions.yaml +++ b/incubator/tdarr/1.0.29/questions.yaml @@ -203,30 +203,6 @@ questions: type: int required: true default: 568 - - variable: serverIP - label: "serverIP" - description: "Sets the serverIP." - schema: - type: string - required: true - hidden: true - default: "localhost" - - variable: serverPort - label: "serverPort" - description: "Sets the server's comm port." - schema: - type: int - required: true - hidden: true - default: 8266 - - variable: webUIPort - label: "webUIPort" - description: "Sets the webUIPort." - schema: - type: int - required: true - hidden: true - default: 8265 - variable: envList label: "Image environment" @@ -378,7 +354,6 @@ questions: schema: type: int default: 8265 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -472,19 +447,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8266 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/incubator/tdarr/1.0.28/security.md b/incubator/tdarr/1.0.29/security.md similarity index 100% rename from incubator/tdarr/1.0.28/security.md rename to incubator/tdarr/1.0.29/security.md diff --git a/incubator/tdarr/1.0.28/templates/common.yaml b/incubator/tdarr/1.0.29/templates/common.yaml similarity index 100% rename from incubator/tdarr/1.0.28/templates/common.yaml rename to incubator/tdarr/1.0.29/templates/common.yaml diff --git a/stable/airsonic/4.0.26/values.yaml b/incubator/tdarr/1.0.29/values.yaml similarity index 100% rename from stable/airsonic/4.0.26/values.yaml rename to incubator/tdarr/1.0.29/values.yaml diff --git a/stable/airsonic/4.0.26/Chart.lock b/stable/airsonic/4.0.26/Chart.lock deleted file mode 100644 index 08e241fa4a6..00000000000 --- a/stable/airsonic/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:18:25.649072724Z" diff --git a/stable/airsonic/4.0.26/CHANGELOG.md b/stable/airsonic/4.0.27/CHANGELOG.md similarity index 90% rename from stable/airsonic/4.0.26/CHANGELOG.md rename to stable/airsonic/4.0.27/CHANGELOG.md index 3faade058c2..0202613deda 100644 --- a/stable/airsonic/4.0.26/CHANGELOG.md +++ b/stable/airsonic/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [airsonic-4.0.27](https://github.com/truecharts/apps/compare/airsonic-4.0.26...airsonic-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [airsonic-4.0.26](https://github.com/truecharts/apps/compare/airsonic-4.0.25...airsonic-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [airsonic-4.0.18](https://github.com/truecharts/apps/compare/airsonic-4.0.17...airsonic-4.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [airsonic-4.0.17](https://github.com/truecharts/apps/compare/airsonic-4.0.16...airsonic-4.0.17) (2021-12-04) - diff --git a/stable/amcrest2mqtt/2.0.26/CONFIG.md b/stable/airsonic/4.0.27/CONFIG.md similarity index 100% rename from stable/amcrest2mqtt/2.0.26/CONFIG.md rename to stable/airsonic/4.0.27/CONFIG.md diff --git a/stable/airsonic/4.0.27/Chart.lock b/stable/airsonic/4.0.27/Chart.lock new file mode 100644 index 00000000000..5441b54cd8d --- /dev/null +++ b/stable/airsonic/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:33.852610266Z" diff --git a/stable/airsonic/4.0.26/Chart.yaml b/stable/airsonic/4.0.27/Chart.yaml similarity index 97% rename from stable/airsonic/4.0.26/Chart.yaml rename to stable/airsonic/4.0.27/Chart.yaml index ebca81c3643..9e490cd026f 100644 --- a/stable/airsonic/4.0.26/Chart.yaml +++ b/stable/airsonic/4.0.27/Chart.yaml @@ -19,7 +19,7 @@ sources: - https://github.com/airsonic/airsonic - https://github.com/linuxserver/docker-airsonic - https://github.com/k8s-at-home/charts/tree/master/charts/airsonic -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/airsonic/4.0.26/README.md b/stable/airsonic/4.0.27/README.md similarity index 100% rename from stable/airsonic/4.0.26/README.md rename to stable/airsonic/4.0.27/README.md diff --git a/stable/airsonic/4.0.26/app-readme.md b/stable/airsonic/4.0.27/app-readme.md similarity index 100% rename from stable/airsonic/4.0.26/app-readme.md rename to stable/airsonic/4.0.27/app-readme.md diff --git a/stable/amcrest2mqtt/2.0.26/charts/common-8.9.24.tgz b/stable/airsonic/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/amcrest2mqtt/2.0.26/charts/common-8.9.24.tgz rename to stable/airsonic/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/airsonic/4.0.26/helm-values.md b/stable/airsonic/4.0.27/helm-values.md similarity index 100% rename from stable/airsonic/4.0.26/helm-values.md rename to stable/airsonic/4.0.27/helm-values.md diff --git a/stable/airsonic/4.0.26/ix_values.yaml b/stable/airsonic/4.0.27/ix_values.yaml similarity index 100% rename from stable/airsonic/4.0.26/ix_values.yaml rename to stable/airsonic/4.0.27/ix_values.yaml diff --git a/stable/airsonic/4.0.26/questions.yaml b/stable/airsonic/4.0.27/questions.yaml similarity index 99% rename from stable/airsonic/4.0.26/questions.yaml rename to stable/airsonic/4.0.27/questions.yaml index 37b5aeca18c..cbd532ae688 100644 --- a/stable/airsonic/4.0.26/questions.yaml +++ b/stable/airsonic/4.0.27/questions.yaml @@ -352,7 +352,6 @@ questions: schema: type: int default: 10047 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/airsonic/4.0.26/security.md b/stable/airsonic/4.0.27/security.md similarity index 100% rename from stable/airsonic/4.0.26/security.md rename to stable/airsonic/4.0.27/security.md diff --git a/stable/airsonic/4.0.26/templates/common.yaml b/stable/airsonic/4.0.27/templates/common.yaml similarity index 100% rename from stable/airsonic/4.0.26/templates/common.yaml rename to stable/airsonic/4.0.27/templates/common.yaml diff --git a/stable/amcrest2mqtt/2.0.26/values.yaml b/stable/airsonic/4.0.27/values.yaml similarity index 100% rename from stable/amcrest2mqtt/2.0.26/values.yaml rename to stable/airsonic/4.0.27/values.yaml diff --git a/stable/amcrest2mqtt/2.0.26/Chart.lock b/stable/amcrest2mqtt/2.0.26/Chart.lock deleted file mode 100644 index cb153ac36b9..00000000000 --- a/stable/amcrest2mqtt/2.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:18:57.305973024Z" diff --git a/stable/amcrest2mqtt/2.0.26/CHANGELOG.md b/stable/amcrest2mqtt/2.0.27/CHANGELOG.md similarity index 93% rename from stable/amcrest2mqtt/2.0.26/CHANGELOG.md rename to stable/amcrest2mqtt/2.0.27/CHANGELOG.md index c35ef5ea0cb..d541b2dad9e 100644 --- a/stable/amcrest2mqtt/2.0.26/CHANGELOG.md +++ b/stable/amcrest2mqtt/2.0.27/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [amcrest2mqtt-2.0.27](https://github.com/truecharts/apps/compare/amcrest2mqtt-2.0.26...amcrest2mqtt-2.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [amcrest2mqtt-2.0.26](https://github.com/truecharts/apps/compare/amcrest2mqtt-2.0.25...amcrest2mqtt-2.0.26) (2021-12-19) @@ -88,12 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - -### [amcrest2mqtt-2.0.18](https://github.com/truecharts/apps/compare/amcrest2mqtt-2.0.17...amcrest2mqtt-2.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - diff --git a/stable/anonaddy/6.0.16/CONFIG.md b/stable/amcrest2mqtt/2.0.27/CONFIG.md similarity index 100% rename from stable/anonaddy/6.0.16/CONFIG.md rename to stable/amcrest2mqtt/2.0.27/CONFIG.md diff --git a/stable/amcrest2mqtt/2.0.27/Chart.lock b/stable/amcrest2mqtt/2.0.27/Chart.lock new file mode 100644 index 00000000000..613e07937b6 --- /dev/null +++ b/stable/amcrest2mqtt/2.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:05:45.597512485Z" diff --git a/stable/amcrest2mqtt/2.0.26/Chart.yaml b/stable/amcrest2mqtt/2.0.27/Chart.yaml similarity index 97% rename from stable/amcrest2mqtt/2.0.26/Chart.yaml rename to stable/amcrest2mqtt/2.0.27/Chart.yaml index 7e2467bb6e6..1c9844b52d5 100644 --- a/stable/amcrest2mqtt/2.0.26/Chart.yaml +++ b/stable/amcrest2mqtt/2.0.27/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: amcrest2mqtt sources: - https://github.com/dchesterton/amcrest2mqtt -version: 2.0.26 +version: 2.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/amcrest2mqtt/2.0.26/README.md b/stable/amcrest2mqtt/2.0.27/README.md similarity index 100% rename from stable/amcrest2mqtt/2.0.26/README.md rename to stable/amcrest2mqtt/2.0.27/README.md diff --git a/stable/amcrest2mqtt/2.0.26/app-readme.md b/stable/amcrest2mqtt/2.0.27/app-readme.md similarity index 100% rename from stable/amcrest2mqtt/2.0.26/app-readme.md rename to stable/amcrest2mqtt/2.0.27/app-readme.md diff --git a/stable/anonaddy/6.0.16/charts/common-8.9.24.tgz b/stable/amcrest2mqtt/2.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/anonaddy/6.0.16/charts/common-8.9.24.tgz rename to stable/amcrest2mqtt/2.0.27/charts/common-8.9.24.tgz diff --git a/stable/amcrest2mqtt/2.0.26/helm-values.md b/stable/amcrest2mqtt/2.0.27/helm-values.md similarity index 100% rename from stable/amcrest2mqtt/2.0.26/helm-values.md rename to stable/amcrest2mqtt/2.0.27/helm-values.md diff --git a/stable/amcrest2mqtt/2.0.26/ix_values.yaml b/stable/amcrest2mqtt/2.0.27/ix_values.yaml similarity index 100% rename from stable/amcrest2mqtt/2.0.26/ix_values.yaml rename to stable/amcrest2mqtt/2.0.27/ix_values.yaml diff --git a/stable/amcrest2mqtt/2.0.26/questions.yaml b/stable/amcrest2mqtt/2.0.27/questions.yaml similarity index 100% rename from stable/amcrest2mqtt/2.0.26/questions.yaml rename to stable/amcrest2mqtt/2.0.27/questions.yaml diff --git a/stable/amcrest2mqtt/2.0.26/security.md b/stable/amcrest2mqtt/2.0.27/security.md similarity index 100% rename from stable/amcrest2mqtt/2.0.26/security.md rename to stable/amcrest2mqtt/2.0.27/security.md diff --git a/stable/amcrest2mqtt/2.0.26/templates/common.yaml b/stable/amcrest2mqtt/2.0.27/templates/common.yaml similarity index 100% rename from stable/amcrest2mqtt/2.0.26/templates/common.yaml rename to stable/amcrest2mqtt/2.0.27/templates/common.yaml diff --git a/stable/anonaddy/6.0.16/values.yaml b/stable/amcrest2mqtt/2.0.27/values.yaml similarity index 100% rename from stable/anonaddy/6.0.16/values.yaml rename to stable/amcrest2mqtt/2.0.27/values.yaml diff --git a/stable/anonaddy/6.0.16/CHANGELOG.md b/stable/anonaddy/6.0.17/CHANGELOG.md similarity index 91% rename from stable/anonaddy/6.0.16/CHANGELOG.md rename to stable/anonaddy/6.0.17/CHANGELOG.md index 29891cc3cc4..edecf6f9e51 100644 --- a/stable/anonaddy/6.0.16/CHANGELOG.md +++ b/stable/anonaddy/6.0.17/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [anonaddy-6.0.17](https://github.com/truecharts/apps/compare/anonaddy-6.0.16...anonaddy-6.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [anonaddy-6.0.16](https://github.com/truecharts/apps/compare/anonaddy-6.0.15...anonaddy-6.0.16) (2021-12-19) @@ -88,12 +97,3 @@ * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1433](https://github.com/truecharts/apps/issues/1433)) -* update non-major ([#1431](https://github.com/truecharts/apps/issues/1431)) - -#### Feat - -* add a bunch of mariaDB backed Apps ([#1407](https://github.com/truecharts/apps/issues/1407)) - - - diff --git a/stable/apache-musicindex/2.0.24/CONFIG.md b/stable/anonaddy/6.0.17/CONFIG.md similarity index 100% rename from stable/apache-musicindex/2.0.24/CONFIG.md rename to stable/anonaddy/6.0.17/CONFIG.md diff --git a/stable/anonaddy/6.0.16/Chart.lock b/stable/anonaddy/6.0.17/Chart.lock similarity index 87% rename from stable/anonaddy/6.0.16/Chart.lock rename to stable/anonaddy/6.0.17/Chart.lock index 70c572bbaf6..8685bf17db2 100644 --- a/stable/anonaddy/6.0.16/Chart.lock +++ b/stable/anonaddy/6.0.17/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org version: 1.0.39 digest: sha256:2d7a39d3e4923b7f7f6d6ec0659a198efbdbc8d064319676b8089e2eaa4f5275 -generated: "2021-12-19T18:19:05.952238077Z" +generated: "2021-12-19T23:06:05.19940258Z" diff --git a/stable/anonaddy/6.0.16/Chart.yaml b/stable/anonaddy/6.0.17/Chart.yaml similarity index 98% rename from stable/anonaddy/6.0.16/Chart.yaml rename to stable/anonaddy/6.0.17/Chart.yaml index 9562382d636..89cacd6fabc 100644 --- a/stable/anonaddy/6.0.16/Chart.yaml +++ b/stable/anonaddy/6.0.17/Chart.yaml @@ -25,7 +25,7 @@ maintainers: name: anonaddy sources: - https://github.com/anonaddy/docker -version: 6.0.16 +version: 6.0.17 annotations: truecharts.org/catagories: | - email diff --git a/stable/anonaddy/6.0.16/README.md b/stable/anonaddy/6.0.17/README.md similarity index 100% rename from stable/anonaddy/6.0.16/README.md rename to stable/anonaddy/6.0.17/README.md diff --git a/stable/anonaddy/6.0.16/app-readme.md b/stable/anonaddy/6.0.17/app-readme.md similarity index 100% rename from stable/anonaddy/6.0.16/app-readme.md rename to stable/anonaddy/6.0.17/app-readme.md diff --git a/stable/apache-musicindex/2.0.24/charts/common-8.9.24.tgz b/stable/anonaddy/6.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/apache-musicindex/2.0.24/charts/common-8.9.24.tgz rename to stable/anonaddy/6.0.17/charts/common-8.9.24.tgz diff --git a/stable/anonaddy/6.0.16/charts/mariadb-1.0.37.tgz b/stable/anonaddy/6.0.17/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/anonaddy/6.0.16/charts/mariadb-1.0.37.tgz rename to stable/anonaddy/6.0.17/charts/mariadb-1.0.37.tgz diff --git a/stable/anonaddy/6.0.16/charts/redis-1.0.39.tgz b/stable/anonaddy/6.0.17/charts/redis-1.0.39.tgz similarity index 100% rename from stable/anonaddy/6.0.16/charts/redis-1.0.39.tgz rename to stable/anonaddy/6.0.17/charts/redis-1.0.39.tgz diff --git a/stable/anonaddy/6.0.16/helm-values.md b/stable/anonaddy/6.0.17/helm-values.md similarity index 100% rename from stable/anonaddy/6.0.16/helm-values.md rename to stable/anonaddy/6.0.17/helm-values.md diff --git a/stable/anonaddy/6.0.16/ix_values.yaml b/stable/anonaddy/6.0.17/ix_values.yaml similarity index 100% rename from stable/anonaddy/6.0.16/ix_values.yaml rename to stable/anonaddy/6.0.17/ix_values.yaml diff --git a/stable/anonaddy/6.0.16/questions.yaml b/stable/anonaddy/6.0.17/questions.yaml similarity index 100% rename from stable/anonaddy/6.0.16/questions.yaml rename to stable/anonaddy/6.0.17/questions.yaml diff --git a/stable/anonaddy/6.0.16/security.md b/stable/anonaddy/6.0.17/security.md similarity index 100% rename from stable/anonaddy/6.0.16/security.md rename to stable/anonaddy/6.0.17/security.md diff --git a/stable/anonaddy/6.0.16/templates/_appkey.tpl b/stable/anonaddy/6.0.17/templates/_appkey.tpl similarity index 100% rename from stable/anonaddy/6.0.16/templates/_appkey.tpl rename to stable/anonaddy/6.0.17/templates/_appkey.tpl diff --git a/stable/anonaddy/6.0.16/templates/common.yaml b/stable/anonaddy/6.0.17/templates/common.yaml similarity index 100% rename from stable/anonaddy/6.0.16/templates/common.yaml rename to stable/anonaddy/6.0.17/templates/common.yaml diff --git a/stable/apache-musicindex/2.0.24/values.yaml b/stable/anonaddy/6.0.17/values.yaml similarity index 100% rename from stable/apache-musicindex/2.0.24/values.yaml rename to stable/anonaddy/6.0.17/values.yaml diff --git a/stable/apache-musicindex/2.0.24/Chart.lock b/stable/apache-musicindex/2.0.24/Chart.lock deleted file mode 100644 index 6f40eed0a4b..00000000000 --- a/stable/apache-musicindex/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:19:19.846884111Z" diff --git a/stable/apache-musicindex/2.0.24/CHANGELOG.md b/stable/apache-musicindex/2.0.25/CHANGELOG.md similarity index 90% rename from stable/apache-musicindex/2.0.24/CHANGELOG.md rename to stable/apache-musicindex/2.0.25/CHANGELOG.md index 5de44145708..2e719bcea6e 100644 --- a/stable/apache-musicindex/2.0.24/CHANGELOG.md +++ b/stable/apache-musicindex/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [apache-musicindex-2.0.25](https://github.com/truecharts/apps/compare/apache-musicindex-2.0.24...apache-musicindex-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [apache-musicindex-2.0.24](https://github.com/truecharts/apps/compare/apache-musicindex-2.0.23...apache-musicindex-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [apache-musicindex-2.0.16](https://github.com/truecharts/apps/compare/apache-musicindex-2.0.15...apache-musicindex-2.0.16) (2021-12-04) -#### Chore - -* bump apps to generate security page - - - - -### [apache-musicindex-2.0.15](https://github.com/truecharts/apps/compare/apache-musicindex-2.0.14...apache-musicindex-2.0.15) (2021-12-04) - -#### Chore diff --git a/stable/appdaemon/7.0.5/CONFIG.md b/stable/apache-musicindex/2.0.25/CONFIG.md similarity index 100% rename from stable/appdaemon/7.0.5/CONFIG.md rename to stable/apache-musicindex/2.0.25/CONFIG.md diff --git a/stable/dillinger/0.0.5/Chart.lock b/stable/apache-musicindex/2.0.25/Chart.lock similarity index 79% rename from stable/dillinger/0.0.5/Chart.lock rename to stable/apache-musicindex/2.0.25/Chart.lock index 533ae37f060..cd8cb90a751 100644 --- a/stable/dillinger/0.0.5/Chart.lock +++ b/stable/apache-musicindex/2.0.25/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:25:52.57893149Z" +generated: "2021-12-19T23:06:28.29334591Z" diff --git a/stable/apache-musicindex/2.0.24/Chart.yaml b/stable/apache-musicindex/2.0.25/Chart.yaml similarity index 97% rename from stable/apache-musicindex/2.0.24/Chart.yaml rename to stable/apache-musicindex/2.0.25/Chart.yaml index fab00799e70..fde1590ca56 100644 --- a/stable/apache-musicindex/2.0.24/Chart.yaml +++ b/stable/apache-musicindex/2.0.25/Chart.yaml @@ -20,7 +20,7 @@ maintainers: name: apache-musicindex sources: - http://hacks.slashdirt.org/sw/musicindex/ -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/apache-musicindex/2.0.24/README.md b/stable/apache-musicindex/2.0.25/README.md similarity index 100% rename from stable/apache-musicindex/2.0.24/README.md rename to stable/apache-musicindex/2.0.25/README.md diff --git a/stable/apache-musicindex/2.0.24/app-readme.md b/stable/apache-musicindex/2.0.25/app-readme.md similarity index 100% rename from stable/apache-musicindex/2.0.24/app-readme.md rename to stable/apache-musicindex/2.0.25/app-readme.md diff --git a/stable/appdaemon/7.0.5/charts/common-8.9.24.tgz b/stable/apache-musicindex/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/appdaemon/7.0.5/charts/common-8.9.24.tgz rename to stable/apache-musicindex/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/apache-musicindex/2.0.24/helm-values.md b/stable/apache-musicindex/2.0.25/helm-values.md similarity index 100% rename from stable/apache-musicindex/2.0.24/helm-values.md rename to stable/apache-musicindex/2.0.25/helm-values.md diff --git a/stable/apache-musicindex/2.0.24/ix_values.yaml b/stable/apache-musicindex/2.0.25/ix_values.yaml similarity index 100% rename from stable/apache-musicindex/2.0.24/ix_values.yaml rename to stable/apache-musicindex/2.0.25/ix_values.yaml diff --git a/stable/apache-musicindex/2.0.24/questions.yaml b/stable/apache-musicindex/2.0.25/questions.yaml similarity index 99% rename from stable/apache-musicindex/2.0.24/questions.yaml rename to stable/apache-musicindex/2.0.25/questions.yaml index f722bc01353..4a28bb745b6 100644 --- a/stable/apache-musicindex/2.0.24/questions.yaml +++ b/stable/apache-musicindex/2.0.25/questions.yaml @@ -379,7 +379,6 @@ questions: schema: type: int default: 10006 - editable: true required: true - variable: serviceexpert diff --git a/stable/apache-musicindex/2.0.24/security.md b/stable/apache-musicindex/2.0.25/security.md similarity index 100% rename from stable/apache-musicindex/2.0.24/security.md rename to stable/apache-musicindex/2.0.25/security.md diff --git a/stable/apache-musicindex/2.0.24/templates/common.yaml b/stable/apache-musicindex/2.0.25/templates/common.yaml similarity index 100% rename from stable/apache-musicindex/2.0.24/templates/common.yaml rename to stable/apache-musicindex/2.0.25/templates/common.yaml diff --git a/stable/appdaemon/7.0.5/values.yaml b/stable/apache-musicindex/2.0.25/values.yaml similarity index 100% rename from stable/appdaemon/7.0.5/values.yaml rename to stable/apache-musicindex/2.0.25/values.yaml diff --git a/stable/appdaemon/7.0.5/Chart.lock b/stable/appdaemon/7.0.5/Chart.lock deleted file mode 100644 index 6cba2673cb3..00000000000 --- a/stable/appdaemon/7.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:19:27.963942815Z" diff --git a/stable/appdaemon/7.0.5/CHANGELOG.md b/stable/appdaemon/7.0.6/CHANGELOG.md similarity index 91% rename from stable/appdaemon/7.0.5/CHANGELOG.md rename to stable/appdaemon/7.0.6/CHANGELOG.md index bc2b3eae696..2942a03dd37 100644 --- a/stable/appdaemon/7.0.5/CHANGELOG.md +++ b/stable/appdaemon/7.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [appdaemon-7.0.6](https://github.com/truecharts/apps/compare/appdaemon-7.0.5...appdaemon-7.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [appdaemon-7.0.5](https://github.com/truecharts/apps/compare/appdaemon-7.0.4...appdaemon-7.0.5) (2021-12-19) @@ -87,13 +97,3 @@ ### [appdaemon-6.0.17](https://github.com/truecharts/apps/compare/appdaemon-6.0.16...appdaemon-6.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [appdaemon-6.0.16](https://github.com/truecharts/apps/compare/appdaemon-6.0.15...appdaemon-6.0.16) (2021-12-04) - diff --git a/stable/aria2/3.0.5/CONFIG.md b/stable/appdaemon/7.0.6/CONFIG.md similarity index 100% rename from stable/aria2/3.0.5/CONFIG.md rename to stable/appdaemon/7.0.6/CONFIG.md diff --git a/stable/appdaemon/7.0.6/Chart.lock b/stable/appdaemon/7.0.6/Chart.lock new file mode 100644 index 00000000000..e17574e5957 --- /dev/null +++ b/stable/appdaemon/7.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:06:32.168342487Z" diff --git a/stable/appdaemon/7.0.5/Chart.yaml b/stable/appdaemon/7.0.6/Chart.yaml similarity index 98% rename from stable/appdaemon/7.0.5/Chart.yaml rename to stable/appdaemon/7.0.6/Chart.yaml index a74673e5f41..589d2182854 100644 --- a/stable/appdaemon/7.0.5/Chart.yaml +++ b/stable/appdaemon/7.0.6/Chart.yaml @@ -26,7 +26,7 @@ name: appdaemon sources: - https://github.com/AppDaemon/appdaemon type: application -version: 7.0.5 +version: 7.0.6 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/appdaemon/7.0.5/README.md b/stable/appdaemon/7.0.6/README.md similarity index 100% rename from stable/appdaemon/7.0.5/README.md rename to stable/appdaemon/7.0.6/README.md diff --git a/stable/appdaemon/7.0.5/app-readme.md b/stable/appdaemon/7.0.6/app-readme.md similarity index 100% rename from stable/appdaemon/7.0.5/app-readme.md rename to stable/appdaemon/7.0.6/app-readme.md diff --git a/stable/aria2/3.0.5/charts/common-8.9.24.tgz b/stable/appdaemon/7.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/aria2/3.0.5/charts/common-8.9.24.tgz rename to stable/appdaemon/7.0.6/charts/common-8.9.24.tgz diff --git a/stable/appdaemon/7.0.5/helm-values.md b/stable/appdaemon/7.0.6/helm-values.md similarity index 100% rename from stable/appdaemon/7.0.5/helm-values.md rename to stable/appdaemon/7.0.6/helm-values.md diff --git a/stable/appdaemon/7.0.5/ix_values.yaml b/stable/appdaemon/7.0.6/ix_values.yaml similarity index 100% rename from stable/appdaemon/7.0.5/ix_values.yaml rename to stable/appdaemon/7.0.6/ix_values.yaml diff --git a/stable/appdaemon/7.0.5/questions.yaml b/stable/appdaemon/7.0.6/questions.yaml similarity index 99% rename from stable/appdaemon/7.0.5/questions.yaml rename to stable/appdaemon/7.0.6/questions.yaml index 77e2987fc78..d6c6f25ce7c 100644 --- a/stable/appdaemon/7.0.5/questions.yaml +++ b/stable/appdaemon/7.0.6/questions.yaml @@ -396,7 +396,6 @@ questions: schema: type: int default: 51050 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/appdaemon/7.0.5/security.md b/stable/appdaemon/7.0.6/security.md similarity index 100% rename from stable/appdaemon/7.0.5/security.md rename to stable/appdaemon/7.0.6/security.md diff --git a/stable/appdaemon/7.0.5/templates/common.yaml b/stable/appdaemon/7.0.6/templates/common.yaml similarity index 100% rename from stable/appdaemon/7.0.5/templates/common.yaml rename to stable/appdaemon/7.0.6/templates/common.yaml diff --git a/stable/aria2/3.0.5/values.yaml b/stable/appdaemon/7.0.6/values.yaml similarity index 100% rename from stable/aria2/3.0.5/values.yaml rename to stable/appdaemon/7.0.6/values.yaml diff --git a/stable/aria2/3.0.5/Chart.lock b/stable/aria2/3.0.5/Chart.lock deleted file mode 100644 index d3a73790c12..00000000000 --- a/stable/aria2/3.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:19:45.852985357Z" diff --git a/stable/aria2/3.0.5/CHANGELOG.md b/stable/aria2/3.0.6/CHANGELOG.md similarity index 82% rename from stable/aria2/3.0.5/CHANGELOG.md rename to stable/aria2/3.0.6/CHANGELOG.md index 948e7cd0666..57c367d9c8b 100644 --- a/stable/aria2/3.0.5/CHANGELOG.md +++ b/stable/aria2/3.0.6/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [aria2-3.0.6](https://github.com/truecharts/apps/compare/aria2-3.0.5...aria2-3.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [aria2-3.0.5](https://github.com/truecharts/apps/compare/aria2-3.0.4...aria2-3.0.5) (2021-12-19) @@ -85,15 +97,3 @@ * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) #### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [aria2-2.0.17](https://github.com/truecharts/apps/compare/aria2-2.0.16...aria2-2.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - diff --git a/stable/audacity/2.0.24/CONFIG.md b/stable/aria2/3.0.6/CONFIG.md similarity index 100% rename from stable/audacity/2.0.24/CONFIG.md rename to stable/aria2/3.0.6/CONFIG.md diff --git a/stable/aria2/3.0.6/Chart.lock b/stable/aria2/3.0.6/Chart.lock new file mode 100644 index 00000000000..0371bf08485 --- /dev/null +++ b/stable/aria2/3.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:06:43.364150127Z" diff --git a/stable/aria2/3.0.5/Chart.yaml b/stable/aria2/3.0.6/Chart.yaml similarity index 97% rename from stable/aria2/3.0.5/Chart.yaml rename to stable/aria2/3.0.6/Chart.yaml index a4583d4cf8c..4277f64f8c0 100644 --- a/stable/aria2/3.0.5/Chart.yaml +++ b/stable/aria2/3.0.6/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: aria2 sources: - https://github.com/P3TERX/Aria2-Pro-Docker -version: 3.0.5 +version: 3.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/aria2/3.0.5/README.md b/stable/aria2/3.0.6/README.md similarity index 100% rename from stable/aria2/3.0.5/README.md rename to stable/aria2/3.0.6/README.md diff --git a/stable/aria2/3.0.5/app-readme.md b/stable/aria2/3.0.6/app-readme.md similarity index 100% rename from stable/aria2/3.0.5/app-readme.md rename to stable/aria2/3.0.6/app-readme.md diff --git a/stable/audacity/2.0.24/charts/common-8.9.24.tgz b/stable/aria2/3.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/audacity/2.0.24/charts/common-8.9.24.tgz rename to stable/aria2/3.0.6/charts/common-8.9.24.tgz diff --git a/stable/aria2/3.0.5/helm-values.md b/stable/aria2/3.0.6/helm-values.md similarity index 100% rename from stable/aria2/3.0.5/helm-values.md rename to stable/aria2/3.0.6/helm-values.md diff --git a/stable/aria2/3.0.5/ix_values.yaml b/stable/aria2/3.0.6/ix_values.yaml similarity index 100% rename from stable/aria2/3.0.5/ix_values.yaml rename to stable/aria2/3.0.6/ix_values.yaml diff --git a/stable/aria2/3.0.5/questions.yaml b/stable/aria2/3.0.6/questions.yaml similarity index 99% rename from stable/aria2/3.0.5/questions.yaml rename to stable/aria2/3.0.6/questions.yaml index e91dc879ec5..9f8937f058e 100644 --- a/stable/aria2/3.0.5/questions.yaml +++ b/stable/aria2/3.0.6/questions.yaml @@ -212,13 +212,6 @@ questions: schema: type: int default: 568 - - variable: RPC_PORT - label: "RPC_PORT" - description: "Sets the RPC_PORT env var" - schema: - type: int - hidden: true - default: 6800 - variable: envList label: "Image environment" group: "Container Configuration" @@ -369,7 +362,6 @@ questions: schema: type: int default: 6800 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -463,19 +455,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 6888 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/aria2/3.0.5/security.md b/stable/aria2/3.0.6/security.md similarity index 100% rename from stable/aria2/3.0.5/security.md rename to stable/aria2/3.0.6/security.md diff --git a/stable/aria2/3.0.5/templates/common.yaml b/stable/aria2/3.0.6/templates/common.yaml similarity index 100% rename from stable/aria2/3.0.5/templates/common.yaml rename to stable/aria2/3.0.6/templates/common.yaml diff --git a/stable/audacity/2.0.24/values.yaml b/stable/aria2/3.0.6/values.yaml similarity index 100% rename from stable/audacity/2.0.24/values.yaml rename to stable/aria2/3.0.6/values.yaml diff --git a/stable/audacity/2.0.24/Chart.lock b/stable/audacity/2.0.24/Chart.lock deleted file mode 100644 index 838d0a20c59..00000000000 --- a/stable/audacity/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:19:58.574737854Z" diff --git a/stable/audacity/2.0.24/CHANGELOG.md b/stable/audacity/2.0.25/CHANGELOG.md similarity index 90% rename from stable/audacity/2.0.24/CHANGELOG.md rename to stable/audacity/2.0.25/CHANGELOG.md index 3f0cd64b403..b07d3101e1d 100644 --- a/stable/audacity/2.0.24/CHANGELOG.md +++ b/stable/audacity/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [audacity-2.0.25](https://github.com/truecharts/apps/compare/audacity-2.0.24...audacity-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [audacity-2.0.24](https://github.com/truecharts/apps/compare/audacity-2.0.23...audacity-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [audacity-2.0.16](https://github.com/truecharts/apps/compare/audacity-2.0.15...audacity-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [audacity-2.0.15](https://github.com/truecharts/apps/compare/audacity-2.0.14...audacity-2.0.15) (2021-12-04) diff --git a/stable/authelia/8.0.19/CONFIG.md b/stable/audacity/2.0.25/CONFIG.md similarity index 100% rename from stable/authelia/8.0.19/CONFIG.md rename to stable/audacity/2.0.25/CONFIG.md diff --git a/stable/audacity/2.0.25/Chart.lock b/stable/audacity/2.0.25/Chart.lock new file mode 100644 index 00000000000..1c572dab824 --- /dev/null +++ b/stable/audacity/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:06:55.133386919Z" diff --git a/stable/audacity/2.0.24/Chart.yaml b/stable/audacity/2.0.25/Chart.yaml similarity index 97% rename from stable/audacity/2.0.24/Chart.yaml rename to stable/audacity/2.0.25/Chart.yaml index 08f83bdbccd..2c998b38fae 100644 --- a/stable/audacity/2.0.24/Chart.yaml +++ b/stable/audacity/2.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-audacity - https://www.audacityteam.org/ type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/audacity/2.0.24/README.md b/stable/audacity/2.0.25/README.md similarity index 100% rename from stable/audacity/2.0.24/README.md rename to stable/audacity/2.0.25/README.md diff --git a/stable/audacity/2.0.24/app-readme.md b/stable/audacity/2.0.25/app-readme.md similarity index 100% rename from stable/audacity/2.0.24/app-readme.md rename to stable/audacity/2.0.25/app-readme.md diff --git a/stable/authelia/8.0.19/charts/common-8.9.24.tgz b/stable/audacity/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/authelia/8.0.19/charts/common-8.9.24.tgz rename to stable/audacity/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/audacity/2.0.24/helm-values.md b/stable/audacity/2.0.25/helm-values.md similarity index 100% rename from stable/audacity/2.0.24/helm-values.md rename to stable/audacity/2.0.25/helm-values.md diff --git a/stable/audacity/2.0.24/ix_values.yaml b/stable/audacity/2.0.25/ix_values.yaml similarity index 100% rename from stable/audacity/2.0.24/ix_values.yaml rename to stable/audacity/2.0.25/ix_values.yaml diff --git a/stable/audacity/2.0.24/questions.yaml b/stable/audacity/2.0.25/questions.yaml similarity index 99% rename from stable/audacity/2.0.24/questions.yaml rename to stable/audacity/2.0.25/questions.yaml index 8611caab6fe..98beaee45f1 100644 --- a/stable/audacity/2.0.24/questions.yaml +++ b/stable/audacity/2.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10032 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/audacity/2.0.24/security.md b/stable/audacity/2.0.25/security.md similarity index 100% rename from stable/audacity/2.0.24/security.md rename to stable/audacity/2.0.25/security.md diff --git a/stable/audacity/2.0.24/templates/common.yaml b/stable/audacity/2.0.25/templates/common.yaml similarity index 100% rename from stable/audacity/2.0.24/templates/common.yaml rename to stable/audacity/2.0.25/templates/common.yaml diff --git a/stable/authelia/8.0.19/values.yaml b/stable/audacity/2.0.25/values.yaml similarity index 100% rename from stable/authelia/8.0.19/values.yaml rename to stable/audacity/2.0.25/values.yaml diff --git a/stable/authelia/8.0.19/CHANGELOG.md b/stable/authelia/8.0.20/CHANGELOG.md similarity index 86% rename from stable/authelia/8.0.19/CHANGELOG.md rename to stable/authelia/8.0.20/CHANGELOG.md index 3624ecbaad9..69239d2c826 100644 --- a/stable/authelia/8.0.19/CHANGELOG.md +++ b/stable/authelia/8.0.20/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [authelia-8.0.20](https://github.com/truecharts/apps/compare/authelia-8.0.19...authelia-8.0.20) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [authelia-8.0.19](https://github.com/truecharts/apps/compare/authelia-8.0.18...authelia-8.0.19) (2021-12-19) @@ -86,14 +97,3 @@ * misc fixes * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [authelia-8.0.11](https://github.com/truecharts/apps/compare/authelia-8.0.10...authelia-8.0.11) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - diff --git a/stable/babybuddy/5.0.20/CONFIG.md b/stable/authelia/8.0.20/CONFIG.md similarity index 100% rename from stable/babybuddy/5.0.20/CONFIG.md rename to stable/authelia/8.0.20/CONFIG.md diff --git a/stable/authelia/8.0.19/Chart.lock b/stable/authelia/8.0.20/Chart.lock similarity index 87% rename from stable/authelia/8.0.19/Chart.lock rename to stable/authelia/8.0.20/Chart.lock index cae61701515..cbd00603390 100644 --- a/stable/authelia/8.0.19/Chart.lock +++ b/stable/authelia/8.0.20/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.39 digest: sha256:01843f2c545c6a303038b8d2e351b07b530d14b374c82c9677740cb6cf6752da -generated: "2021-12-19T18:20:02.479761679Z" +generated: "2021-12-19T23:07:20.001009377Z" diff --git a/stable/authelia/8.0.19/Chart.yaml b/stable/authelia/8.0.20/Chart.yaml similarity index 98% rename from stable/authelia/8.0.19/Chart.yaml rename to stable/authelia/8.0.20/Chart.yaml index 0c87a4a4f20..bf35be7e35b 100644 --- a/stable/authelia/8.0.19/Chart.yaml +++ b/stable/authelia/8.0.20/Chart.yaml @@ -38,7 +38,7 @@ sources: - https://github.com/authelia/chartrepo - https://github.com/authelia/authelia type: application -version: 8.0.19 +version: 8.0.20 annotations: truecharts.org/catagories: | - security diff --git a/stable/authelia/8.0.19/README.md b/stable/authelia/8.0.20/README.md similarity index 100% rename from stable/authelia/8.0.19/README.md rename to stable/authelia/8.0.20/README.md diff --git a/stable/authelia/8.0.19/app-readme.md b/stable/authelia/8.0.20/app-readme.md similarity index 100% rename from stable/authelia/8.0.19/app-readme.md rename to stable/authelia/8.0.20/app-readme.md diff --git a/stable/babybuddy/5.0.20/charts/common-8.9.24.tgz b/stable/authelia/8.0.20/charts/common-8.9.24.tgz similarity index 100% rename from stable/babybuddy/5.0.20/charts/common-8.9.24.tgz rename to stable/authelia/8.0.20/charts/common-8.9.24.tgz diff --git a/stable/authelia/8.0.19/charts/postgresql-6.0.34.tgz b/stable/authelia/8.0.20/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/authelia/8.0.19/charts/postgresql-6.0.34.tgz rename to stable/authelia/8.0.20/charts/postgresql-6.0.34.tgz diff --git a/stable/authelia/8.0.19/charts/redis-1.0.39.tgz b/stable/authelia/8.0.20/charts/redis-1.0.39.tgz similarity index 100% rename from stable/authelia/8.0.19/charts/redis-1.0.39.tgz rename to stable/authelia/8.0.20/charts/redis-1.0.39.tgz diff --git a/stable/authelia/8.0.19/helm-values.md b/stable/authelia/8.0.20/helm-values.md similarity index 100% rename from stable/authelia/8.0.19/helm-values.md rename to stable/authelia/8.0.20/helm-values.md diff --git a/stable/authelia/8.0.19/ix_values.yaml b/stable/authelia/8.0.20/ix_values.yaml similarity index 100% rename from stable/authelia/8.0.19/ix_values.yaml rename to stable/authelia/8.0.20/ix_values.yaml diff --git a/stable/authelia/8.0.19/questions.yaml b/stable/authelia/8.0.20/questions.yaml similarity index 99% rename from stable/authelia/8.0.19/questions.yaml rename to stable/authelia/8.0.20/questions.yaml index c97c689b701..00695f1fd22 100644 --- a/stable/authelia/8.0.19/questions.yaml +++ b/stable/authelia/8.0.20/questions.yaml @@ -1048,7 +1048,6 @@ questions: schema: type: int default: 9091 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -2575,12 +2574,6 @@ questions: schema: type: boolean default: false - - variable: minimum_parameter_entropy - label: "Minimum Parameter Entropy" - schema: - type: int - default: 8 - hidden: true - variable: clients label: "Clients" schema: diff --git a/stable/authelia/8.0.19/security.md b/stable/authelia/8.0.20/security.md similarity index 100% rename from stable/authelia/8.0.19/security.md rename to stable/authelia/8.0.20/security.md diff --git a/stable/authelia/8.0.19/templates/_configmap.tpl b/stable/authelia/8.0.20/templates/_configmap.tpl similarity index 100% rename from stable/authelia/8.0.19/templates/_configmap.tpl rename to stable/authelia/8.0.20/templates/_configmap.tpl diff --git a/stable/authelia/8.0.19/templates/_secrets.tpl b/stable/authelia/8.0.20/templates/_secrets.tpl similarity index 100% rename from stable/authelia/8.0.19/templates/_secrets.tpl rename to stable/authelia/8.0.20/templates/_secrets.tpl diff --git a/stable/authelia/8.0.19/templates/common.yaml b/stable/authelia/8.0.20/templates/common.yaml similarity index 100% rename from stable/authelia/8.0.19/templates/common.yaml rename to stable/authelia/8.0.20/templates/common.yaml diff --git a/stable/babybuddy/5.0.20/values.yaml b/stable/authelia/8.0.20/values.yaml similarity index 100% rename from stable/babybuddy/5.0.20/values.yaml rename to stable/authelia/8.0.20/values.yaml diff --git a/stable/babybuddy/5.0.20/CHANGELOG.md b/stable/babybuddy/5.0.21/CHANGELOG.md similarity index 88% rename from stable/babybuddy/5.0.20/CHANGELOG.md rename to stable/babybuddy/5.0.21/CHANGELOG.md index fe1e429d6be..dad0158a0cf 100644 --- a/stable/babybuddy/5.0.20/CHANGELOG.md +++ b/stable/babybuddy/5.0.21/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [babybuddy-5.0.21](https://github.com/truecharts/apps/compare/babybuddy-5.0.20...babybuddy-5.0.21) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [babybuddy-5.0.20](https://github.com/truecharts/apps/compare/babybuddy-5.0.19...babybuddy-5.0.20) (2021-12-19) @@ -86,14 +97,3 @@ * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - -### [babybuddy-5.0.12](https://github.com/truecharts/apps/compare/babybuddy-5.0.11...babybuddy-5.0.12) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - diff --git a/stable/bazarr/9.0.26/CONFIG.md b/stable/babybuddy/5.0.21/CONFIG.md similarity index 100% rename from stable/bazarr/9.0.26/CONFIG.md rename to stable/babybuddy/5.0.21/CONFIG.md diff --git a/stable/dsmr-reader/5.0.14/Chart.lock b/stable/babybuddy/5.0.21/Chart.lock similarity index 84% rename from stable/dsmr-reader/5.0.14/Chart.lock rename to stable/babybuddy/5.0.21/Chart.lock index d207f5f2251..be1f65c26a7 100644 --- a/stable/dsmr-reader/5.0.14/Chart.lock +++ b/stable/babybuddy/5.0.21/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:26:55.716097246Z" +generated: "2021-12-19T23:07:24.693646718Z" diff --git a/stable/babybuddy/5.0.20/Chart.yaml b/stable/babybuddy/5.0.21/Chart.yaml similarity index 98% rename from stable/babybuddy/5.0.20/Chart.yaml rename to stable/babybuddy/5.0.21/Chart.yaml index be54195b1f5..d2ed8ecb6af 100644 --- a/stable/babybuddy/5.0.20/Chart.yaml +++ b/stable/babybuddy/5.0.21/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 appVersion: "1.9.3" kubeVersion: '>=1.16.0-0' -version: 5.0.20 +version: 5.0.21 name: babybuddy description: Helps caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guess work. type: application diff --git a/stable/babybuddy/5.0.20/README.md b/stable/babybuddy/5.0.21/README.md similarity index 100% rename from stable/babybuddy/5.0.20/README.md rename to stable/babybuddy/5.0.21/README.md diff --git a/stable/babybuddy/5.0.20/app-readme.md b/stable/babybuddy/5.0.21/app-readme.md similarity index 100% rename from stable/babybuddy/5.0.20/app-readme.md rename to stable/babybuddy/5.0.21/app-readme.md diff --git a/stable/bazarr/9.0.26/charts/common-8.9.24.tgz b/stable/babybuddy/5.0.21/charts/common-8.9.24.tgz similarity index 100% rename from stable/bazarr/9.0.26/charts/common-8.9.24.tgz rename to stable/babybuddy/5.0.21/charts/common-8.9.24.tgz diff --git a/stable/babybuddy/5.0.20/charts/postgresql-6.0.34.tgz b/stable/babybuddy/5.0.21/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/babybuddy/5.0.20/charts/postgresql-6.0.34.tgz rename to stable/babybuddy/5.0.21/charts/postgresql-6.0.34.tgz diff --git a/stable/babybuddy/5.0.20/helm-values.md b/stable/babybuddy/5.0.21/helm-values.md similarity index 87% rename from stable/babybuddy/5.0.20/helm-values.md rename to stable/babybuddy/5.0.21/helm-values.md index bf79d8caeb7..a0dd85e83a0 100644 --- a/stable/babybuddy/5.0.20/helm-values.md +++ b/stable/babybuddy/5.0.21/helm-values.md @@ -11,11 +11,10 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| -| env | object | `{}` | | -| envTpl.DB_ENGINE | string | `"django.db.backends.postgresql"` | | -| envTpl.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DB_PORT | string | `"5432"` | | -| envTpl.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.DB_ENGINE | string | `"django.db.backends.postgresql"` | | +| env.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.DB_PORT | string | `"5432"` | | +| env.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/babybuddy/5.0.20/ix_values.yaml b/stable/babybuddy/5.0.21/ix_values.yaml similarity index 97% rename from stable/babybuddy/5.0.20/ix_values.yaml rename to stable/babybuddy/5.0.21/ix_values.yaml index ec4e9b1801e..50ff0ecf4ba 100644 --- a/stable/babybuddy/5.0.20/ix_values.yaml +++ b/stable/babybuddy/5.0.21/ix_values.yaml @@ -5,10 +5,7 @@ image: # See more environment variables in the babybuddy documentation # https://github.com/linuxserver/docker-babybuddy#parameters -env: {} - # TZ: - -envTpl: +env: DB_ENGINE: "django.db.backends.postgresql" DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/babybuddy/5.0.20/questions.yaml b/stable/babybuddy/5.0.21/questions.yaml similarity index 99% rename from stable/babybuddy/5.0.20/questions.yaml rename to stable/babybuddy/5.0.21/questions.yaml index ea9ea2f9256..b74b752d3a0 100644 --- a/stable/babybuddy/5.0.20/questions.yaml +++ b/stable/babybuddy/5.0.21/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10069 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/babybuddy/5.0.20/security.md b/stable/babybuddy/5.0.21/security.md similarity index 100% rename from stable/babybuddy/5.0.20/security.md rename to stable/babybuddy/5.0.21/security.md diff --git a/stable/babybuddy/5.0.20/templates/common.yaml b/stable/babybuddy/5.0.21/templates/common.yaml similarity index 100% rename from stable/babybuddy/5.0.20/templates/common.yaml rename to stable/babybuddy/5.0.21/templates/common.yaml diff --git a/stable/bazarr/9.0.26/values.yaml b/stable/babybuddy/5.0.21/values.yaml similarity index 100% rename from stable/bazarr/9.0.26/values.yaml rename to stable/babybuddy/5.0.21/values.yaml diff --git a/stable/bazarr/9.0.26/Chart.lock b/stable/bazarr/9.0.26/Chart.lock deleted file mode 100644 index 180089f0afe..00000000000 --- a/stable/bazarr/9.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:20:30.373984097Z" diff --git a/stable/bazarr/9.0.26/CHANGELOG.md b/stable/bazarr/9.0.27/CHANGELOG.md similarity index 90% rename from stable/bazarr/9.0.26/CHANGELOG.md rename to stable/bazarr/9.0.27/CHANGELOG.md index d260b6b27c9..f50f8dc7d42 100644 --- a/stable/bazarr/9.0.26/CHANGELOG.md +++ b/stable/bazarr/9.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [bazarr-9.0.27](https://github.com/truecharts/apps/compare/bazarr-9.0.26...bazarr-9.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [bazarr-9.0.26](https://github.com/truecharts/apps/compare/bazarr-9.0.25...bazarr-9.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [bazarr-9.0.18](https://github.com/truecharts/apps/compare/bazarr-9.0.17...bazarr-9.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [bazarr-9.0.17](https://github.com/truecharts/apps/compare/bazarr-9.0.16...bazarr-9.0.17) (2021-12-04) - diff --git a/stable/beets/2.0.27/CONFIG.md b/stable/bazarr/9.0.27/CONFIG.md similarity index 100% rename from stable/beets/2.0.27/CONFIG.md rename to stable/bazarr/9.0.27/CONFIG.md diff --git a/stable/bazarr/9.0.27/Chart.lock b/stable/bazarr/9.0.27/Chart.lock new file mode 100644 index 00000000000..ec7b3856ea9 --- /dev/null +++ b/stable/bazarr/9.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:07:29.954946508Z" diff --git a/stable/bazarr/9.0.26/Chart.yaml b/stable/bazarr/9.0.27/Chart.yaml similarity index 98% rename from stable/bazarr/9.0.26/Chart.yaml rename to stable/bazarr/9.0.27/Chart.yaml index ebd11c380da..802e3ebee19 100644 --- a/stable/bazarr/9.0.26/Chart.yaml +++ b/stable/bazarr/9.0.27/Chart.yaml @@ -26,7 +26,7 @@ sources: - https://github.com/morpheus65535/bazarr - https://hub.docker.com/r/linuxserver/bazarr type: application -version: 9.0.26 +version: 9.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/bazarr/9.0.26/README.md b/stable/bazarr/9.0.27/README.md similarity index 100% rename from stable/bazarr/9.0.26/README.md rename to stable/bazarr/9.0.27/README.md diff --git a/stable/bazarr/9.0.26/app-readme.md b/stable/bazarr/9.0.27/app-readme.md similarity index 100% rename from stable/bazarr/9.0.26/app-readme.md rename to stable/bazarr/9.0.27/app-readme.md diff --git a/stable/beets/2.0.27/charts/common-8.9.24.tgz b/stable/bazarr/9.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/beets/2.0.27/charts/common-8.9.24.tgz rename to stable/bazarr/9.0.27/charts/common-8.9.24.tgz diff --git a/stable/bazarr/9.0.26/helm-values.md b/stable/bazarr/9.0.27/helm-values.md similarity index 100% rename from stable/bazarr/9.0.26/helm-values.md rename to stable/bazarr/9.0.27/helm-values.md diff --git a/stable/bazarr/9.0.26/ix_values.yaml b/stable/bazarr/9.0.27/ix_values.yaml similarity index 100% rename from stable/bazarr/9.0.26/ix_values.yaml rename to stable/bazarr/9.0.27/ix_values.yaml diff --git a/stable/bazarr/9.0.26/questions.yaml b/stable/bazarr/9.0.27/questions.yaml similarity index 99% rename from stable/bazarr/9.0.26/questions.yaml rename to stable/bazarr/9.0.27/questions.yaml index a22c9f5e9b0..4075d3c8f1d 100644 --- a/stable/bazarr/9.0.26/questions.yaml +++ b/stable/bazarr/9.0.27/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 6767 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/bazarr/9.0.26/security.md b/stable/bazarr/9.0.27/security.md similarity index 100% rename from stable/bazarr/9.0.26/security.md rename to stable/bazarr/9.0.27/security.md diff --git a/stable/bazarr/9.0.26/templates/common.yaml b/stable/bazarr/9.0.27/templates/common.yaml similarity index 100% rename from stable/bazarr/9.0.26/templates/common.yaml rename to stable/bazarr/9.0.27/templates/common.yaml diff --git a/stable/beets/2.0.27/values.yaml b/stable/bazarr/9.0.27/values.yaml similarity index 100% rename from stable/beets/2.0.27/values.yaml rename to stable/bazarr/9.0.27/values.yaml diff --git a/stable/beets/2.0.27/Chart.lock b/stable/beets/2.0.27/Chart.lock deleted file mode 100644 index cc65af613d6..00000000000 --- a/stable/beets/2.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:20:46.839367846Z" diff --git a/stable/beets/2.0.27/CHANGELOG.md b/stable/beets/2.0.28/CHANGELOG.md similarity index 89% rename from stable/beets/2.0.27/CHANGELOG.md rename to stable/beets/2.0.28/CHANGELOG.md index 5a0170b98b1..1fdc9fe4fe3 100644 --- a/stable/beets/2.0.27/CHANGELOG.md +++ b/stable/beets/2.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [beets-2.0.28](https://github.com/truecharts/apps/compare/beets-2.0.27...beets-2.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [beets-2.0.27](https://github.com/truecharts/apps/compare/beets-2.0.26...beets-2.0.27) (2021-12-19) @@ -87,13 +97,3 @@ #### Fix * misc fixes -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [beets-2.0.19](https://github.com/truecharts/apps/compare/beets-2.0.18...beets-2.0.19) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) diff --git a/stable/blog/0.0.14/CONFIG.md b/stable/beets/2.0.28/CONFIG.md similarity index 100% rename from stable/blog/0.0.14/CONFIG.md rename to stable/beets/2.0.28/CONFIG.md diff --git a/stable/beets/2.0.28/Chart.lock b/stable/beets/2.0.28/Chart.lock new file mode 100644 index 00000000000..d2ec3d2a7d0 --- /dev/null +++ b/stable/beets/2.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:07:42.909266453Z" diff --git a/stable/beets/2.0.27/Chart.yaml b/stable/beets/2.0.28/Chart.yaml similarity index 97% rename from stable/beets/2.0.27/Chart.yaml rename to stable/beets/2.0.28/Chart.yaml index b6a6dd53dac..d73970f6133 100644 --- a/stable/beets/2.0.27/Chart.yaml +++ b/stable/beets/2.0.28/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-beets - https://beets.io/ type: application -version: 2.0.27 +version: 2.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/beets/2.0.27/README.md b/stable/beets/2.0.28/README.md similarity index 100% rename from stable/beets/2.0.27/README.md rename to stable/beets/2.0.28/README.md diff --git a/stable/beets/2.0.27/app-readme.md b/stable/beets/2.0.28/app-readme.md similarity index 100% rename from stable/beets/2.0.27/app-readme.md rename to stable/beets/2.0.28/app-readme.md diff --git a/stable/blog/0.0.14/charts/common-8.9.24.tgz b/stable/beets/2.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/blog/0.0.14/charts/common-8.9.24.tgz rename to stable/beets/2.0.28/charts/common-8.9.24.tgz diff --git a/stable/beets/2.0.27/helm-values.md b/stable/beets/2.0.28/helm-values.md similarity index 100% rename from stable/beets/2.0.27/helm-values.md rename to stable/beets/2.0.28/helm-values.md diff --git a/stable/beets/2.0.27/ix_values.yaml b/stable/beets/2.0.28/ix_values.yaml similarity index 100% rename from stable/beets/2.0.27/ix_values.yaml rename to stable/beets/2.0.28/ix_values.yaml diff --git a/stable/beets/2.0.27/questions.yaml b/stable/beets/2.0.28/questions.yaml similarity index 99% rename from stable/beets/2.0.27/questions.yaml rename to stable/beets/2.0.28/questions.yaml index 773d24b713c..a782c682773 100644 --- a/stable/beets/2.0.27/questions.yaml +++ b/stable/beets/2.0.28/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 8337 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/beets/2.0.27/security.md b/stable/beets/2.0.28/security.md similarity index 100% rename from stable/beets/2.0.27/security.md rename to stable/beets/2.0.28/security.md diff --git a/stable/beets/2.0.27/templates/common.yaml b/stable/beets/2.0.28/templates/common.yaml similarity index 100% rename from stable/beets/2.0.27/templates/common.yaml rename to stable/beets/2.0.28/templates/common.yaml diff --git a/stable/blog/0.0.14/values.yaml b/stable/beets/2.0.28/values.yaml similarity index 100% rename from stable/blog/0.0.14/values.yaml rename to stable/beets/2.0.28/values.yaml diff --git a/stable/blog/0.0.14/CHANGELOG.md b/stable/blog/0.0.15/CHANGELOG.md similarity index 92% rename from stable/blog/0.0.14/CHANGELOG.md rename to stable/blog/0.0.15/CHANGELOG.md index b5f29076dea..ebb89bc19f7 100644 --- a/stable/blog/0.0.14/CHANGELOG.md +++ b/stable/blog/0.0.15/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [blog-0.0.15](https://github.com/truecharts/apps/compare/blog-0.0.14...blog-0.0.15) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [blog-0.0.14](https://github.com/truecharts/apps/compare/blog-0.0.13...blog-0.0.14) (2021-12-19) @@ -88,12 +97,3 @@ ### [blog-0.0.6](https://github.com/truecharts/apps/compare/blog-0.0.5...blog-0.0.6) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [blog-0.0.5](https://github.com/truecharts/apps/compare/blog-0.0.4...blog-0.0.5) (2021-12-04) - diff --git a/stable/boinc/0.0.5/CONFIG.md b/stable/blog/0.0.15/CONFIG.md similarity index 100% rename from stable/boinc/0.0.5/CONFIG.md rename to stable/blog/0.0.15/CONFIG.md diff --git a/stable/etherpad/5.0.15/Chart.lock b/stable/blog/0.0.15/Chart.lock similarity index 84% rename from stable/etherpad/5.0.15/Chart.lock rename to stable/blog/0.0.15/Chart.lock index d4f56dd2857..7e4e17de58b 100644 --- a/stable/etherpad/5.0.15/Chart.lock +++ b/stable/blog/0.0.15/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:27:47.191294748Z" +generated: "2021-12-19T23:08:02.963508369Z" diff --git a/stable/blog/0.0.14/Chart.yaml b/stable/blog/0.0.15/Chart.yaml similarity index 98% rename from stable/blog/0.0.14/Chart.yaml rename to stable/blog/0.0.15/Chart.yaml index 97ceb30b985..315e291f944 100644 --- a/stable/blog/0.0.14/Chart.yaml +++ b/stable/blog/0.0.15/Chart.yaml @@ -26,7 +26,7 @@ name: blog sources: - https://github.com/m1k1o/blog - https://github.com/nicholaswilde/docker-blog -version: 0.0.14 +version: 0.0.15 annotations: truecharts.org/catagories: | - hosting diff --git a/stable/blog/0.0.14/README.md b/stable/blog/0.0.15/README.md similarity index 100% rename from stable/blog/0.0.14/README.md rename to stable/blog/0.0.15/README.md diff --git a/stable/blog/0.0.14/app-readme.md b/stable/blog/0.0.15/app-readme.md similarity index 100% rename from stable/blog/0.0.14/app-readme.md rename to stable/blog/0.0.15/app-readme.md diff --git a/stable/boinc/0.0.5/charts/common-8.9.24.tgz b/stable/blog/0.0.15/charts/common-8.9.24.tgz similarity index 100% rename from stable/boinc/0.0.5/charts/common-8.9.24.tgz rename to stable/blog/0.0.15/charts/common-8.9.24.tgz diff --git a/stable/blog/0.0.14/charts/postgresql-6.0.34.tgz b/stable/blog/0.0.15/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/blog/0.0.14/charts/postgresql-6.0.34.tgz rename to stable/blog/0.0.15/charts/postgresql-6.0.34.tgz diff --git a/stable/blog/0.0.14/helm-values.md b/stable/blog/0.0.15/helm-values.md similarity index 100% rename from stable/blog/0.0.14/helm-values.md rename to stable/blog/0.0.15/helm-values.md diff --git a/stable/blog/0.0.14/ix_values.yaml b/stable/blog/0.0.15/ix_values.yaml similarity index 100% rename from stable/blog/0.0.14/ix_values.yaml rename to stable/blog/0.0.15/ix_values.yaml diff --git a/stable/blog/0.0.14/questions.yaml b/stable/blog/0.0.15/questions.yaml similarity index 100% rename from stable/blog/0.0.14/questions.yaml rename to stable/blog/0.0.15/questions.yaml diff --git a/stable/blog/0.0.14/security.md b/stable/blog/0.0.15/security.md similarity index 100% rename from stable/blog/0.0.14/security.md rename to stable/blog/0.0.15/security.md diff --git a/stable/blog/0.0.14/templates/common.yaml b/stable/blog/0.0.15/templates/common.yaml similarity index 100% rename from stable/blog/0.0.14/templates/common.yaml rename to stable/blog/0.0.15/templates/common.yaml diff --git a/stable/boinc/0.0.5/values.yaml b/stable/blog/0.0.15/values.yaml similarity index 100% rename from stable/boinc/0.0.5/values.yaml rename to stable/blog/0.0.15/values.yaml diff --git a/stable/boinc/0.0.5/Chart.lock b/stable/boinc/0.0.5/Chart.lock deleted file mode 100644 index 169cbffa3c8..00000000000 --- a/stable/boinc/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:21:10.070037397Z" diff --git a/stable/boinc/0.0.5/CHANGELOG.md b/stable/boinc/0.0.6/CHANGELOG.md similarity index 86% rename from stable/boinc/0.0.5/CHANGELOG.md rename to stable/boinc/0.0.6/CHANGELOG.md index 79c4778a3d6..b5561527e59 100644 --- a/stable/boinc/0.0.5/CHANGELOG.md +++ b/stable/boinc/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [boinc-0.0.6](https://github.com/truecharts/apps/compare/boinc-0.0.5...boinc-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [boinc-0.0.5](https://github.com/truecharts/apps/compare/boinc-0.0.4...boinc-0.0.5) (2021-12-19) diff --git a/stable/booksonic-air/4.0.26/CONFIG.md b/stable/boinc/0.0.6/CONFIG.md similarity index 100% rename from stable/booksonic-air/4.0.26/CONFIG.md rename to stable/boinc/0.0.6/CONFIG.md diff --git a/stable/boinc/0.0.6/Chart.lock b/stable/boinc/0.0.6/Chart.lock new file mode 100644 index 00000000000..56217924d9e --- /dev/null +++ b/stable/boinc/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:08:14.178059002Z" diff --git a/stable/boinc/0.0.5/Chart.yaml b/stable/boinc/0.0.6/Chart.yaml similarity index 98% rename from stable/boinc/0.0.5/Chart.yaml rename to stable/boinc/0.0.6/Chart.yaml index a1c402e6481..4f70e430ac1 100644 --- a/stable/boinc/0.0.5/Chart.yaml +++ b/stable/boinc/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: boinc -version: 0.0.5 +version: 0.0.6 appVersion: "18.04.1" description: BOINC is a platform for high-throughput computing on a large scale (thousands or millions of computers). type: application diff --git a/stable/boinc/0.0.5/README.md b/stable/boinc/0.0.6/README.md similarity index 100% rename from stable/boinc/0.0.5/README.md rename to stable/boinc/0.0.6/README.md diff --git a/stable/boinc/0.0.5/app-readme.md b/stable/boinc/0.0.6/app-readme.md similarity index 100% rename from stable/boinc/0.0.5/app-readme.md rename to stable/boinc/0.0.6/app-readme.md diff --git a/stable/booksonic-air/4.0.26/charts/common-8.9.24.tgz b/stable/boinc/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/booksonic-air/4.0.26/charts/common-8.9.24.tgz rename to stable/boinc/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/boinc/0.0.5/helm-values.md b/stable/boinc/0.0.6/helm-values.md similarity index 100% rename from stable/boinc/0.0.5/helm-values.md rename to stable/boinc/0.0.6/helm-values.md diff --git a/stable/boinc/0.0.5/ix_values.yaml b/stable/boinc/0.0.6/ix_values.yaml similarity index 100% rename from stable/boinc/0.0.5/ix_values.yaml rename to stable/boinc/0.0.6/ix_values.yaml diff --git a/stable/boinc/0.0.5/questions.yaml b/stable/boinc/0.0.6/questions.yaml similarity index 100% rename from stable/boinc/0.0.5/questions.yaml rename to stable/boinc/0.0.6/questions.yaml diff --git a/stable/boinc/0.0.5/security.md b/stable/boinc/0.0.6/security.md similarity index 100% rename from stable/boinc/0.0.5/security.md rename to stable/boinc/0.0.6/security.md diff --git a/stable/boinc/0.0.5/templates/common.yaml b/stable/boinc/0.0.6/templates/common.yaml similarity index 100% rename from stable/boinc/0.0.5/templates/common.yaml rename to stable/boinc/0.0.6/templates/common.yaml diff --git a/stable/booksonic-air/4.0.26/values.yaml b/stable/boinc/0.0.6/values.yaml similarity index 100% rename from stable/booksonic-air/4.0.26/values.yaml rename to stable/boinc/0.0.6/values.yaml diff --git a/stable/booksonic-air/4.0.26/Chart.lock b/stable/booksonic-air/4.0.26/Chart.lock deleted file mode 100644 index 58c5fd0a031..00000000000 --- a/stable/booksonic-air/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:21:33.161753553Z" diff --git a/stable/booksonic-air/4.0.26/CHANGELOG.md b/stable/booksonic-air/4.0.27/CHANGELOG.md similarity index 90% rename from stable/booksonic-air/4.0.26/CHANGELOG.md rename to stable/booksonic-air/4.0.27/CHANGELOG.md index a9c27b67963..43db4152746 100644 --- a/stable/booksonic-air/4.0.26/CHANGELOG.md +++ b/stable/booksonic-air/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [booksonic-air-4.0.27](https://github.com/truecharts/apps/compare/booksonic-air-4.0.26...booksonic-air-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [booksonic-air-4.0.26](https://github.com/truecharts/apps/compare/booksonic-air-4.0.25...booksonic-air-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ - -### [booksonic-air-4.0.18](https://github.com/truecharts/apps/compare/booksonic-air-4.0.17...booksonic-air-4.0.18) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - diff --git a/stable/bookstack/0.0.14/CONFIG.md b/stable/booksonic-air/4.0.27/CONFIG.md similarity index 100% rename from stable/bookstack/0.0.14/CONFIG.md rename to stable/booksonic-air/4.0.27/CONFIG.md diff --git a/stable/booksonic-air/4.0.27/Chart.lock b/stable/booksonic-air/4.0.27/Chart.lock new file mode 100644 index 00000000000..db2e57a8d15 --- /dev/null +++ b/stable/booksonic-air/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:08:21.651456059Z" diff --git a/stable/booksonic-air/4.0.26/Chart.yaml b/stable/booksonic-air/4.0.27/Chart.yaml similarity index 97% rename from stable/booksonic-air/4.0.26/Chart.yaml rename to stable/booksonic-air/4.0.27/Chart.yaml index 341555618a0..6db19bc3b70 100644 --- a/stable/booksonic-air/4.0.26/Chart.yaml +++ b/stable/booksonic-air/4.0.27/Chart.yaml @@ -20,7 +20,7 @@ name: booksonic-air sources: - https://github.com/popeen/Booksonic-Air - https://hub.docker.com/r/linuxserver/booksonic-air -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/booksonic-air/4.0.26/README.md b/stable/booksonic-air/4.0.27/README.md similarity index 100% rename from stable/booksonic-air/4.0.26/README.md rename to stable/booksonic-air/4.0.27/README.md diff --git a/stable/booksonic-air/4.0.26/app-readme.md b/stable/booksonic-air/4.0.27/app-readme.md similarity index 100% rename from stable/booksonic-air/4.0.26/app-readme.md rename to stable/booksonic-air/4.0.27/app-readme.md diff --git a/stable/bookstack/0.0.14/charts/common-8.9.24.tgz b/stable/booksonic-air/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/bookstack/0.0.14/charts/common-8.9.24.tgz rename to stable/booksonic-air/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/booksonic-air/4.0.26/helm-values.md b/stable/booksonic-air/4.0.27/helm-values.md similarity index 100% rename from stable/booksonic-air/4.0.26/helm-values.md rename to stable/booksonic-air/4.0.27/helm-values.md diff --git a/stable/booksonic-air/4.0.26/ix_values.yaml b/stable/booksonic-air/4.0.27/ix_values.yaml similarity index 100% rename from stable/booksonic-air/4.0.26/ix_values.yaml rename to stable/booksonic-air/4.0.27/ix_values.yaml diff --git a/stable/booksonic-air/4.0.26/questions.yaml b/stable/booksonic-air/4.0.27/questions.yaml similarity index 99% rename from stable/booksonic-air/4.0.26/questions.yaml rename to stable/booksonic-air/4.0.27/questions.yaml index f7246ce7de8..99f5af0910c 100644 --- a/stable/booksonic-air/4.0.26/questions.yaml +++ b/stable/booksonic-air/4.0.27/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10048 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/booksonic-air/4.0.26/security.md b/stable/booksonic-air/4.0.27/security.md similarity index 99% rename from stable/booksonic-air/4.0.26/security.md rename to stable/booksonic-air/4.0.27/security.md index e7d130380ef..5c6a0e66935 100644 --- a/stable/booksonic-air/4.0.26/security.md +++ b/stable/booksonic-air/4.0.27/security.md @@ -728,7 +728,7 @@ hide: | org.apache.ant:ant | CVE-2021-36374 | MEDIUM | 1.10.5 | 1.9.16, 1.10.11 |
Expand...https://ant.apache.org/security.html
https://github.com/advisories/GHSA-5v34-g2px-j4fw
https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E
https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E
https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E
https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E
https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-36374
https://security.netapp.com/advisory/ntap-20210819-0007/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.12 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.13.2 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
http://www.openwall.com/lists/oss-security/2021/12/13/1
http://www.openwall.com/lists/oss-security/2021/12/13/2
http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://issues.apache.org/jira/browse/LOG4J2-3214
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://twitter.com/kurtseifried/status/1469345530182455296
https://ubuntu.com/security/notices/USN-5192-1
https://ubuntu.com/security/notices/USN-5192-2
https://ubuntu.com/security/notices/USN-5197-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell
https://www.debian.org/security/2021/dsa-5020
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.13.2 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.13.2 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.logging.log4j:log4j-api | CVE-2021-45046 | LOW | 2.13.2 | 2.16.0 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://access.redhat.com/security/cve/CVE-2021-44228
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5197-1
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.cve.org/CVERecord?id=CVE-2021-45046
https://www.debian.org/security/2021/dsa-5022
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.openwall.com/lists/oss-security/2021/12/14/4
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-17527 | HIGH | 9.0.37 | 8.5.60, 9.0.40, 10.0.2 |
Expand...http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40
http://www.openwall.com/lists/oss-security/2020/12/03/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527
https://github.com/apache/tomcat/commit/21e3408671aac7e0d7e264e720cac8b1b189eb29 (8.5.60)
https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65 (9.0.40)
https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd5babd13d7a350b369b2f647b4dd32ce678af42f9aba5389df1ae6ca@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17527
https://security.gentoo.org/glsa/202012-23
https://security.netapp.com/advisory/ntap-20201210-0003/
https://www.debian.org/security/2021/dsa-4835
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | HIGH | 9.0.37 | 8.5.63, 9.0.43, 10.0.2 |
Expand...http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/1
https://github.com/advisories/GHSA-j39c-c8hj-x4j3
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25122
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://www.debian.org/security/2021/dsa-4891
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/booksonic-air/4.0.26/templates/common.yaml b/stable/booksonic-air/4.0.27/templates/common.yaml similarity index 100% rename from stable/booksonic-air/4.0.26/templates/common.yaml rename to stable/booksonic-air/4.0.27/templates/common.yaml diff --git a/stable/bookstack/0.0.14/values.yaml b/stable/booksonic-air/4.0.27/values.yaml similarity index 100% rename from stable/bookstack/0.0.14/values.yaml rename to stable/booksonic-air/4.0.27/values.yaml diff --git a/stable/bookstack/0.0.14/CHANGELOG.md b/stable/bookstack/0.0.15/CHANGELOG.md similarity index 94% rename from stable/bookstack/0.0.14/CHANGELOG.md rename to stable/bookstack/0.0.15/CHANGELOG.md index f63354a5f1b..f103148535c 100644 --- a/stable/bookstack/0.0.14/CHANGELOG.md +++ b/stable/bookstack/0.0.15/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [bookstack-0.0.15](https://github.com/truecharts/apps/compare/bookstack-0.0.14...bookstack-0.0.15) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [bookstack-0.0.14](https://github.com/truecharts/apps/compare/bookstack-0.0.13...bookstack-0.0.14) (2021-12-19) @@ -88,12 +97,3 @@ -### [bookstack-0.0.6](https://github.com/truecharts/apps/compare/bookstack-0.0.5...bookstack-0.0.6) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - diff --git a/stable/calibre-web/9.0.24/CONFIG.md b/stable/bookstack/0.0.15/CONFIG.md similarity index 100% rename from stable/calibre-web/9.0.24/CONFIG.md rename to stable/bookstack/0.0.15/CONFIG.md diff --git a/stable/bookstack/0.0.14/Chart.lock b/stable/bookstack/0.0.15/Chart.lock similarity index 84% rename from stable/bookstack/0.0.14/Chart.lock rename to stable/bookstack/0.0.15/Chart.lock index 8b184383471..032fee8bf90 100644 --- a/stable/bookstack/0.0.14/Chart.lock +++ b/stable/bookstack/0.0.15/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.37 digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:21:33.379359482Z" +generated: "2021-12-19T23:08:38.073046694Z" diff --git a/stable/bookstack/0.0.14/Chart.yaml b/stable/bookstack/0.0.15/Chart.yaml similarity index 98% rename from stable/bookstack/0.0.14/Chart.yaml rename to stable/bookstack/0.0.15/Chart.yaml index b8733814900..2c91ea1030e 100644 --- a/stable/bookstack/0.0.14/Chart.yaml +++ b/stable/bookstack/0.0.15/Chart.yaml @@ -27,7 +27,7 @@ name: bookstack sources: - https://www.bookstackapp.com/ - https://hub.docker.com/r/linuxserver/bookstack -version: 0.0.14 +version: 0.0.15 annotations: truecharts.org/catagories: | - media diff --git a/stable/bookstack/0.0.14/README.md b/stable/bookstack/0.0.15/README.md similarity index 100% rename from stable/bookstack/0.0.14/README.md rename to stable/bookstack/0.0.15/README.md diff --git a/stable/bookstack/0.0.14/app-readme.md b/stable/bookstack/0.0.15/app-readme.md similarity index 100% rename from stable/bookstack/0.0.14/app-readme.md rename to stable/bookstack/0.0.15/app-readme.md diff --git a/stable/calibre-web/9.0.24/charts/common-8.9.24.tgz b/stable/bookstack/0.0.15/charts/common-8.9.24.tgz similarity index 100% rename from stable/calibre-web/9.0.24/charts/common-8.9.24.tgz rename to stable/bookstack/0.0.15/charts/common-8.9.24.tgz diff --git a/stable/bookstack/0.0.14/charts/mariadb-1.0.37.tgz b/stable/bookstack/0.0.15/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/bookstack/0.0.14/charts/mariadb-1.0.37.tgz rename to stable/bookstack/0.0.15/charts/mariadb-1.0.37.tgz diff --git a/stable/bookstack/0.0.14/helm-values.md b/stable/bookstack/0.0.15/helm-values.md similarity index 100% rename from stable/bookstack/0.0.14/helm-values.md rename to stable/bookstack/0.0.15/helm-values.md diff --git a/stable/bookstack/0.0.14/ix_values.yaml b/stable/bookstack/0.0.15/ix_values.yaml similarity index 100% rename from stable/bookstack/0.0.14/ix_values.yaml rename to stable/bookstack/0.0.15/ix_values.yaml diff --git a/stable/bookstack/0.0.14/questions.yaml b/stable/bookstack/0.0.15/questions.yaml similarity index 100% rename from stable/bookstack/0.0.14/questions.yaml rename to stable/bookstack/0.0.15/questions.yaml diff --git a/stable/bookstack/0.0.14/security.md b/stable/bookstack/0.0.15/security.md similarity index 99% rename from stable/bookstack/0.0.14/security.md rename to stable/bookstack/0.0.15/security.md index 973215ed1d9..9633141164f 100644 --- a/stable/bookstack/0.0.14/security.md +++ b/stable/bookstack/0.0.15/security.md @@ -102,7 +102,7 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | laravel/framework | CVE-2021-43808 | MEDIUM | v8.70.2 | 6.20.42, 7.30.6, 8.75.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43808
https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| -| symfony/http-kernel | CVE-2021-41267 | MEDIUM | v5.3.10 | 5.3.12, 5.3.0 |
Expand...https://github.com/advisories/GHSA-q3j3-w37x-hq2q
https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487
https://github.com/symfony/symfony/pull/44243
https://github.com/symfony/symfony/releases/tag/v5.3.12
https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q
https://nvd.nist.gov/vuln/detail/CVE-2021-41267
https://symfony.com/cve-2021-41267
| +| symfony/http-kernel | CVE-2021-41267 | MEDIUM | v5.3.10 | 5.3.0, 5.3.12 |
Expand...https://github.com/advisories/GHSA-q3j3-w37x-hq2q
https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487
https://github.com/symfony/symfony/pull/44243
https://github.com/symfony/symfony/releases/tag/v5.3.12
https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q
https://nvd.nist.gov/vuln/detail/CVE-2021-41267
https://symfony.com/cve-2021-41267
| #### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) diff --git a/stable/bookstack/0.0.14/templates/common.yaml b/stable/bookstack/0.0.15/templates/common.yaml similarity index 100% rename from stable/bookstack/0.0.14/templates/common.yaml rename to stable/bookstack/0.0.15/templates/common.yaml diff --git a/stable/calibre-web/9.0.24/values.yaml b/stable/bookstack/0.0.15/values.yaml similarity index 100% rename from stable/calibre-web/9.0.24/values.yaml rename to stable/bookstack/0.0.15/values.yaml diff --git a/stable/calibre-web/9.0.24/Chart.lock b/stable/calibre-web/9.0.24/Chart.lock deleted file mode 100644 index b40d4559f25..00000000000 --- a/stable/calibre-web/9.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:21:50.045643167Z" diff --git a/stable/calibre-web/9.0.24/CHANGELOG.md b/stable/calibre-web/9.0.25/CHANGELOG.md similarity index 90% rename from stable/calibre-web/9.0.24/CHANGELOG.md rename to stable/calibre-web/9.0.25/CHANGELOG.md index fa800f73c06..df0bd5108ac 100644 --- a/stable/calibre-web/9.0.24/CHANGELOG.md +++ b/stable/calibre-web/9.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [calibre-web-9.0.25](https://github.com/truecharts/apps/compare/calibre-web-9.0.24...calibre-web-9.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [calibre-web-9.0.24](https://github.com/truecharts/apps/compare/calibre-web-9.0.23...calibre-web-9.0.24) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - -### [calibre-web-9.0.16](https://github.com/truecharts/apps/compare/calibre-web-9.0.15...calibre-web-9.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - diff --git a/stable/calibre/5.0.5/CONFIG.md b/stable/calibre-web/9.0.25/CONFIG.md similarity index 100% rename from stable/calibre/5.0.5/CONFIG.md rename to stable/calibre-web/9.0.25/CONFIG.md diff --git a/stable/calibre-web/9.0.25/Chart.lock b/stable/calibre-web/9.0.25/Chart.lock new file mode 100644 index 00000000000..18292ad5fc5 --- /dev/null +++ b/stable/calibre-web/9.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:08:40.169852962Z" diff --git a/stable/calibre-web/9.0.24/Chart.yaml b/stable/calibre-web/9.0.25/Chart.yaml similarity index 98% rename from stable/calibre-web/9.0.24/Chart.yaml rename to stable/calibre-web/9.0.25/Chart.yaml index 95b84509132..0f71ac1a4ed 100644 --- a/stable/calibre-web/9.0.24/Chart.yaml +++ b/stable/calibre-web/9.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://hub.docker.com/r/linuxserver/calibre-web/ - https://github.com/janeczku/calibre-web type: application -version: 9.0.24 +version: 9.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/calibre-web/9.0.24/README.md b/stable/calibre-web/9.0.25/README.md similarity index 100% rename from stable/calibre-web/9.0.24/README.md rename to stable/calibre-web/9.0.25/README.md diff --git a/stable/calibre-web/9.0.24/app-readme.md b/stable/calibre-web/9.0.25/app-readme.md similarity index 100% rename from stable/calibre-web/9.0.24/app-readme.md rename to stable/calibre-web/9.0.25/app-readme.md diff --git a/stable/calibre/5.0.5/charts/common-8.9.24.tgz b/stable/calibre-web/9.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/calibre/5.0.5/charts/common-8.9.24.tgz rename to stable/calibre-web/9.0.25/charts/common-8.9.24.tgz diff --git a/stable/calibre-web/9.0.24/helm-values.md b/stable/calibre-web/9.0.25/helm-values.md similarity index 100% rename from stable/calibre-web/9.0.24/helm-values.md rename to stable/calibre-web/9.0.25/helm-values.md diff --git a/stable/calibre-web/9.0.24/ix_values.yaml b/stable/calibre-web/9.0.25/ix_values.yaml similarity index 100% rename from stable/calibre-web/9.0.24/ix_values.yaml rename to stable/calibre-web/9.0.25/ix_values.yaml diff --git a/stable/calibre-web/9.0.24/questions.yaml b/stable/calibre-web/9.0.25/questions.yaml similarity index 99% rename from stable/calibre-web/9.0.24/questions.yaml rename to stable/calibre-web/9.0.25/questions.yaml index 98ec425ed9a..75d473590b7 100644 --- a/stable/calibre-web/9.0.24/questions.yaml +++ b/stable/calibre-web/9.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 8083 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/calibre-web/9.0.24/security.md b/stable/calibre-web/9.0.25/security.md similarity index 100% rename from stable/calibre-web/9.0.24/security.md rename to stable/calibre-web/9.0.25/security.md diff --git a/stable/calibre-web/9.0.24/templates/common.yaml b/stable/calibre-web/9.0.25/templates/common.yaml similarity index 100% rename from stable/calibre-web/9.0.24/templates/common.yaml rename to stable/calibre-web/9.0.25/templates/common.yaml diff --git a/stable/calibre/5.0.5/values.yaml b/stable/calibre-web/9.0.25/values.yaml similarity index 100% rename from stable/calibre/5.0.5/values.yaml rename to stable/calibre-web/9.0.25/values.yaml diff --git a/stable/calibre/5.0.5/Chart.lock b/stable/calibre/5.0.5/Chart.lock deleted file mode 100644 index 552d40748ab..00000000000 --- a/stable/calibre/5.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:22:24.561561653Z" diff --git a/stable/calibre/5.0.5/CHANGELOG.md b/stable/calibre/5.0.6/CHANGELOG.md similarity index 86% rename from stable/calibre/5.0.5/CHANGELOG.md rename to stable/calibre/5.0.6/CHANGELOG.md index db8bfff6732..116567ba04f 100644 --- a/stable/calibre/5.0.5/CHANGELOG.md +++ b/stable/calibre/5.0.6/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [calibre-5.0.6](https://github.com/truecharts/apps/compare/calibre-5.0.5...calibre-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [calibre-5.0.5](https://github.com/truecharts/apps/compare/calibre-5.0.4...calibre-5.0.5) (2021-12-19) @@ -86,14 +97,3 @@ #### Fix * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [calibre-4.0.20](https://github.com/truecharts/apps/compare/calibre-web-9.0.16...calibre-4.0.20) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - diff --git a/stable/chevereto/0.0.6/CONFIG.md b/stable/calibre/5.0.6/CONFIG.md similarity index 100% rename from stable/chevereto/0.0.6/CONFIG.md rename to stable/calibre/5.0.6/CONFIG.md diff --git a/stable/calibre/5.0.6/Chart.lock b/stable/calibre/5.0.6/Chart.lock new file mode 100644 index 00000000000..f03a7fed2dd --- /dev/null +++ b/stable/calibre/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:08:52.195677311Z" diff --git a/stable/calibre/5.0.5/Chart.yaml b/stable/calibre/5.0.6/Chart.yaml similarity index 97% rename from stable/calibre/5.0.5/Chart.yaml rename to stable/calibre/5.0.6/Chart.yaml index eba9c49eddd..053c356bf9b 100644 --- a/stable/calibre/5.0.5/Chart.yaml +++ b/stable/calibre/5.0.6/Chart.yaml @@ -18,7 +18,7 @@ name: calibre sources: - https://hub.docker.com/r/linuxserver/calibre/ - https://github.com/kovidgoyal/calibre/ -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/calibre/5.0.5/README.md b/stable/calibre/5.0.6/README.md similarity index 100% rename from stable/calibre/5.0.5/README.md rename to stable/calibre/5.0.6/README.md diff --git a/stable/calibre/5.0.5/app-readme.md b/stable/calibre/5.0.6/app-readme.md similarity index 100% rename from stable/calibre/5.0.5/app-readme.md rename to stable/calibre/5.0.6/app-readme.md diff --git a/stable/chevereto/0.0.6/charts/common-8.9.24.tgz b/stable/calibre/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/chevereto/0.0.6/charts/common-8.9.24.tgz rename to stable/calibre/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/calibre/5.0.5/helm-values.md b/stable/calibre/5.0.6/helm-values.md similarity index 100% rename from stable/calibre/5.0.5/helm-values.md rename to stable/calibre/5.0.6/helm-values.md diff --git a/stable/calibre/5.0.5/ix_values.yaml b/stable/calibre/5.0.6/ix_values.yaml similarity index 100% rename from stable/calibre/5.0.5/ix_values.yaml rename to stable/calibre/5.0.6/ix_values.yaml diff --git a/stable/calibre/5.0.5/questions.yaml b/stable/calibre/5.0.6/questions.yaml similarity index 99% rename from stable/calibre/5.0.5/questions.yaml rename to stable/calibre/5.0.6/questions.yaml index fa95d621b96..d4e069c8707 100644 --- a/stable/calibre/5.0.5/questions.yaml +++ b/stable/calibre/5.0.6/questions.yaml @@ -374,7 +374,6 @@ questions: schema: type: int default: 10080 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -468,19 +467,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8081 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/calibre/5.0.5/security.md b/stable/calibre/5.0.6/security.md similarity index 100% rename from stable/calibre/5.0.5/security.md rename to stable/calibre/5.0.6/security.md diff --git a/stable/calibre/5.0.5/templates/common.yaml b/stable/calibre/5.0.6/templates/common.yaml similarity index 100% rename from stable/calibre/5.0.5/templates/common.yaml rename to stable/calibre/5.0.6/templates/common.yaml diff --git a/stable/chevereto/0.0.6/values.yaml b/stable/calibre/5.0.6/values.yaml similarity index 100% rename from stable/chevereto/0.0.6/values.yaml rename to stable/calibre/5.0.6/values.yaml diff --git a/stable/chevereto/0.0.6/CHANGELOG.md b/stable/chevereto/0.0.7/CHANGELOG.md similarity index 88% rename from stable/chevereto/0.0.6/CHANGELOG.md rename to stable/chevereto/0.0.7/CHANGELOG.md index 05a5f53c884..a7dbb39fb4b 100644 --- a/stable/chevereto/0.0.6/CHANGELOG.md +++ b/stable/chevereto/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [chevereto-0.0.7](https://github.com/truecharts/apps/compare/chevereto-0.0.6...chevereto-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [chevereto-0.0.6](https://github.com/truecharts/apps/compare/chevereto-0.0.5...chevereto-0.0.6) (2021-12-19) diff --git a/stable/clarkson/0.0.15/CONFIG.md b/stable/chevereto/0.0.7/CONFIG.md similarity index 100% rename from stable/clarkson/0.0.15/CONFIG.md rename to stable/chevereto/0.0.7/CONFIG.md diff --git a/stable/chevereto/0.0.6/Chart.lock b/stable/chevereto/0.0.7/Chart.lock similarity index 84% rename from stable/chevereto/0.0.6/Chart.lock rename to stable/chevereto/0.0.7/Chart.lock index 555745daab3..24673d67844 100644 --- a/stable/chevereto/0.0.6/Chart.lock +++ b/stable/chevereto/0.0.7/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.37 digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:22:28.376301983Z" +generated: "2021-12-19T23:09:05.409550899Z" diff --git a/stable/chevereto/0.0.6/Chart.yaml b/stable/chevereto/0.0.7/Chart.yaml similarity index 98% rename from stable/chevereto/0.0.6/Chart.yaml rename to stable/chevereto/0.0.7/Chart.yaml index af3388c38cf..eee3520bb02 100644 --- a/stable/chevereto/0.0.6/Chart.yaml +++ b/stable/chevereto/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: chevereto -version: 0.0.6 +version: 0.0.7 appVersion: "1.6.0" description: Chevereto is an image hosting software that allows you to create a beautiful and full-featured image hosting website on your own server. type: application diff --git a/stable/chevereto/0.0.6/README.md b/stable/chevereto/0.0.7/README.md similarity index 100% rename from stable/chevereto/0.0.6/README.md rename to stable/chevereto/0.0.7/README.md diff --git a/stable/chevereto/0.0.6/app-readme.md b/stable/chevereto/0.0.7/app-readme.md similarity index 100% rename from stable/chevereto/0.0.6/app-readme.md rename to stable/chevereto/0.0.7/app-readme.md diff --git a/stable/clarkson/0.0.15/charts/common-8.9.24.tgz b/stable/chevereto/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/clarkson/0.0.15/charts/common-8.9.24.tgz rename to stable/chevereto/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/chevereto/0.0.6/charts/mariadb-1.0.37.tgz b/stable/chevereto/0.0.7/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/chevereto/0.0.6/charts/mariadb-1.0.37.tgz rename to stable/chevereto/0.0.7/charts/mariadb-1.0.37.tgz diff --git a/stable/chevereto/0.0.6/helm-values.md b/stable/chevereto/0.0.7/helm-values.md similarity index 100% rename from stable/chevereto/0.0.6/helm-values.md rename to stable/chevereto/0.0.7/helm-values.md diff --git a/stable/chevereto/0.0.6/ix_values.yaml b/stable/chevereto/0.0.7/ix_values.yaml similarity index 100% rename from stable/chevereto/0.0.6/ix_values.yaml rename to stable/chevereto/0.0.7/ix_values.yaml diff --git a/stable/chevereto/0.0.6/questions.yaml b/stable/chevereto/0.0.7/questions.yaml similarity index 100% rename from stable/chevereto/0.0.6/questions.yaml rename to stable/chevereto/0.0.7/questions.yaml diff --git a/stable/chevereto/0.0.6/security.md b/stable/chevereto/0.0.7/security.md similarity index 100% rename from stable/chevereto/0.0.6/security.md rename to stable/chevereto/0.0.7/security.md diff --git a/stable/chevereto/0.0.6/templates/common.yaml b/stable/chevereto/0.0.7/templates/common.yaml similarity index 100% rename from stable/chevereto/0.0.6/templates/common.yaml rename to stable/chevereto/0.0.7/templates/common.yaml diff --git a/stable/clarkson/0.0.15/values.yaml b/stable/chevereto/0.0.7/values.yaml similarity index 100% rename from stable/clarkson/0.0.15/values.yaml rename to stable/chevereto/0.0.7/values.yaml diff --git a/stable/clarkson/0.0.15/CHANGELOG.md b/stable/clarkson/0.0.16/CHANGELOG.md similarity index 92% rename from stable/clarkson/0.0.15/CHANGELOG.md rename to stable/clarkson/0.0.16/CHANGELOG.md index 4b6a5300802..95c102e24cf 100644 --- a/stable/clarkson/0.0.15/CHANGELOG.md +++ b/stable/clarkson/0.0.16/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [clarkson-0.0.16](https://github.com/truecharts/apps/compare/clarkson-0.0.15...clarkson-0.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [clarkson-0.0.15](https://github.com/truecharts/apps/compare/clarkson-0.0.14...clarkson-0.0.15) (2021-12-19) @@ -88,12 +97,3 @@ -### [clarkson-0.0.7](https://github.com/truecharts/apps/compare/clarkson-0.0.6...clarkson-0.0.7) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - diff --git a/stable/cloud9/2.0.27/CONFIG.md b/stable/clarkson/0.0.16/CONFIG.md similarity index 100% rename from stable/cloud9/2.0.27/CONFIG.md rename to stable/clarkson/0.0.16/CONFIG.md diff --git a/stable/clarkson/0.0.15/Chart.lock b/stable/clarkson/0.0.16/Chart.lock similarity index 84% rename from stable/clarkson/0.0.15/Chart.lock rename to stable/clarkson/0.0.16/Chart.lock index 80082b18663..bfe315a473a 100644 --- a/stable/clarkson/0.0.15/Chart.lock +++ b/stable/clarkson/0.0.16/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.37 digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:22:29.728805662Z" +generated: "2021-12-19T23:09:18.110286801Z" diff --git a/stable/clarkson/0.0.15/Chart.yaml b/stable/clarkson/0.0.16/Chart.yaml similarity index 98% rename from stable/clarkson/0.0.15/Chart.yaml rename to stable/clarkson/0.0.16/Chart.yaml index b7f38a13cdd..10622b16be4 100644 --- a/stable/clarkson/0.0.15/Chart.yaml +++ b/stable/clarkson/0.0.16/Chart.yaml @@ -26,7 +26,7 @@ name: clarkson sources: - https://github.com/linuxserver/Clarkson - https://hub.docker.com/r/linuxserver/clarkson -version: 0.0.15 +version: 0.0.16 annotations: truecharts.org/catagories: | - vehicle diff --git a/stable/clarkson/0.0.15/README.md b/stable/clarkson/0.0.16/README.md similarity index 100% rename from stable/clarkson/0.0.15/README.md rename to stable/clarkson/0.0.16/README.md diff --git a/stable/clarkson/0.0.15/app-readme.md b/stable/clarkson/0.0.16/app-readme.md similarity index 100% rename from stable/clarkson/0.0.15/app-readme.md rename to stable/clarkson/0.0.16/app-readme.md diff --git a/stable/cloud9/2.0.27/charts/common-8.9.24.tgz b/stable/clarkson/0.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/cloud9/2.0.27/charts/common-8.9.24.tgz rename to stable/clarkson/0.0.16/charts/common-8.9.24.tgz diff --git a/stable/clarkson/0.0.15/charts/mariadb-1.0.37.tgz b/stable/clarkson/0.0.16/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/clarkson/0.0.15/charts/mariadb-1.0.37.tgz rename to stable/clarkson/0.0.16/charts/mariadb-1.0.37.tgz diff --git a/stable/clarkson/0.0.15/helm-values.md b/stable/clarkson/0.0.16/helm-values.md similarity index 100% rename from stable/clarkson/0.0.15/helm-values.md rename to stable/clarkson/0.0.16/helm-values.md diff --git a/stable/clarkson/0.0.15/ix_values.yaml b/stable/clarkson/0.0.16/ix_values.yaml similarity index 100% rename from stable/clarkson/0.0.15/ix_values.yaml rename to stable/clarkson/0.0.16/ix_values.yaml diff --git a/stable/clarkson/0.0.15/questions.yaml b/stable/clarkson/0.0.16/questions.yaml similarity index 100% rename from stable/clarkson/0.0.15/questions.yaml rename to stable/clarkson/0.0.16/questions.yaml diff --git a/stable/clarkson/0.0.15/security.md b/stable/clarkson/0.0.16/security.md similarity index 100% rename from stable/clarkson/0.0.15/security.md rename to stable/clarkson/0.0.16/security.md diff --git a/stable/clarkson/0.0.15/templates/common.yaml b/stable/clarkson/0.0.16/templates/common.yaml similarity index 100% rename from stable/clarkson/0.0.15/templates/common.yaml rename to stable/clarkson/0.0.16/templates/common.yaml diff --git a/stable/cloud9/2.0.27/values.yaml b/stable/clarkson/0.0.16/values.yaml similarity index 100% rename from stable/cloud9/2.0.27/values.yaml rename to stable/clarkson/0.0.16/values.yaml diff --git a/stable/cloud9/2.0.27/Chart.lock b/stable/cloud9/2.0.27/Chart.lock deleted file mode 100644 index 804b9fcf5bd..00000000000 --- a/stable/cloud9/2.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:22:42.819087039Z" diff --git a/stable/cloud9/2.0.27/CHANGELOG.md b/stable/cloud9/2.0.28/CHANGELOG.md similarity index 90% rename from stable/cloud9/2.0.27/CHANGELOG.md rename to stable/cloud9/2.0.28/CHANGELOG.md index d622fb6c6b7..2eda7fe4dd6 100644 --- a/stable/cloud9/2.0.27/CHANGELOG.md +++ b/stable/cloud9/2.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [cloud9-2.0.28](https://github.com/truecharts/apps/compare/cloud9-2.0.27...cloud9-2.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [cloud9-2.0.27](https://github.com/truecharts/apps/compare/cloud9-2.0.26...cloud9-2.0.27) (2021-12-19) @@ -87,13 +97,3 @@ ### [cloud9-2.0.19](https://github.com/truecharts/apps/compare/cloud9-2.0.18...cloud9-2.0.19) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [cloud9-2.0.18](https://github.com/truecharts/apps/compare/cloud9-2.0.17...cloud9-2.0.18) (2021-12-04) - diff --git a/stable/code-server/2.1.7/CONFIG.md b/stable/cloud9/2.0.28/CONFIG.md similarity index 100% rename from stable/code-server/2.1.7/CONFIG.md rename to stable/cloud9/2.0.28/CONFIG.md diff --git a/stable/cloud9/2.0.28/Chart.lock b/stable/cloud9/2.0.28/Chart.lock new file mode 100644 index 00000000000..32dc5e64f4e --- /dev/null +++ b/stable/cloud9/2.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:09:40.658786962Z" diff --git a/stable/cloud9/2.0.27/Chart.yaml b/stable/cloud9/2.0.28/Chart.yaml similarity index 97% rename from stable/cloud9/2.0.27/Chart.yaml rename to stable/cloud9/2.0.28/Chart.yaml index b09077ec05e..32a9fc68c73 100644 --- a/stable/cloud9/2.0.27/Chart.yaml +++ b/stable/cloud9/2.0.28/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/c9/core - https://hub.docker.com/r/linuxserver/cloud9 type: application -version: 2.0.27 +version: 2.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/cloud9/2.0.27/README.md b/stable/cloud9/2.0.28/README.md similarity index 100% rename from stable/cloud9/2.0.27/README.md rename to stable/cloud9/2.0.28/README.md diff --git a/stable/cloud9/2.0.27/app-readme.md b/stable/cloud9/2.0.28/app-readme.md similarity index 100% rename from stable/cloud9/2.0.27/app-readme.md rename to stable/cloud9/2.0.28/app-readme.md diff --git a/stable/code-server/2.1.7/charts/common-8.9.24.tgz b/stable/cloud9/2.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/code-server/2.1.7/charts/common-8.9.24.tgz rename to stable/cloud9/2.0.28/charts/common-8.9.24.tgz diff --git a/stable/cloud9/2.0.27/helm-values.md b/stable/cloud9/2.0.28/helm-values.md similarity index 100% rename from stable/cloud9/2.0.27/helm-values.md rename to stable/cloud9/2.0.28/helm-values.md diff --git a/stable/cloud9/2.0.27/ix_values.yaml b/stable/cloud9/2.0.28/ix_values.yaml similarity index 100% rename from stable/cloud9/2.0.27/ix_values.yaml rename to stable/cloud9/2.0.28/ix_values.yaml diff --git a/stable/cloud9/2.0.27/questions.yaml b/stable/cloud9/2.0.28/questions.yaml similarity index 99% rename from stable/cloud9/2.0.27/questions.yaml rename to stable/cloud9/2.0.28/questions.yaml index d21f9bb5848..f3f5dd005b1 100644 --- a/stable/cloud9/2.0.27/questions.yaml +++ b/stable/cloud9/2.0.28/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10070 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/cloud9/2.0.27/security.md b/stable/cloud9/2.0.28/security.md similarity index 100% rename from stable/cloud9/2.0.27/security.md rename to stable/cloud9/2.0.28/security.md diff --git a/stable/cloud9/2.0.27/templates/common.yaml b/stable/cloud9/2.0.28/templates/common.yaml similarity index 100% rename from stable/cloud9/2.0.27/templates/common.yaml rename to stable/cloud9/2.0.28/templates/common.yaml diff --git a/stable/code-server/2.1.7/values.yaml b/stable/cloud9/2.0.28/values.yaml similarity index 100% rename from stable/code-server/2.1.7/values.yaml rename to stable/cloud9/2.0.28/values.yaml diff --git a/stable/code-server/2.1.7/Chart.lock b/stable/code-server/2.1.7/Chart.lock deleted file mode 100644 index b123ff20b12..00000000000 --- a/stable/code-server/2.1.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:22:59.419601192Z" diff --git a/stable/code-server/2.1.7/CHANGELOG.md b/stable/code-server/2.1.8/CHANGELOG.md similarity index 89% rename from stable/code-server/2.1.7/CHANGELOG.md rename to stable/code-server/2.1.8/CHANGELOG.md index e1c70df0924..f1a1826e3b7 100644 --- a/stable/code-server/2.1.7/CHANGELOG.md +++ b/stable/code-server/2.1.8/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [code-server-2.1.8](https://github.com/truecharts/apps/compare/code-server-2.1.7...code-server-2.1.8) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [code-server-2.1.7](https://github.com/truecharts/apps/compare/code-server-2.1.6...code-server-2.1.7) (2021-12-19) @@ -87,13 +97,3 @@ ### [code-server-2.0.19](https://github.com/truecharts/apps/compare/code-server-2.0.18...code-server-2.0.19) (2021-12-06) - -#### Fix - -* correct code-server persistence ([#1473](https://github.com/truecharts/apps/issues/1473)) - - - - -### code-server-2.0.18 (2021-12-05) - diff --git a/stable/couchpotato/0.0.5/CONFIG.md b/stable/code-server/2.1.8/CONFIG.md similarity index 100% rename from stable/couchpotato/0.0.5/CONFIG.md rename to stable/code-server/2.1.8/CONFIG.md diff --git a/stable/code-server/2.1.8/Chart.lock b/stable/code-server/2.1.8/Chart.lock new file mode 100644 index 00000000000..1d468bec8b4 --- /dev/null +++ b/stable/code-server/2.1.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:09:45.447018361Z" diff --git a/stable/code-server/2.1.7/Chart.yaml b/stable/code-server/2.1.8/Chart.yaml similarity index 97% rename from stable/code-server/2.1.7/Chart.yaml rename to stable/code-server/2.1.8/Chart.yaml index bf4db2dc0f9..99175798cff 100644 --- a/stable/code-server/2.1.7/Chart.yaml +++ b/stable/code-server/2.1.8/Chart.yaml @@ -21,7 +21,7 @@ name: code-server sources: - https://github.com/cdr/code-server type: application -version: 2.1.7 +version: 2.1.8 annotations: truecharts.org/catagories: | - media diff --git a/stable/code-server/2.1.7/README.md b/stable/code-server/2.1.8/README.md similarity index 100% rename from stable/code-server/2.1.7/README.md rename to stable/code-server/2.1.8/README.md diff --git a/stable/code-server/2.1.7/app-readme.md b/stable/code-server/2.1.8/app-readme.md similarity index 100% rename from stable/code-server/2.1.7/app-readme.md rename to stable/code-server/2.1.8/app-readme.md diff --git a/stable/couchpotato/0.0.5/charts/common-8.9.24.tgz b/stable/code-server/2.1.8/charts/common-8.9.24.tgz similarity index 100% rename from stable/couchpotato/0.0.5/charts/common-8.9.24.tgz rename to stable/code-server/2.1.8/charts/common-8.9.24.tgz diff --git a/stable/code-server/2.1.7/helm-values.md b/stable/code-server/2.1.8/helm-values.md similarity index 100% rename from stable/code-server/2.1.7/helm-values.md rename to stable/code-server/2.1.8/helm-values.md diff --git a/stable/code-server/2.1.7/ix_values.yaml b/stable/code-server/2.1.8/ix_values.yaml similarity index 100% rename from stable/code-server/2.1.7/ix_values.yaml rename to stable/code-server/2.1.8/ix_values.yaml diff --git a/stable/code-server/2.1.7/questions.yaml b/stable/code-server/2.1.8/questions.yaml similarity index 99% rename from stable/code-server/2.1.7/questions.yaml rename to stable/code-server/2.1.8/questions.yaml index e286a4a8ca1..7ca6fa1ba85 100644 --- a/stable/code-server/2.1.7/questions.yaml +++ b/stable/code-server/2.1.8/questions.yaml @@ -357,7 +357,6 @@ questions: schema: type: int default: 10063 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/code-server/2.1.7/security.md b/stable/code-server/2.1.8/security.md similarity index 100% rename from stable/code-server/2.1.7/security.md rename to stable/code-server/2.1.8/security.md diff --git a/stable/code-server/2.1.7/templates/common.yaml b/stable/code-server/2.1.8/templates/common.yaml similarity index 100% rename from stable/code-server/2.1.7/templates/common.yaml rename to stable/code-server/2.1.8/templates/common.yaml diff --git a/stable/couchpotato/0.0.5/values.yaml b/stable/code-server/2.1.8/values.yaml similarity index 100% rename from stable/couchpotato/0.0.5/values.yaml rename to stable/code-server/2.1.8/values.yaml diff --git a/stable/collabora-online/10.0.6/CHANGELOG.md b/stable/collabora-online/10.0.6/CHANGELOG.md new file mode 100644 index 00000000000..3e1db65c54c --- /dev/null +++ b/stable/collabora-online/10.0.6/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [collabora-online-10.0.6](https://github.com/truecharts/apps/compare/collabora-online-10.0.5...collabora-online-10.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [collabora-online-10.0.5](https://github.com/truecharts/apps/compare/collabora-online-10.0.4...collabora-online-10.0.5) (2021-12-19) + +#### Chore + +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [collabora-online-10.0.4](https://github.com/truecharts/apps/compare/collabora-online-10.0.3...collabora-online-10.0.4) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + + +### [collabora-online-10.0.3](https://github.com/truecharts/apps/compare/collabora-online-10.0.2...collabora-online-10.0.3) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [collabora-online-10.0.2](https://github.com/truecharts/apps/compare/collabora-online-10.0.1...collabora-online-10.0.2) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [collabora-online-10.0.1](https://github.com/truecharts/apps/compare/collabora-online-10.0.0...collabora-online-10.0.1) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [collabora-online-10.0.0](https://github.com/truecharts/apps/compare/collabora-online-9.0.20...collabora-online-10.0.0) (2021-12-11) + +#### Feat + +* move user/pass/secrets/keys from `env` to `secret` ([#1501](https://github.com/truecharts/apps/issues/1501)) + + + + +### [collabora-online-9.0.20](https://github.com/truecharts/apps/compare/collabora-online-9.0.19...collabora-online-9.0.20) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [collabora-online-9.0.19](https://github.com/truecharts/apps/compare/collabora-online-9.0.18...collabora-online-9.0.19) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### collabora-online-9.0.18 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix diff --git a/stable/cryptofolio/2.0.24/CONFIG.md b/stable/collabora-online/10.0.6/CONFIG.md similarity index 100% rename from stable/cryptofolio/2.0.24/CONFIG.md rename to stable/collabora-online/10.0.6/CONFIG.md diff --git a/stable/collabora-online/10.0.6/Chart.lock b/stable/collabora-online/10.0.6/Chart.lock new file mode 100644 index 00000000000..6ca6f2d11c8 --- /dev/null +++ b/stable/collabora-online/10.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:00.006003495Z" diff --git a/stable/collabora-online/10.0.6/Chart.yaml b/stable/collabora-online/10.0.6/Chart.yaml new file mode 100644 index 00000000000..830580e996d --- /dev/null +++ b/stable/collabora-online/10.0.6/Chart.yaml @@ -0,0 +1,32 @@ +apiVersion: v2 +appVersion: "6.4.14.3" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +deprecated: false +description: "Collabora Online Development Edition \u2013 an awesome, Online Office\ + \ suite image suitable for home use." +home: https://github.com/truecharts/apps/tree/master/charts/stable/collabora-online +icon: https://truecharts.org/_static/img/appicons/collabora-online-icon.png +keywords: +- collabora-online +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: collabora-online +sources: +- https://hub.docker.com/r/collabora/code +- https://sdk.collaboraonline.com/contents.html +- https://github.com/CollaboraOnline/online/tree/master/kubernetes/helm +type: application +version: 10.0.6 +annotations: + truecharts.org/catagories: | + - office + - documents + - productivity + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/collabora-online/10.0.6/README.md b/stable/collabora-online/10.0.6/README.md new file mode 100644 index 00000000000..0472428fd73 --- /dev/null +++ b/stable/collabora-online/10.0.6/README.md @@ -0,0 +1,39 @@ +# Introduction + +Collabora Online Development Edition – an awesome, Online Office suite image suitable for home use. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/collabora-online/10.0.6/app-readme.md b/stable/collabora-online/10.0.6/app-readme.md new file mode 100644 index 00000000000..c713550e0a1 --- /dev/null +++ b/stable/collabora-online/10.0.6/app-readme.md @@ -0,0 +1,3 @@ +Collabora Online Development Edition – an awesome, Online Office suite image suitable for home use. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/cryptofolio/2.0.24/charts/common-8.9.24.tgz b/stable/collabora-online/10.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/cryptofolio/2.0.24/charts/common-8.9.24.tgz rename to stable/collabora-online/10.0.6/charts/common-8.9.24.tgz diff --git a/stable/collabora-online/10.0.6/helm-values.md b/stable/collabora-online/10.0.6/helm-values.md new file mode 100644 index 00000000000..c6f524ae6f9 --- /dev/null +++ b/stable/collabora-online/10.0.6/helm-values.md @@ -0,0 +1,31 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.dictionaries | string | `"de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru"` | | +| env.domain | string | `"nextcloud\\.domain\\.tld"` | | +| env.extra_params | string | `"-o:welcome.enable=false -o:user_interface.mode=notebookbar -o:ssl.termination=true -o:ssl.enable=false"` | | +| env.server_name | string | `"collabora\\.domain\\.tld"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/collabora"` | | +| image.tag | string | `"v6.4.14.3@sha256:95b1bba1e26633586c9f49cc94602237d21a09a4a7e7059ac807927d3b15a293"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `104` | | +| secret.password | string | `"changeme"` | | +| secret.username | string | `"admin"` | | +| securityContext.allowPrivilegeEscalation | bool | `true` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10105` | | +| service.main.ports.main.targetPort | int | `9980` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/collabora-online/10.0.6/ix_values.yaml b/stable/collabora-online/10.0.6/ix_values.yaml new file mode 100644 index 00000000000..72f42484a5a --- /dev/null +++ b/stable/collabora-online/10.0.6/ix_values.yaml @@ -0,0 +1,28 @@ +image: + repository: tccr.io/truecharts/collabora + tag: v6.4.14.3@sha256:95b1bba1e26633586c9f49cc94602237d21a09a4a7e7059ac807927d3b15a293 + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + allowPrivilegeEscalation: true + runAsNonRoot: false + +podSecurityContext: + runAsUser: 104 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 10105 + targetPort: 9980 +secret: + username: admin + password: changeme +env: + domain: nextcloud\.domain\.tld + dictionaries: de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru + extra_params: "-o:welcome.enable=false -o:user_interface.mode=notebookbar -o:ssl.termination=true -o:ssl.enable=false" + server_name: collabora\.domain\.tld diff --git a/stable/collabora-online/10.0.6/questions.yaml b/stable/collabora-online/10.0.6/questions.yaml new file mode 100644 index 00000000000..d852459a8de --- /dev/null +++ b/stable/collabora-online/10.0.6/questions.yaml @@ -0,0 +1,1711 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/loleaflet/dist/admin/admin.html" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "RollingUpdate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: username + label: "Username for WebUI" + schema: + type: string + default: "admin" + required: true + - variable: password + label: "Password for WebUI" + schema: + type: string + valid_chars: "[a-zA-Z0-9!@#$%^&*?]{8,}" + private: true + required: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: domain + label: "Domain(s) using collabora" + description: 'Use pipe "|" to separate multiple domains' + schema: + type: string + default: 'nextcloud.domain.tld|othernextcloud.domain.tld' + valid_chars: '^((([a-z\d](-?[a-z\d]){0,62})\.)*(([a-z\d](-?[a-z\d]){0,62})\.)([a-z](-?[a-z\d]){1,62})|((\d{1,3}\.){3}\d{1,3}))((\|((([a-z\d](-?[a-z\d]){0,62})\.)*(([a-z\d](-?[a-z\d]){0,62})\.)([a-z](-?[a-z\d]){1,62})|((\d{1,3}\.){3}\d{1,3})))*)$' + required: true + + - variable: dictionaries + label: "Dictionaries to use, leave empty to use all" + schema: + type: string + default: "de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru" + - variable: extra_params + label: "Extra Parameters to add" + description: 'e.g. "--o:welcome.enable=false", See more on /etc/loolwsd/loowsd.xml. Separate params with space' + schema: + type: string + default: "--o:welcome.enable=false --o:user_interface.mode=notebookbar --o:ssl.termination=true --o:ssl.enable=false" + - variable: DONT_GEN_SSL_CERT + label: "DONT_GEN_SSL_CERT" + description: "When set to true it does NOT generate an SSL cert, you have to use your own" + schema: + type: boolean + default: true + - variable: server_name + label: "Server Name" + description: "When this environment variable is set (is not “”), then its value will be used as server name in /etc/loolwsd/loolwsd.xml. Without this, CODE is not delivering a correct host for the websocket connection in case of a proxy in front of it." + schema: + type: string + default: 'collabora.domain.tld' + valid_chars: '^((([a-z\d](-?[a-z\d]){0,62})\.)*(([a-z\d](-?[a-z\d]){0,62})\.)([a-z](-?[a-z\d]){1,62})|((\d{1,3}\.){3}\d{1,3}))$' + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10105 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9980 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: true + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 104 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/collabora-online/10.0.6/security.md b/stable/collabora-online/10.0.6/security.md new file mode 100644 index 00000000000..0cd935a54f4 --- /dev/null +++ b/stable/collabora-online/10.0.6/security.md @@ -0,0 +1,224 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: collabora-online/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-collabora-online' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/collabora:v6.4.14.3@sha256:95b1bba1e26633586c9f49cc94602237d21a09a4a7e7059ac807927d3b15a293 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/collabora:v6.4.14.3@sha256:95b1bba1e26633586c9f49cc94602237d21a09a4a7e7059ac807927d3b15a293 (ubuntu 18.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| bash | CVE-2019-18276 | LOW | 4.4.18-2ubuntu1.2 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| coreutils | CVE-2016-2781 | LOW | 8.28-1ubuntu1 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| dbus | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
| +| dirmngr | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gcc-8-base | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gnupg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg-l10n | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg-utils | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg2 | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-agent | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-wks-client | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-wks-server | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgconf | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgsm | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgv | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
| +| krb5-locales | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| krb5-locales | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-locales | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| krb5-locales | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.12-4ubuntu5.1 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| libc-bin | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| libc-bin | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| libc6 | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| libc6 | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
| +| libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libglib2.0-0 | CVE-2021-3800 | MEDIUM | 2.56.4-0ubuntu0.18.04.8 | 2.56.4-0ubuntu0.18.04.9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
https://linux.oracle.com/cve/CVE-2021-3800.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://ubuntu.com/security/notices/USN-5189-1
https://www.openwall.com/lists/oss-security/2017/06/23/8
| +| libglib2.0-data | CVE-2021-3800 | MEDIUM | 2.56.4-0ubuntu0.18.04.8 | 2.56.4-0ubuntu0.18.04.9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
https://linux.oracle.com/cve/CVE-2021-3800.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://ubuntu.com/security/notices/USN-5189-1
https://www.openwall.com/lists/oss-security/2017/06/23/8
| +| libgnutls30 | CVE-2018-16868 | LOW | 3.5.18-1ubuntu1.5 | |
Expand...http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
| +| libgssapi-krb5-2 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgssapi-krb5-2 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libk5crypto3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libkrb5support0 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libnghttp2-14 | CVE-2019-9511 | MEDIUM | 1.30.0-1ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4018
https://access.redhat.com/errata/RHSA-2019:4019
https://access.redhat.com/errata/RHSA-2019:4020
https://access.redhat.com/errata/RHSA-2019:4021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9511.html
https://linux.oracle.com/errata/ELSA-2020-5862.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.synology.com/security/advisory/Synology_SA_19_33
| +| libnghttp2-14 | CVE-2019-9513 | MEDIUM | 1.30.0-1ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9513.html
https://linux.oracle.com/errata/ELSA-2019-2925.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_33
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-9 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpng16-16 | CVE-2018-14048 | LOW | 1.6.34-1ubuntu0.18.04.2 | |
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
| +| libpython3.6-minimal | CVE-2021-3733 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.6-minimal | CVE-2021-3737 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.6-minimal | CVE-2021-23336 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.6-minimal | CVE-2021-3426 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.6-stdlib | CVE-2021-3733 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.6-stdlib | CVE-2021-3737 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.6-stdlib | CVE-2021-23336 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.6-stdlib | CVE-2021-3426 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libstdc++6 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| multiarch-support | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| multiarch-support | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| multiarch-support | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| multiarch-support | CVE-2016-10739 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| multiarch-support | CVE-2019-25013 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| multiarch-support | CVE-2020-27618 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| multiarch-support | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| multiarch-support | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| multiarch-support | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| openssh-client | CVE-2020-14145 | LOW | 1:7.6p1-4ubuntu0.5 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2021-41617 | LOW | 1:7.6p1-4ubuntu0.5 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| python3.6 | CVE-2021-3733 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.6 | CVE-2021-3737 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.6 | CVE-2021-23336 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.6 | CVE-2021-3426 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.6-minimal | CVE-2021-3733 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.6-minimal | CVE-2021-3737 | MEDIUM | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.6-minimal | CVE-2021-23336 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.6-minimal | CVE-2021-3426 | LOW | 3.6.9-1~18.04ubuntu1.4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| xdg-user-dirs | CVE-2017-15131 | LOW | 0.17-1ubuntu1 | |
Expand...http://bugs.freedesktop.org/show_bug.cgi?id=102303
https://access.redhat.com/errata/RHSA-2018:0842
https://bugzilla.redhat.com/show_bug.cgi?id=1412762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131
https://linux.oracle.com/cve/CVE-2017-15131.html
https://linux.oracle.com/errata/ELSA-2018-0842.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| + diff --git a/stable/couchpotato/0.0.5/templates/common.yaml b/stable/collabora-online/10.0.6/templates/common.yaml similarity index 100% rename from stable/couchpotato/0.0.5/templates/common.yaml rename to stable/collabora-online/10.0.6/templates/common.yaml diff --git a/stable/cryptofolio/2.0.24/values.yaml b/stable/collabora-online/10.0.6/values.yaml similarity index 100% rename from stable/cryptofolio/2.0.24/values.yaml rename to stable/collabora-online/10.0.6/values.yaml diff --git a/stable/couchpotato/0.0.5/CHANGELOG.md b/stable/couchpotato/0.0.6/CHANGELOG.md similarity index 86% rename from stable/couchpotato/0.0.5/CHANGELOG.md rename to stable/couchpotato/0.0.6/CHANGELOG.md index b3f297d5b12..1237f32a857 100644 --- a/stable/couchpotato/0.0.5/CHANGELOG.md +++ b/stable/couchpotato/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [couchpotato-0.0.6](https://github.com/truecharts/apps/compare/couchpotato-0.0.5...couchpotato-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [couchpotato-0.0.5](https://github.com/truecharts/apps/compare/couchpotato-0.0.4...couchpotato-0.0.5) (2021-12-19) diff --git a/stable/custom-app/3.0.42/CONFIG.md b/stable/couchpotato/0.0.6/CONFIG.md similarity index 100% rename from stable/custom-app/3.0.42/CONFIG.md rename to stable/couchpotato/0.0.6/CONFIG.md diff --git a/stable/couchpotato/0.0.6/Chart.lock b/stable/couchpotato/0.0.6/Chart.lock new file mode 100644 index 00000000000..6399c4d4ba5 --- /dev/null +++ b/stable/couchpotato/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:03.198013082Z" diff --git a/stable/couchpotato/0.0.5/Chart.yaml b/stable/couchpotato/0.0.6/Chart.yaml similarity index 98% rename from stable/couchpotato/0.0.5/Chart.yaml rename to stable/couchpotato/0.0.6/Chart.yaml index 2f31ab2b7c7..0f1bdd985a5 100644 --- a/stable/couchpotato/0.0.5/Chart.yaml +++ b/stable/couchpotato/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: couchpotato -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.22" description: Couchpotato is an automatic NZB and torrent downloader. type: application diff --git a/stable/couchpotato/0.0.5/README.md b/stable/couchpotato/0.0.6/README.md similarity index 100% rename from stable/couchpotato/0.0.5/README.md rename to stable/couchpotato/0.0.6/README.md diff --git a/stable/couchpotato/0.0.5/app-readme.md b/stable/couchpotato/0.0.6/app-readme.md similarity index 100% rename from stable/couchpotato/0.0.5/app-readme.md rename to stable/couchpotato/0.0.6/app-readme.md diff --git a/stable/custom-app/3.0.42/charts/common-8.9.24.tgz b/stable/couchpotato/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/custom-app/3.0.42/charts/common-8.9.24.tgz rename to stable/couchpotato/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/couchpotato/0.0.5/helm-values.md b/stable/couchpotato/0.0.6/helm-values.md similarity index 100% rename from stable/couchpotato/0.0.5/helm-values.md rename to stable/couchpotato/0.0.6/helm-values.md diff --git a/stable/couchpotato/0.0.5/ix_values.yaml b/stable/couchpotato/0.0.6/ix_values.yaml similarity index 100% rename from stable/couchpotato/0.0.5/ix_values.yaml rename to stable/couchpotato/0.0.6/ix_values.yaml diff --git a/stable/couchpotato/0.0.5/questions.yaml b/stable/couchpotato/0.0.6/questions.yaml similarity index 100% rename from stable/couchpotato/0.0.5/questions.yaml rename to stable/couchpotato/0.0.6/questions.yaml diff --git a/stable/couchpotato/0.0.5/security.md b/stable/couchpotato/0.0.6/security.md similarity index 100% rename from stable/couchpotato/0.0.5/security.md rename to stable/couchpotato/0.0.6/security.md diff --git a/stable/cryptofolio/2.0.24/templates/common.yaml b/stable/couchpotato/0.0.6/templates/common.yaml similarity index 100% rename from stable/cryptofolio/2.0.24/templates/common.yaml rename to stable/couchpotato/0.0.6/templates/common.yaml diff --git a/stable/custom-app/3.0.42/values.yaml b/stable/couchpotato/0.0.6/values.yaml similarity index 100% rename from stable/custom-app/3.0.42/values.yaml rename to stable/couchpotato/0.0.6/values.yaml diff --git a/stable/cryptofolio/2.0.24/Chart.lock b/stable/cryptofolio/2.0.24/Chart.lock deleted file mode 100644 index 9814d5c2787..00000000000 --- a/stable/cryptofolio/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:23:47.364504429Z" diff --git a/stable/cryptofolio/2.0.24/CHANGELOG.md b/stable/cryptofolio/2.0.25/CHANGELOG.md similarity index 90% rename from stable/cryptofolio/2.0.24/CHANGELOG.md rename to stable/cryptofolio/2.0.25/CHANGELOG.md index 1b8c79e5a84..f4bd71e729e 100644 --- a/stable/cryptofolio/2.0.24/CHANGELOG.md +++ b/stable/cryptofolio/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [cryptofolio-2.0.25](https://github.com/truecharts/apps/compare/cryptofolio-2.0.24...cryptofolio-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [cryptofolio-2.0.24](https://github.com/truecharts/apps/compare/cryptofolio-2.0.23...cryptofolio-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [cryptofolio-2.0.16](https://github.com/truecharts/apps/compare/cryptofolio-2.0.15...cryptofolio-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [cryptofolio-2.0.15](https://github.com/truecharts/apps/compare/cryptofolio-2.0.14...cryptofolio-2.0.15) (2021-12-04) - diff --git a/stable/darktable/0.0.5/CONFIG.md b/stable/cryptofolio/2.0.25/CONFIG.md similarity index 100% rename from stable/darktable/0.0.5/CONFIG.md rename to stable/cryptofolio/2.0.25/CONFIG.md diff --git a/stable/cryptofolio/2.0.25/Chart.lock b/stable/cryptofolio/2.0.25/Chart.lock new file mode 100644 index 00000000000..39ae78e31df --- /dev/null +++ b/stable/cryptofolio/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:15.460855754Z" diff --git a/stable/cryptofolio/2.0.24/Chart.yaml b/stable/cryptofolio/2.0.25/Chart.yaml similarity index 97% rename from stable/cryptofolio/2.0.24/Chart.yaml rename to stable/cryptofolio/2.0.25/Chart.yaml index 4a670bac3d5..7e3dbb50724 100644 --- a/stable/cryptofolio/2.0.24/Chart.yaml +++ b/stable/cryptofolio/2.0.25/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: cryptofolio sources: - https://github.com/Xtrendence/cryptofolio -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/cryptofolio/2.0.24/README.md b/stable/cryptofolio/2.0.25/README.md similarity index 100% rename from stable/cryptofolio/2.0.24/README.md rename to stable/cryptofolio/2.0.25/README.md diff --git a/stable/cryptofolio/2.0.24/app-readme.md b/stable/cryptofolio/2.0.25/app-readme.md similarity index 100% rename from stable/cryptofolio/2.0.24/app-readme.md rename to stable/cryptofolio/2.0.25/app-readme.md diff --git a/stable/darktable/0.0.5/charts/common-8.9.24.tgz b/stable/cryptofolio/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/darktable/0.0.5/charts/common-8.9.24.tgz rename to stable/cryptofolio/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/cryptofolio/2.0.24/helm-values.md b/stable/cryptofolio/2.0.25/helm-values.md similarity index 100% rename from stable/cryptofolio/2.0.24/helm-values.md rename to stable/cryptofolio/2.0.25/helm-values.md diff --git a/stable/cryptofolio/2.0.24/ix_values.yaml b/stable/cryptofolio/2.0.25/ix_values.yaml similarity index 100% rename from stable/cryptofolio/2.0.24/ix_values.yaml rename to stable/cryptofolio/2.0.25/ix_values.yaml diff --git a/stable/cryptofolio/2.0.24/questions.yaml b/stable/cryptofolio/2.0.25/questions.yaml similarity index 99% rename from stable/cryptofolio/2.0.24/questions.yaml rename to stable/cryptofolio/2.0.25/questions.yaml index 9640acc6da9..f64d103001c 100644 --- a/stable/cryptofolio/2.0.24/questions.yaml +++ b/stable/cryptofolio/2.0.25/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10007 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/cryptofolio/2.0.24/security.md b/stable/cryptofolio/2.0.25/security.md similarity index 100% rename from stable/cryptofolio/2.0.24/security.md rename to stable/cryptofolio/2.0.25/security.md diff --git a/stable/custom-app/3.0.42/templates/common.yaml b/stable/cryptofolio/2.0.25/templates/common.yaml similarity index 100% rename from stable/custom-app/3.0.42/templates/common.yaml rename to stable/cryptofolio/2.0.25/templates/common.yaml diff --git a/stable/darktable/0.0.5/values.yaml b/stable/cryptofolio/2.0.25/values.yaml similarity index 100% rename from stable/darktable/0.0.5/values.yaml rename to stable/cryptofolio/2.0.25/values.yaml diff --git a/stable/custom-app/3.0.42/Chart.lock b/stable/custom-app/3.0.42/Chart.lock deleted file mode 100644 index 815e0927eda..00000000000 --- a/stable/custom-app/3.0.42/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:23:48.781017345Z" diff --git a/stable/custom-app/3.0.42/CHANGELOG.md b/stable/custom-app/3.0.43/CHANGELOG.md similarity index 92% rename from stable/custom-app/3.0.42/CHANGELOG.md rename to stable/custom-app/3.0.43/CHANGELOG.md index 224bb4d0880..1ec7a2c8f11 100644 --- a/stable/custom-app/3.0.42/CHANGELOG.md +++ b/stable/custom-app/3.0.43/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [custom-app-3.0.43](https://github.com/truecharts/apps/compare/custom-app-3.0.42...custom-app-3.0.43) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [custom-app-3.0.42](https://github.com/truecharts/apps/compare/custom-app-3.0.41...custom-app-3.0.42) (2021-12-19) @@ -88,12 +97,3 @@ ### [custom-app-3.0.33](https://github.com/truecharts/apps/compare/custom-app-3.0.32...custom-app-3.0.33) (2021-12-08) -#### Chore - -* update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [custom-app-3.0.32](https://github.com/truecharts/apps/compare/custom-app-3.0.31...custom-app-3.0.32) (2021-12-07) - diff --git a/stable/davos/2.0.24/CONFIG.md b/stable/custom-app/3.0.43/CONFIG.md similarity index 100% rename from stable/davos/2.0.24/CONFIG.md rename to stable/custom-app/3.0.43/CONFIG.md diff --git a/stable/custom-app/3.0.43/Chart.lock b/stable/custom-app/3.0.43/Chart.lock new file mode 100644 index 00000000000..fbd959f4e94 --- /dev/null +++ b/stable/custom-app/3.0.43/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:26.923781043Z" diff --git a/stable/custom-app/3.0.42/Chart.yaml b/stable/custom-app/3.0.43/Chart.yaml similarity index 97% rename from stable/custom-app/3.0.42/Chart.yaml rename to stable/custom-app/3.0.43/Chart.yaml index 68ff851117e..fe3a1dba364 100644 --- a/stable/custom-app/3.0.42/Chart.yaml +++ b/stable/custom-app/3.0.43/Chart.yaml @@ -19,7 +19,7 @@ name: custom-app sources: - https://github.com/truecharts/apps/tree/master/charts/stable/custom-app type: application -version: 3.0.42 +version: 3.0.43 annotations: truecharts.org/catagories: | - custom diff --git a/stable/custom-app/3.0.42/README.md b/stable/custom-app/3.0.43/README.md similarity index 100% rename from stable/custom-app/3.0.42/README.md rename to stable/custom-app/3.0.43/README.md diff --git a/stable/custom-app/3.0.42/app-readme.md b/stable/custom-app/3.0.43/app-readme.md similarity index 100% rename from stable/custom-app/3.0.42/app-readme.md rename to stable/custom-app/3.0.43/app-readme.md diff --git a/stable/davos/2.0.24/charts/common-8.9.24.tgz b/stable/custom-app/3.0.43/charts/common-8.9.24.tgz similarity index 100% rename from stable/davos/2.0.24/charts/common-8.9.24.tgz rename to stable/custom-app/3.0.43/charts/common-8.9.24.tgz diff --git a/stable/custom-app/3.0.42/ci/test-values.yaml b/stable/custom-app/3.0.43/ci/test-values.yaml similarity index 100% rename from stable/custom-app/3.0.42/ci/test-values.yaml rename to stable/custom-app/3.0.43/ci/test-values.yaml diff --git a/stable/custom-app/3.0.42/helm-values.md b/stable/custom-app/3.0.43/helm-values.md similarity index 100% rename from stable/custom-app/3.0.42/helm-values.md rename to stable/custom-app/3.0.43/helm-values.md diff --git a/stable/custom-app/3.0.42/ix_values.yaml b/stable/custom-app/3.0.43/ix_values.yaml similarity index 100% rename from stable/custom-app/3.0.42/ix_values.yaml rename to stable/custom-app/3.0.43/ix_values.yaml diff --git a/stable/custom-app/3.0.42/questions.yaml b/stable/custom-app/3.0.43/questions.yaml similarity index 100% rename from stable/custom-app/3.0.42/questions.yaml rename to stable/custom-app/3.0.43/questions.yaml diff --git a/stable/custom-app/3.0.42/security.md b/stable/custom-app/3.0.43/security.md similarity index 100% rename from stable/custom-app/3.0.42/security.md rename to stable/custom-app/3.0.43/security.md diff --git a/stable/darktable/0.0.5/templates/common.yaml b/stable/custom-app/3.0.43/templates/common.yaml similarity index 100% rename from stable/darktable/0.0.5/templates/common.yaml rename to stable/custom-app/3.0.43/templates/common.yaml diff --git a/stable/davos/2.0.24/values.yaml b/stable/custom-app/3.0.43/values.yaml similarity index 100% rename from stable/davos/2.0.24/values.yaml rename to stable/custom-app/3.0.43/values.yaml diff --git a/stable/darktable/0.0.5/Chart.lock b/stable/darktable/0.0.5/Chart.lock deleted file mode 100644 index ec82f164048..00000000000 --- a/stable/darktable/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:10.252755884Z" diff --git a/stable/darktable/0.0.5/CHANGELOG.md b/stable/darktable/0.0.6/CHANGELOG.md similarity index 86% rename from stable/darktable/0.0.5/CHANGELOG.md rename to stable/darktable/0.0.6/CHANGELOG.md index 6584e3e756a..d0dd82625f9 100644 --- a/stable/darktable/0.0.5/CHANGELOG.md +++ b/stable/darktable/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [darktable-0.0.6](https://github.com/truecharts/apps/compare/darktable-0.0.5...darktable-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [darktable-0.0.5](https://github.com/truecharts/apps/compare/darktable-0.0.4...darktable-0.0.5) (2021-12-19) diff --git a/stable/ddclient/0.0.5/CONFIG.md b/stable/darktable/0.0.6/CONFIG.md similarity index 100% rename from stable/ddclient/0.0.5/CONFIG.md rename to stable/darktable/0.0.6/CONFIG.md diff --git a/stable/darktable/0.0.6/Chart.lock b/stable/darktable/0.0.6/Chart.lock new file mode 100644 index 00000000000..0f8783351a5 --- /dev/null +++ b/stable/darktable/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:33.540907956Z" diff --git a/stable/darktable/0.0.5/Chart.yaml b/stable/darktable/0.0.6/Chart.yaml similarity index 98% rename from stable/darktable/0.0.5/Chart.yaml rename to stable/darktable/0.0.6/Chart.yaml index de89ef76cc5..db187c5f5dd 100644 --- a/stable/darktable/0.0.5/Chart.yaml +++ b/stable/darktable/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: darktable -version: 0.0.5 +version: 0.0.6 appVersion: "3.4.1" description: Darktable is an open source photography workflow application and raw developer. type: application diff --git a/stable/darktable/0.0.5/README.md b/stable/darktable/0.0.6/README.md similarity index 100% rename from stable/darktable/0.0.5/README.md rename to stable/darktable/0.0.6/README.md diff --git a/stable/darktable/0.0.5/app-readme.md b/stable/darktable/0.0.6/app-readme.md similarity index 100% rename from stable/darktable/0.0.5/app-readme.md rename to stable/darktable/0.0.6/app-readme.md diff --git a/stable/ddclient/0.0.5/charts/common-8.9.24.tgz b/stable/darktable/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/ddclient/0.0.5/charts/common-8.9.24.tgz rename to stable/darktable/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/darktable/0.0.5/helm-values.md b/stable/darktable/0.0.6/helm-values.md similarity index 100% rename from stable/darktable/0.0.5/helm-values.md rename to stable/darktable/0.0.6/helm-values.md diff --git a/stable/darktable/0.0.5/ix_values.yaml b/stable/darktable/0.0.6/ix_values.yaml similarity index 100% rename from stable/darktable/0.0.5/ix_values.yaml rename to stable/darktable/0.0.6/ix_values.yaml diff --git a/stable/darktable/0.0.5/questions.yaml b/stable/darktable/0.0.6/questions.yaml similarity index 100% rename from stable/darktable/0.0.5/questions.yaml rename to stable/darktable/0.0.6/questions.yaml diff --git a/stable/darktable/0.0.5/security.md b/stable/darktable/0.0.6/security.md similarity index 100% rename from stable/darktable/0.0.5/security.md rename to stable/darktable/0.0.6/security.md diff --git a/stable/ddclient/0.0.5/templates/common.yaml b/stable/darktable/0.0.6/templates/common.yaml similarity index 100% rename from stable/ddclient/0.0.5/templates/common.yaml rename to stable/darktable/0.0.6/templates/common.yaml diff --git a/stable/ddclient/0.0.5/values.yaml b/stable/darktable/0.0.6/values.yaml similarity index 100% rename from stable/ddclient/0.0.5/values.yaml rename to stable/darktable/0.0.6/values.yaml diff --git a/stable/davos/2.0.24/Chart.lock b/stable/davos/2.0.24/Chart.lock deleted file mode 100644 index 78e8f9e8f1c..00000000000 --- a/stable/davos/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:18.517993581Z" diff --git a/stable/davos/2.0.24/CHANGELOG.md b/stable/davos/2.0.25/CHANGELOG.md similarity index 90% rename from stable/davos/2.0.24/CHANGELOG.md rename to stable/davos/2.0.25/CHANGELOG.md index 792a67afdc6..5f885c907a6 100644 --- a/stable/davos/2.0.24/CHANGELOG.md +++ b/stable/davos/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [davos-2.0.25](https://github.com/truecharts/apps/compare/davos-2.0.24...davos-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [davos-2.0.24](https://github.com/truecharts/apps/compare/davos-2.0.23...davos-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [davos-2.0.16](https://github.com/truecharts/apps/compare/davos-2.0.15...davos-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [davos-2.0.15](https://github.com/truecharts/apps/compare/davos-2.0.14...davos-2.0.15) (2021-12-04) diff --git a/stable/deconz/6.0.5/CONFIG.md b/stable/davos/2.0.25/CONFIG.md similarity index 100% rename from stable/deconz/6.0.5/CONFIG.md rename to stable/davos/2.0.25/CONFIG.md diff --git a/stable/davos/2.0.25/Chart.lock b/stable/davos/2.0.25/Chart.lock new file mode 100644 index 00000000000..68cc59fe9ab --- /dev/null +++ b/stable/davos/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:10:52.492013418Z" diff --git a/stable/davos/2.0.24/Chart.yaml b/stable/davos/2.0.25/Chart.yaml similarity index 97% rename from stable/davos/2.0.24/Chart.yaml rename to stable/davos/2.0.25/Chart.yaml index c124aa84872..197e77f8f7b 100644 --- a/stable/davos/2.0.24/Chart.yaml +++ b/stable/davos/2.0.25/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-davos - https://github.com/linuxserver/davos/ type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/davos/2.0.24/README.md b/stable/davos/2.0.25/README.md similarity index 100% rename from stable/davos/2.0.24/README.md rename to stable/davos/2.0.25/README.md diff --git a/stable/davos/2.0.24/app-readme.md b/stable/davos/2.0.25/app-readme.md similarity index 100% rename from stable/davos/2.0.24/app-readme.md rename to stable/davos/2.0.25/app-readme.md diff --git a/stable/deconz/6.0.5/charts/common-8.9.24.tgz b/stable/davos/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/deconz/6.0.5/charts/common-8.9.24.tgz rename to stable/davos/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/davos/2.0.24/helm-values.md b/stable/davos/2.0.25/helm-values.md similarity index 100% rename from stable/davos/2.0.24/helm-values.md rename to stable/davos/2.0.25/helm-values.md diff --git a/stable/davos/2.0.24/ix_values.yaml b/stable/davos/2.0.25/ix_values.yaml similarity index 100% rename from stable/davos/2.0.24/ix_values.yaml rename to stable/davos/2.0.25/ix_values.yaml diff --git a/stable/davos/2.0.24/questions.yaml b/stable/davos/2.0.25/questions.yaml similarity index 99% rename from stable/davos/2.0.24/questions.yaml rename to stable/davos/2.0.25/questions.yaml index 70d49ea3c1d..af8847effa3 100644 --- a/stable/davos/2.0.24/questions.yaml +++ b/stable/davos/2.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10081 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/davos/2.0.24/security.md b/stable/davos/2.0.25/security.md similarity index 99% rename from stable/davos/2.0.24/security.md rename to stable/davos/2.0.25/security.md index 75e083ac2d9..a22e3c789c6 100644 --- a/stable/davos/2.0.24/security.md +++ b/stable/davos/2.0.25/security.md @@ -139,11 +139,11 @@ hide: | commons-io:commons-io | CVE-2021-29425 | MEDIUM | 2.4 | 2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
https://github.com/advisories/GHSA-gwrp-pvrq-jmwv
https://issues.apache.org/jira/browse/IO-556
https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E
https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29425
https://ubuntu.com/security/notices/USN-5095-1
https://www.openwall.com/lists/oss-security/2021/04/12/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.2 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.4.1 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
http://www.openwall.com/lists/oss-security/2021/12/13/1
http://www.openwall.com/lists/oss-security/2021/12/13/2
http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://issues.apache.org/jira/browse/LOG4J2-3214
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://twitter.com/kurtseifried/status/1469345530182455296
https://ubuntu.com/security/notices/USN-5192-1
https://ubuntu.com/security/notices/USN-5192-2
https://ubuntu.com/security/notices/USN-5197-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell
https://www.debian.org/security/2021/dsa-5020
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.4.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.4.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.logging.log4j:log4j-api | CVE-2021-45046 | LOW | 2.4.1 | 2.16.0 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://access.redhat.com/security/cve/CVE-2021-44228
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5197-1
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.cve.org/CVERecord?id=CVE-2021-45046
https://www.debian.org/security/2021/dsa-5022
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.openwall.com/lists/oss-security/2021/12/14/4
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| | org.apache.logging.log4j:log4j-core | CVE-2017-5645 | CRITICAL | 2.4.1 | 2.8.2 |
Expand...http://www.openwall.com/lists/oss-security/2019/12/19/2
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/97702
http://www.securitytracker.com/id/1040200
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2017:1417
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2423
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:2808
https://access.redhat.com/errata/RHSA-2017:2809
https://access.redhat.com/errata/RHSA-2017:2810
https://access.redhat.com/errata/RHSA-2017:2811
https://access.redhat.com/errata/RHSA-2017:2888
https://access.redhat.com/errata/RHSA-2017:2889
https://access.redhat.com/errata/RHSA-2017:3244
https://access.redhat.com/errata/RHSA-2017:3399
https://access.redhat.com/errata/RHSA-2017:3400
https://access.redhat.com/errata/RHSA-2019:1545
https://github.com/advisories/GHSA-fxph-q3j8-mv87
https://issues.apache.org/jira/browse/LOG4J2-1863
https://linux.oracle.com/cve/CVE-2017-5645.html
https://linux.oracle.com/errata/ELSA-2017-2423.html
https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3Cgithub.beam.apache.org%3E
https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3Cgithub.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3Cgithub.beam.apache.org%3E
https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E
https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3Cgithub.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3Ccommits.doris.apache.org%3E
https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3Cgithub.beam.apache.org%3E
https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E
https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5645
https://security.netapp.com/advisory/ntap-20180726-0002/
https://security.netapp.com/advisory/ntap-20181107-0002/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| | org.apache.logging.log4j:log4j-core | CVE-2021-44228 | CRITICAL | 2.4.1 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
http://www.openwall.com/lists/oss-security/2021/12/13/1
http://www.openwall.com/lists/oss-security/2021/12/13/2
http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://issues.apache.org/jira/browse/LOG4J2-3214
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://twitter.com/kurtseifried/status/1469345530182455296
https://ubuntu.com/security/notices/USN-5192-1
https://ubuntu.com/security/notices/USN-5192-2
https://ubuntu.com/security/notices/USN-5197-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell
https://www.debian.org/security/2021/dsa-5020
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| -| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.4.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.4.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.logging.log4j:log4j-core | CVE-2020-9488 | LOW | 2.4.1 | 2.13.2 |
Expand...https://github.com/advisories/GHSA-vwqq-5vrc-xw9h
https://issues.apache.org/jira/browse/LOG4J2-2819
https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-9488
https://security.netapp.com/advisory/ntap-20200504-0003/
https://www.debian.org/security/2021/dsa-5020
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.logging.log4j:log4j-core | CVE-2021-45046 | LOW | 2.4.1 | 2.16.0 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://access.redhat.com/security/cve/CVE-2021-44228
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5197-1
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.cve.org/CVERecord?id=CVE-2021-45046
https://www.debian.org/security/2021/dsa-5022
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.openwall.com/lists/oss-security/2021/12/14/4
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2017-5648 | CRITICAL | 8.5.6 | 7.0.76, 8.0.42, 8.5.12, 9.0.1 |
Expand...http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
| diff --git a/stable/davos/2.0.24/templates/common.yaml b/stable/davos/2.0.25/templates/common.yaml similarity index 100% rename from stable/davos/2.0.24/templates/common.yaml rename to stable/davos/2.0.25/templates/common.yaml diff --git a/stable/deconz/6.0.5/values.yaml b/stable/davos/2.0.25/values.yaml similarity index 100% rename from stable/deconz/6.0.5/values.yaml rename to stable/davos/2.0.25/values.yaml diff --git a/stable/ddclient/0.0.5/Chart.lock b/stable/ddclient/0.0.5/Chart.lock deleted file mode 100644 index 877c7f34c13..00000000000 --- a/stable/ddclient/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:24.919661911Z" diff --git a/stable/ddclient/0.0.5/CHANGELOG.md b/stable/ddclient/0.0.6/CHANGELOG.md similarity index 87% rename from stable/ddclient/0.0.5/CHANGELOG.md rename to stable/ddclient/0.0.6/CHANGELOG.md index 5275401bfc3..33b5daf5cdb 100644 --- a/stable/ddclient/0.0.5/CHANGELOG.md +++ b/stable/ddclient/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ddclient-0.0.6](https://github.com/truecharts/apps/compare/ddclient-0.0.5...ddclient-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [ddclient-0.0.5](https://github.com/truecharts/apps/compare/ddclient-0.0.4...ddclient-0.0.5) (2021-12-19) diff --git a/stable/deepstack-cpu/8.0.6/CONFIG.md b/stable/ddclient/0.0.6/CONFIG.md similarity index 100% rename from stable/deepstack-cpu/8.0.6/CONFIG.md rename to stable/ddclient/0.0.6/CONFIG.md diff --git a/stable/ddclient/0.0.6/Chart.lock b/stable/ddclient/0.0.6/Chart.lock new file mode 100644 index 00000000000..c4cc3019ea2 --- /dev/null +++ b/stable/ddclient/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:04.348218076Z" diff --git a/stable/ddclient/0.0.5/Chart.yaml b/stable/ddclient/0.0.6/Chart.yaml similarity index 98% rename from stable/ddclient/0.0.5/Chart.yaml rename to stable/ddclient/0.0.6/Chart.yaml index 810ecc6bdf3..c34ae0f4e40 100644 --- a/stable/ddclient/0.0.5/Chart.yaml +++ b/stable/ddclient/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: ddclient -version: 0.0.5 +version: 0.0.6 appVersion: "3.9.1" description: Ddclient is a Perl client used to update dynamic DNS entries for accounts on Dynamic DNS Network Service Provider. type: application diff --git a/stable/ddclient/0.0.5/README.md b/stable/ddclient/0.0.6/README.md similarity index 100% rename from stable/ddclient/0.0.5/README.md rename to stable/ddclient/0.0.6/README.md diff --git a/stable/ddclient/0.0.5/app-readme.md b/stable/ddclient/0.0.6/app-readme.md similarity index 100% rename from stable/ddclient/0.0.5/app-readme.md rename to stable/ddclient/0.0.6/app-readme.md diff --git a/stable/deepstack-cpu/8.0.6/charts/common-8.9.24.tgz b/stable/ddclient/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/deepstack-cpu/8.0.6/charts/common-8.9.24.tgz rename to stable/ddclient/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/ddclient/0.0.5/helm-values.md b/stable/ddclient/0.0.6/helm-values.md similarity index 100% rename from stable/ddclient/0.0.5/helm-values.md rename to stable/ddclient/0.0.6/helm-values.md diff --git a/stable/ddclient/0.0.5/ix_values.yaml b/stable/ddclient/0.0.6/ix_values.yaml similarity index 100% rename from stable/ddclient/0.0.5/ix_values.yaml rename to stable/ddclient/0.0.6/ix_values.yaml diff --git a/stable/ddclient/0.0.5/questions.yaml b/stable/ddclient/0.0.6/questions.yaml similarity index 100% rename from stable/ddclient/0.0.5/questions.yaml rename to stable/ddclient/0.0.6/questions.yaml diff --git a/stable/ddclient/0.0.5/security.md b/stable/ddclient/0.0.6/security.md similarity index 100% rename from stable/ddclient/0.0.5/security.md rename to stable/ddclient/0.0.6/security.md diff --git a/stable/deconz/6.0.5/templates/common.yaml b/stable/ddclient/0.0.6/templates/common.yaml similarity index 100% rename from stable/deconz/6.0.5/templates/common.yaml rename to stable/ddclient/0.0.6/templates/common.yaml diff --git a/stable/deepstack-cpu/8.0.6/values.yaml b/stable/ddclient/0.0.6/values.yaml similarity index 100% rename from stable/deepstack-cpu/8.0.6/values.yaml rename to stable/ddclient/0.0.6/values.yaml diff --git a/stable/deconz/6.0.5/Chart.lock b/stable/deconz/6.0.5/Chart.lock deleted file mode 100644 index 59fc82ac4ef..00000000000 --- a/stable/deconz/6.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:33.313334788Z" diff --git a/stable/deconz/6.0.5/CHANGELOG.md b/stable/deconz/6.0.6/CHANGELOG.md similarity index 85% rename from stable/deconz/6.0.5/CHANGELOG.md rename to stable/deconz/6.0.6/CHANGELOG.md index 37fd7e3c3c9..5379598a3a2 100644 --- a/stable/deconz/6.0.5/CHANGELOG.md +++ b/stable/deconz/6.0.6/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [deconz-6.0.6](https://github.com/truecharts/apps/compare/deconz-6.0.5...deconz-6.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [deconz-6.0.5](https://github.com/truecharts/apps/compare/deconz-6.0.4...deconz-6.0.5) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* misc fixes -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [deconz-5.0.4](https://github.com/truecharts/apps/compare/deconz-5.0.3...deconz-5.0.4) (2021-12-05) - diff --git a/stable/deepstack-gpu/3.0.6/CONFIG.md b/stable/deconz/6.0.6/CONFIG.md similarity index 100% rename from stable/deepstack-gpu/3.0.6/CONFIG.md rename to stable/deconz/6.0.6/CONFIG.md diff --git a/stable/deconz/6.0.6/Chart.lock b/stable/deconz/6.0.6/Chart.lock new file mode 100644 index 00000000000..87794f89afe --- /dev/null +++ b/stable/deconz/6.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:15.962413493Z" diff --git a/stable/deconz/6.0.5/Chart.yaml b/stable/deconz/6.0.6/Chart.yaml similarity index 98% rename from stable/deconz/6.0.5/Chart.yaml rename to stable/deconz/6.0.6/Chart.yaml index ac484a9ad4a..b2b63d4e5ed 100644 --- a/stable/deconz/6.0.5/Chart.yaml +++ b/stable/deconz/6.0.6/Chart.yaml @@ -22,7 +22,7 @@ name: deconz sources: - https://github.com/dresden-elektronik/deconz-rest-plugin - https://github.com/marthoc/docker-deconz -version: 6.0.5 +version: 6.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/deconz/6.0.5/README.md b/stable/deconz/6.0.6/README.md similarity index 100% rename from stable/deconz/6.0.5/README.md rename to stable/deconz/6.0.6/README.md diff --git a/stable/deconz/6.0.5/app-readme.md b/stable/deconz/6.0.6/app-readme.md similarity index 100% rename from stable/deconz/6.0.5/app-readme.md rename to stable/deconz/6.0.6/app-readme.md diff --git a/stable/deepstack-gpu/3.0.6/charts/common-8.9.24.tgz b/stable/deconz/6.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/deepstack-gpu/3.0.6/charts/common-8.9.24.tgz rename to stable/deconz/6.0.6/charts/common-8.9.24.tgz diff --git a/stable/deconz/6.0.5/ci/test-values.yaml b/stable/deconz/6.0.6/ci/test-values.yaml similarity index 100% rename from stable/deconz/6.0.5/ci/test-values.yaml rename to stable/deconz/6.0.6/ci/test-values.yaml diff --git a/stable/deconz/6.0.5/helm-values.md b/stable/deconz/6.0.6/helm-values.md similarity index 100% rename from stable/deconz/6.0.5/helm-values.md rename to stable/deconz/6.0.6/helm-values.md diff --git a/stable/deconz/6.0.5/ix_values.yaml b/stable/deconz/6.0.6/ix_values.yaml similarity index 100% rename from stable/deconz/6.0.5/ix_values.yaml rename to stable/deconz/6.0.6/ix_values.yaml diff --git a/stable/deconz/6.0.5/questions.yaml b/stable/deconz/6.0.6/questions.yaml similarity index 99% rename from stable/deconz/6.0.5/questions.yaml rename to stable/deconz/6.0.6/questions.yaml index 987ff1ab0b6..5b719fbcf8d 100644 --- a/stable/deconz/6.0.5/questions.yaml +++ b/stable/deconz/6.0.6/questions.yaml @@ -388,7 +388,6 @@ questions: schema: type: int default: 10008 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -482,19 +481,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 10001 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -588,19 +580,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 10002 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/deconz/6.0.5/security.md b/stable/deconz/6.0.6/security.md similarity index 100% rename from stable/deconz/6.0.5/security.md rename to stable/deconz/6.0.6/security.md diff --git a/stable/deepstack-cpu/8.0.6/templates/common.yaml b/stable/deconz/6.0.6/templates/common.yaml similarity index 100% rename from stable/deepstack-cpu/8.0.6/templates/common.yaml rename to stable/deconz/6.0.6/templates/common.yaml diff --git a/stable/deepstack-gpu/3.0.6/values.yaml b/stable/deconz/6.0.6/values.yaml similarity index 100% rename from stable/deepstack-gpu/3.0.6/values.yaml rename to stable/deconz/6.0.6/values.yaml diff --git a/stable/deepstack-cpu/8.0.6/Chart.lock b/stable/deepstack-cpu/8.0.6/Chart.lock deleted file mode 100644 index 18e784e9ace..00000000000 --- a/stable/deepstack-cpu/8.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:42.371454261Z" diff --git a/stable/deepstack-cpu/8.0.6/CHANGELOG.md b/stable/deepstack-cpu/8.0.7/CHANGELOG.md similarity index 88% rename from stable/deepstack-cpu/8.0.6/CHANGELOG.md rename to stable/deepstack-cpu/8.0.7/CHANGELOG.md index 65a476c36cd..4e63746b9ca 100644 --- a/stable/deepstack-cpu/8.0.6/CHANGELOG.md +++ b/stable/deepstack-cpu/8.0.7/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [deepstack-cpu-8.0.7](https://github.com/truecharts/apps/compare/deepstack-cpu-8.0.6...deepstack-cpu-8.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [deepstack-cpu-8.0.6](https://github.com/truecharts/apps/compare/deepstack-cpu-8.0.5...deepstack-cpu-8.0.6) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [deepstack-cpu-7.0.17](https://github.com/truecharts/apps/compare/deepstack-cpu-7.0.16...deepstack-cpu-7.0.17) (2021-12-05) - diff --git a/stable/deluge/9.0.25/CONFIG.md b/stable/deepstack-cpu/8.0.7/CONFIG.md similarity index 100% rename from stable/deluge/9.0.25/CONFIG.md rename to stable/deepstack-cpu/8.0.7/CONFIG.md diff --git a/stable/deepstack-cpu/8.0.7/Chart.lock b/stable/deepstack-cpu/8.0.7/Chart.lock new file mode 100644 index 00000000000..91202f80e23 --- /dev/null +++ b/stable/deepstack-cpu/8.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:25.276498756Z" diff --git a/stable/deepstack-cpu/8.0.6/Chart.yaml b/stable/deepstack-cpu/8.0.7/Chart.yaml similarity index 98% rename from stable/deepstack-cpu/8.0.6/Chart.yaml rename to stable/deepstack-cpu/8.0.7/Chart.yaml index c8382036977..8abb5e28f19 100644 --- a/stable/deepstack-cpu/8.0.6/Chart.yaml +++ b/stable/deepstack-cpu/8.0.7/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://hub.docker.com/r/deepquestai/deepstack - https://www.deepstack.cc/ type: application -version: 8.0.6 +version: 8.0.7 annotations: truecharts.org/catagories: | - AI diff --git a/stable/deepstack-cpu/8.0.6/README.md b/stable/deepstack-cpu/8.0.7/README.md similarity index 100% rename from stable/deepstack-cpu/8.0.6/README.md rename to stable/deepstack-cpu/8.0.7/README.md diff --git a/stable/deepstack-cpu/8.0.6/app-readme.md b/stable/deepstack-cpu/8.0.7/app-readme.md similarity index 100% rename from stable/deepstack-cpu/8.0.6/app-readme.md rename to stable/deepstack-cpu/8.0.7/app-readme.md diff --git a/stable/deluge/9.0.25/charts/common-8.9.24.tgz b/stable/deepstack-cpu/8.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/deluge/9.0.25/charts/common-8.9.24.tgz rename to stable/deepstack-cpu/8.0.7/charts/common-8.9.24.tgz diff --git a/stable/deepstack-cpu/8.0.6/helm-values.md b/stable/deepstack-cpu/8.0.7/helm-values.md similarity index 96% rename from stable/deepstack-cpu/8.0.6/helm-values.md rename to stable/deepstack-cpu/8.0.7/helm-values.md index 50c5bbb7b1e..2b23970da04 100644 --- a/stable/deepstack-cpu/8.0.6/helm-values.md +++ b/stable/deepstack-cpu/8.0.7/helm-values.md @@ -14,10 +14,10 @@ You will, however, be able to use all values referenced in the common chart here | env.MODE | string | `"High"` | | | env.MODELSTORE-DETECTION | string | `"{{ .Values.persistence.modelstore.mountPath }}"` | | | env.PUID | int | `568` | | +| env.USER_ID | string | `"{{ .Values.env.PUID }}"` | | | env.VISION-DETECTION | string | `"True"` | | | env.VISION-FACE | string | `"True"` | | | env.VISION-SCENE | string | `"True"` | | -| envTpl.USER_ID | string | `"{{ .Values.env.PUID }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/deepstack-cpu"` | | | image.tag | string | `"v2021.09.1@sha256:f924cebf518a54bca2ca2ac33911cf3af4dd7403cad371781422436ce4254a28"` | | diff --git a/stable/deepstack-cpu/8.0.6/ix_values.yaml b/stable/deepstack-cpu/8.0.7/ix_values.yaml similarity index 94% rename from stable/deepstack-cpu/8.0.6/ix_values.yaml rename to stable/deepstack-cpu/8.0.7/ix_values.yaml index 3e8799c6962..01a5b43141f 100644 --- a/stable/deepstack-cpu/8.0.6/ix_values.yaml +++ b/stable/deepstack-cpu/8.0.7/ix_values.yaml @@ -18,14 +18,9 @@ podSecurityContext: runAsUser: 0 runAsGroup: 0 -envTpl: - # Permissions Settings - USER_ID: "{{ .Values.env.PUID }}" - env: PUID: 568 - - # TZ: UTC + USER_ID: "{{ .Values.env.PUID }}" VISION-FACE: "True" VISION-DETECTION: "True" VISION-SCENE: "True" diff --git a/stable/deepstack-cpu/8.0.6/questions.yaml b/stable/deepstack-cpu/8.0.7/questions.yaml similarity index 99% rename from stable/deepstack-cpu/8.0.6/questions.yaml rename to stable/deepstack-cpu/8.0.7/questions.yaml index 04f1d4bbab0..b846eb78c08 100644 --- a/stable/deepstack-cpu/8.0.6/questions.yaml +++ b/stable/deepstack-cpu/8.0.7/questions.yaml @@ -397,7 +397,6 @@ questions: schema: type: int default: 10049 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/deepstack-cpu/8.0.6/security.md b/stable/deepstack-cpu/8.0.7/security.md similarity index 100% rename from stable/deepstack-cpu/8.0.6/security.md rename to stable/deepstack-cpu/8.0.7/security.md diff --git a/stable/deepstack-gpu/3.0.6/templates/common.yaml b/stable/deepstack-cpu/8.0.7/templates/common.yaml similarity index 100% rename from stable/deepstack-gpu/3.0.6/templates/common.yaml rename to stable/deepstack-cpu/8.0.7/templates/common.yaml diff --git a/stable/deluge/9.0.25/values.yaml b/stable/deepstack-cpu/8.0.7/values.yaml similarity index 100% rename from stable/deluge/9.0.25/values.yaml rename to stable/deepstack-cpu/8.0.7/values.yaml diff --git a/stable/deepstack-gpu/3.0.6/Chart.lock b/stable/deepstack-gpu/3.0.6/Chart.lock deleted file mode 100644 index 8e2bba97e8d..00000000000 --- a/stable/deepstack-gpu/3.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:24:54.337750606Z" diff --git a/stable/deepstack-gpu/3.0.6/CHANGELOG.md b/stable/deepstack-gpu/3.0.7/CHANGELOG.md similarity index 88% rename from stable/deepstack-gpu/3.0.6/CHANGELOG.md rename to stable/deepstack-gpu/3.0.7/CHANGELOG.md index 6d620e37550..59c41d0796f 100644 --- a/stable/deepstack-gpu/3.0.6/CHANGELOG.md +++ b/stable/deepstack-gpu/3.0.7/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [deepstack-gpu-3.0.7](https://github.com/truecharts/apps/compare/deepstack-gpu-3.0.6...deepstack-gpu-3.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [deepstack-gpu-3.0.6](https://github.com/truecharts/apps/compare/deepstack-gpu-3.0.5...deepstack-gpu-3.0.6) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [deepstack-gpu-2.0.17](https://github.com/truecharts/apps/compare/deepstack-gpu-2.0.16...deepstack-gpu-2.0.17) (2021-12-05) - diff --git a/stable/digikam/2.0.26/CONFIG.md b/stable/deepstack-gpu/3.0.7/CONFIG.md similarity index 100% rename from stable/digikam/2.0.26/CONFIG.md rename to stable/deepstack-gpu/3.0.7/CONFIG.md diff --git a/stable/deepstack-gpu/3.0.7/Chart.lock b/stable/deepstack-gpu/3.0.7/Chart.lock new file mode 100644 index 00000000000..5ebc4cefd73 --- /dev/null +++ b/stable/deepstack-gpu/3.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:34.698398345Z" diff --git a/stable/deepstack-gpu/3.0.6/Chart.yaml b/stable/deepstack-gpu/3.0.7/Chart.yaml similarity index 98% rename from stable/deepstack-gpu/3.0.6/Chart.yaml rename to stable/deepstack-gpu/3.0.7/Chart.yaml index 4f0790b8c03..e394704ce3d 100644 --- a/stable/deepstack-gpu/3.0.6/Chart.yaml +++ b/stable/deepstack-gpu/3.0.7/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://hub.docker.com/r/deepquestai/deepstack - https://www.deepstack.cc/ type: application -version: 3.0.6 +version: 3.0.7 annotations: truecharts.org/catagories: | - AI diff --git a/stable/deepstack-gpu/3.0.6/README.md b/stable/deepstack-gpu/3.0.7/README.md similarity index 100% rename from stable/deepstack-gpu/3.0.6/README.md rename to stable/deepstack-gpu/3.0.7/README.md diff --git a/stable/deepstack-gpu/3.0.6/app-readme.md b/stable/deepstack-gpu/3.0.7/app-readme.md similarity index 100% rename from stable/deepstack-gpu/3.0.6/app-readme.md rename to stable/deepstack-gpu/3.0.7/app-readme.md diff --git a/stable/digikam/2.0.26/charts/common-8.9.24.tgz b/stable/deepstack-gpu/3.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/digikam/2.0.26/charts/common-8.9.24.tgz rename to stable/deepstack-gpu/3.0.7/charts/common-8.9.24.tgz diff --git a/stable/deepstack-gpu/3.0.6/helm-values.md b/stable/deepstack-gpu/3.0.7/helm-values.md similarity index 96% rename from stable/deepstack-gpu/3.0.6/helm-values.md rename to stable/deepstack-gpu/3.0.7/helm-values.md index 92ff070ca6c..ffeedc95933 100644 --- a/stable/deepstack-gpu/3.0.6/helm-values.md +++ b/stable/deepstack-gpu/3.0.7/helm-values.md @@ -14,10 +14,10 @@ You will, however, be able to use all values referenced in the common chart here | env.MODE | string | `"High"` | | | env.MODELSTORE-DETECTION | string | `"{{ .Values.persistence.modelstore.mountPath }}"` | | | env.PUID | int | `568` | | +| env.USER_ID | string | `"{{ .Values.env.PUID }}"` | | | env.VISION-DETECTION | string | `"True"` | | | env.VISION-FACE | string | `"True"` | | | env.VISION-SCENE | string | `"True"` | | -| envTpl.USER_ID | string | `"{{ .Values.env.PUID }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/deepstack-gpu"` | | | image.tag | string | `"v2021.09.1@sha256:f924cebf518a54bca2ca2ac33911cf3af4dd7403cad371781422436ce4254a28"` | | diff --git a/stable/deepstack-gpu/3.0.6/ix_values.yaml b/stable/deepstack-gpu/3.0.7/ix_values.yaml similarity index 94% rename from stable/deepstack-gpu/3.0.6/ix_values.yaml rename to stable/deepstack-gpu/3.0.7/ix_values.yaml index 7834ce950e9..7a26f89f1f2 100644 --- a/stable/deepstack-gpu/3.0.6/ix_values.yaml +++ b/stable/deepstack-gpu/3.0.7/ix_values.yaml @@ -18,14 +18,9 @@ podSecurityContext: runAsUser: 0 runAsGroup: 0 -envTpl: - # Permissions Settings - USER_ID: "{{ .Values.env.PUID }}" - env: PUID: 568 - - # TZ: UTC + USER_ID: "{{ .Values.env.PUID }}" VISION-FACE: "True" VISION-DETECTION: "True" VISION-SCENE: "True" diff --git a/stable/deepstack-gpu/3.0.6/questions.yaml b/stable/deepstack-gpu/3.0.7/questions.yaml similarity index 99% rename from stable/deepstack-gpu/3.0.6/questions.yaml rename to stable/deepstack-gpu/3.0.7/questions.yaml index eec68c93a3a..b5f8596cd09 100644 --- a/stable/deepstack-gpu/3.0.6/questions.yaml +++ b/stable/deepstack-gpu/3.0.7/questions.yaml @@ -397,7 +397,6 @@ questions: schema: type: int default: 10050 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/deepstack-gpu/3.0.6/security.md b/stable/deepstack-gpu/3.0.7/security.md similarity index 100% rename from stable/deepstack-gpu/3.0.6/security.md rename to stable/deepstack-gpu/3.0.7/security.md diff --git a/stable/deluge/9.0.25/templates/common.yaml b/stable/deepstack-gpu/3.0.7/templates/common.yaml similarity index 100% rename from stable/deluge/9.0.25/templates/common.yaml rename to stable/deepstack-gpu/3.0.7/templates/common.yaml diff --git a/stable/digikam/2.0.26/values.yaml b/stable/deepstack-gpu/3.0.7/values.yaml similarity index 100% rename from stable/digikam/2.0.26/values.yaml rename to stable/deepstack-gpu/3.0.7/values.yaml diff --git a/stable/deluge/9.0.25/Chart.lock b/stable/deluge/9.0.25/Chart.lock deleted file mode 100644 index 14148e4d2c9..00000000000 --- a/stable/deluge/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:25:01.663006375Z" diff --git a/stable/deluge/9.0.25/CHANGELOG.md b/stable/deluge/9.0.26/CHANGELOG.md similarity index 85% rename from stable/deluge/9.0.25/CHANGELOG.md rename to stable/deluge/9.0.26/CHANGELOG.md index 8cdef0baa9d..9567f9e10ed 100644 --- a/stable/deluge/9.0.25/CHANGELOG.md +++ b/stable/deluge/9.0.26/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [deluge-9.0.26](https://github.com/truecharts/apps/compare/deluge-9.0.25...deluge-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [deluge-9.0.25](https://github.com/truecharts/apps/compare/deluge-9.0.24...deluge-9.0.25) (2021-12-19) @@ -86,14 +97,3 @@ -### [deluge-9.0.17](https://github.com/truecharts/apps/compare/deluge-9.0.16...deluge-9.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [deluge-9.0.16](https://github.com/truecharts/apps/compare/deluge-9.0.15...deluge-9.0.16) (2021-12-04) - diff --git a/stable/dillinger/0.0.5/CONFIG.md b/stable/deluge/9.0.26/CONFIG.md similarity index 100% rename from stable/dillinger/0.0.5/CONFIG.md rename to stable/deluge/9.0.26/CONFIG.md diff --git a/stable/deluge/9.0.26/Chart.lock b/stable/deluge/9.0.26/Chart.lock new file mode 100644 index 00000000000..f09ec6b31ac --- /dev/null +++ b/stable/deluge/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:37.963802774Z" diff --git a/stable/deluge/9.0.25/Chart.yaml b/stable/deluge/9.0.26/Chart.yaml similarity index 97% rename from stable/deluge/9.0.25/Chart.yaml rename to stable/deluge/9.0.26/Chart.yaml index 4c0eec732f5..1b31cad5bb7 100644 --- a/stable/deluge/9.0.25/Chart.yaml +++ b/stable/deluge/9.0.26/Chart.yaml @@ -21,7 +21,7 @@ name: deluge sources: - https://github.com/deluge-torrent/deluge type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/deluge/9.0.25/README.md b/stable/deluge/9.0.26/README.md similarity index 100% rename from stable/deluge/9.0.25/README.md rename to stable/deluge/9.0.26/README.md diff --git a/stable/deluge/9.0.25/app-readme.md b/stable/deluge/9.0.26/app-readme.md similarity index 100% rename from stable/deluge/9.0.25/app-readme.md rename to stable/deluge/9.0.26/app-readme.md diff --git a/stable/dillinger/0.0.5/charts/common-8.9.24.tgz b/stable/deluge/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/dillinger/0.0.5/charts/common-8.9.24.tgz rename to stable/deluge/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/deluge/9.0.25/helm-values.md b/stable/deluge/9.0.26/helm-values.md similarity index 100% rename from stable/deluge/9.0.25/helm-values.md rename to stable/deluge/9.0.26/helm-values.md diff --git a/stable/deluge/9.0.25/ix_values.yaml b/stable/deluge/9.0.26/ix_values.yaml similarity index 100% rename from stable/deluge/9.0.25/ix_values.yaml rename to stable/deluge/9.0.26/ix_values.yaml diff --git a/stable/deluge/9.0.25/questions.yaml b/stable/deluge/9.0.26/questions.yaml similarity index 99% rename from stable/deluge/9.0.25/questions.yaml rename to stable/deluge/9.0.26/questions.yaml index 78d69e9d892..5b382a75e9c 100644 --- a/stable/deluge/9.0.25/questions.yaml +++ b/stable/deluge/9.0.26/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 8112 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -439,19 +438,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 51413 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -543,19 +535,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 51413 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/deluge/9.0.25/security.md b/stable/deluge/9.0.26/security.md similarity index 100% rename from stable/deluge/9.0.25/security.md rename to stable/deluge/9.0.26/security.md diff --git a/stable/dillinger/0.0.5/templates/common.yaml b/stable/deluge/9.0.26/templates/common.yaml similarity index 100% rename from stable/dillinger/0.0.5/templates/common.yaml rename to stable/deluge/9.0.26/templates/common.yaml diff --git a/stable/dillinger/0.0.5/values.yaml b/stable/deluge/9.0.26/values.yaml similarity index 100% rename from stable/dillinger/0.0.5/values.yaml rename to stable/deluge/9.0.26/values.yaml diff --git a/stable/digikam/2.0.26/Chart.lock b/stable/digikam/2.0.26/Chart.lock deleted file mode 100644 index fc61676149c..00000000000 --- a/stable/digikam/2.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:25:13.045556998Z" diff --git a/stable/digikam/2.0.26/CHANGELOG.md b/stable/digikam/2.0.27/CHANGELOG.md similarity index 90% rename from stable/digikam/2.0.26/CHANGELOG.md rename to stable/digikam/2.0.27/CHANGELOG.md index 8ad31837593..4800bd573d2 100644 --- a/stable/digikam/2.0.26/CHANGELOG.md +++ b/stable/digikam/2.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [digikam-2.0.27](https://github.com/truecharts/apps/compare/digikam-2.0.26...digikam-2.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [digikam-2.0.26](https://github.com/truecharts/apps/compare/digikam-2.0.25...digikam-2.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [digikam-2.0.18](https://github.com/truecharts/apps/compare/digikam-2.0.17...digikam-2.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [digikam-2.0.17](https://github.com/truecharts/apps/compare/digikam-2.0.16...digikam-2.0.17) (2021-12-04) - diff --git a/stable/dizquetv/5.0.5/CONFIG.md b/stable/digikam/2.0.27/CONFIG.md similarity index 100% rename from stable/dizquetv/5.0.5/CONFIG.md rename to stable/digikam/2.0.27/CONFIG.md diff --git a/stable/digikam/2.0.27/Chart.lock b/stable/digikam/2.0.27/Chart.lock new file mode 100644 index 00000000000..b57890e1ea9 --- /dev/null +++ b/stable/digikam/2.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:11:51.252279761Z" diff --git a/stable/digikam/2.0.26/Chart.yaml b/stable/digikam/2.0.27/Chart.yaml similarity index 97% rename from stable/digikam/2.0.26/Chart.yaml rename to stable/digikam/2.0.27/Chart.yaml index 762c217aaa2..02ca77326ca 100644 --- a/stable/digikam/2.0.26/Chart.yaml +++ b/stable/digikam/2.0.27/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-digikam - https://www.digikam.org/ type: application -version: 2.0.26 +version: 2.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/digikam/2.0.26/README.md b/stable/digikam/2.0.27/README.md similarity index 100% rename from stable/digikam/2.0.26/README.md rename to stable/digikam/2.0.27/README.md diff --git a/stable/digikam/2.0.26/app-readme.md b/stable/digikam/2.0.27/app-readme.md similarity index 100% rename from stable/digikam/2.0.26/app-readme.md rename to stable/digikam/2.0.27/app-readme.md diff --git a/stable/dizquetv/5.0.5/charts/common-8.9.24.tgz b/stable/digikam/2.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/dizquetv/5.0.5/charts/common-8.9.24.tgz rename to stable/digikam/2.0.27/charts/common-8.9.24.tgz diff --git a/stable/digikam/2.0.26/helm-values.md b/stable/digikam/2.0.27/helm-values.md similarity index 100% rename from stable/digikam/2.0.26/helm-values.md rename to stable/digikam/2.0.27/helm-values.md diff --git a/stable/digikam/2.0.26/ix_values.yaml b/stable/digikam/2.0.27/ix_values.yaml similarity index 100% rename from stable/digikam/2.0.26/ix_values.yaml rename to stable/digikam/2.0.27/ix_values.yaml diff --git a/stable/digikam/2.0.26/questions.yaml b/stable/digikam/2.0.27/questions.yaml similarity index 99% rename from stable/digikam/2.0.26/questions.yaml rename to stable/digikam/2.0.27/questions.yaml index 7cf71f1f936..ab28e53907a 100644 --- a/stable/digikam/2.0.26/questions.yaml +++ b/stable/digikam/2.0.27/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10033 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/digikam/2.0.26/security.md b/stable/digikam/2.0.27/security.md similarity index 100% rename from stable/digikam/2.0.26/security.md rename to stable/digikam/2.0.27/security.md diff --git a/stable/digikam/2.0.26/templates/common.yaml b/stable/digikam/2.0.27/templates/common.yaml similarity index 100% rename from stable/digikam/2.0.26/templates/common.yaml rename to stable/digikam/2.0.27/templates/common.yaml diff --git a/stable/dizquetv/5.0.5/values.yaml b/stable/digikam/2.0.27/values.yaml similarity index 100% rename from stable/dizquetv/5.0.5/values.yaml rename to stable/digikam/2.0.27/values.yaml diff --git a/stable/dillinger/0.0.5/CHANGELOG.md b/stable/dillinger/0.0.6/CHANGELOG.md similarity index 86% rename from stable/dillinger/0.0.5/CHANGELOG.md rename to stable/dillinger/0.0.6/CHANGELOG.md index 3b5905923f2..5bf7dc51e1f 100644 --- a/stable/dillinger/0.0.5/CHANGELOG.md +++ b/stable/dillinger/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [dillinger-0.0.6](https://github.com/truecharts/apps/compare/dillinger-0.0.5...dillinger-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [dillinger-0.0.5](https://github.com/truecharts/apps/compare/dillinger-0.0.4...dillinger-0.0.5) (2021-12-19) diff --git a/stable/dokuwiki/0.0.5/CONFIG.md b/stable/dillinger/0.0.6/CONFIG.md similarity index 100% rename from stable/dokuwiki/0.0.5/CONFIG.md rename to stable/dillinger/0.0.6/CONFIG.md diff --git a/stable/dillinger/0.0.6/Chart.lock b/stable/dillinger/0.0.6/Chart.lock new file mode 100644 index 00000000000..14170140fbb --- /dev/null +++ b/stable/dillinger/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:12:24.528008539Z" diff --git a/stable/dillinger/0.0.5/Chart.yaml b/stable/dillinger/0.0.6/Chart.yaml similarity index 98% rename from stable/dillinger/0.0.5/Chart.yaml rename to stable/dillinger/0.0.6/Chart.yaml index 9192345f5a0..ff737b0d27b 100644 --- a/stable/dillinger/0.0.5/Chart.yaml +++ b/stable/dillinger/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: dillinger -version: 0.0.5 +version: 0.0.6 appVersion: "3.39.1" description: Dillinger is a cloud-enabled, mobile-ready, offline-storage, AngularJS powered HTML5 Markdown editor. type: application diff --git a/stable/dillinger/0.0.5/README.md b/stable/dillinger/0.0.6/README.md similarity index 100% rename from stable/dillinger/0.0.5/README.md rename to stable/dillinger/0.0.6/README.md diff --git a/stable/dillinger/0.0.5/app-readme.md b/stable/dillinger/0.0.6/app-readme.md similarity index 100% rename from stable/dillinger/0.0.5/app-readme.md rename to stable/dillinger/0.0.6/app-readme.md diff --git a/stable/dokuwiki/0.0.5/charts/common-8.9.24.tgz b/stable/dillinger/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/dokuwiki/0.0.5/charts/common-8.9.24.tgz rename to stable/dillinger/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/dillinger/0.0.5/helm-values.md b/stable/dillinger/0.0.6/helm-values.md similarity index 100% rename from stable/dillinger/0.0.5/helm-values.md rename to stable/dillinger/0.0.6/helm-values.md diff --git a/stable/dillinger/0.0.5/ix_values.yaml b/stable/dillinger/0.0.6/ix_values.yaml similarity index 100% rename from stable/dillinger/0.0.5/ix_values.yaml rename to stable/dillinger/0.0.6/ix_values.yaml diff --git a/stable/dillinger/0.0.5/questions.yaml b/stable/dillinger/0.0.6/questions.yaml similarity index 100% rename from stable/dillinger/0.0.5/questions.yaml rename to stable/dillinger/0.0.6/questions.yaml diff --git a/stable/dillinger/0.0.5/security.md b/stable/dillinger/0.0.6/security.md similarity index 100% rename from stable/dillinger/0.0.5/security.md rename to stable/dillinger/0.0.6/security.md diff --git a/stable/dizquetv/5.0.5/templates/common.yaml b/stable/dillinger/0.0.6/templates/common.yaml similarity index 100% rename from stable/dizquetv/5.0.5/templates/common.yaml rename to stable/dillinger/0.0.6/templates/common.yaml diff --git a/stable/dokuwiki/0.0.5/values.yaml b/stable/dillinger/0.0.6/values.yaml similarity index 100% rename from stable/dokuwiki/0.0.5/values.yaml rename to stable/dillinger/0.0.6/values.yaml diff --git a/stable/dizquetv/5.0.5/CHANGELOG.md b/stable/dizquetv/5.0.6/CHANGELOG.md similarity index 90% rename from stable/dizquetv/5.0.5/CHANGELOG.md rename to stable/dizquetv/5.0.6/CHANGELOG.md index 9dfdfa77b99..cded53290a8 100644 --- a/stable/dizquetv/5.0.5/CHANGELOG.md +++ b/stable/dizquetv/5.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [dizquetv-5.0.6](https://github.com/truecharts/apps/compare/dizquetv-5.0.5...dizquetv-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [dizquetv-5.0.5](https://github.com/truecharts/apps/compare/dizquetv-5.0.4...dizquetv-5.0.5) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [dizquetv-4.0.16](https://github.com/truecharts/apps/compare/dizquetv-4.0.15...dizquetv-4.0.16) (2021-12-05) - -#### Chore diff --git a/stable/domoticz/0.0.7/CONFIG.md b/stable/dizquetv/5.0.6/CONFIG.md similarity index 100% rename from stable/domoticz/0.0.7/CONFIG.md rename to stable/dizquetv/5.0.6/CONFIG.md diff --git a/stable/dizquetv/5.0.6/Chart.lock b/stable/dizquetv/5.0.6/Chart.lock new file mode 100644 index 00000000000..c1da216526c --- /dev/null +++ b/stable/dizquetv/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:12:29.524204507Z" diff --git a/stable/dizquetv/5.0.5/Chart.yaml b/stable/dizquetv/5.0.6/Chart.yaml similarity index 97% rename from stable/dizquetv/5.0.5/Chart.yaml rename to stable/dizquetv/5.0.6/Chart.yaml index 103fb362ffb..090530d48d1 100644 --- a/stable/dizquetv/5.0.5/Chart.yaml +++ b/stable/dizquetv/5.0.6/Chart.yaml @@ -19,7 +19,7 @@ name: dizquetv sources: - https://github.com/vexorian/dizquetv - https://hub.docker.com/r/vexorian/dizquetv -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/dizquetv/5.0.5/README.md b/stable/dizquetv/5.0.6/README.md similarity index 100% rename from stable/dizquetv/5.0.5/README.md rename to stable/dizquetv/5.0.6/README.md diff --git a/stable/dizquetv/5.0.5/app-readme.md b/stable/dizquetv/5.0.6/app-readme.md similarity index 100% rename from stable/dizquetv/5.0.5/app-readme.md rename to stable/dizquetv/5.0.6/app-readme.md diff --git a/stable/domoticz/0.0.7/charts/common-8.9.24.tgz b/stable/dizquetv/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/domoticz/0.0.7/charts/common-8.9.24.tgz rename to stable/dizquetv/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/dizquetv/5.0.5/helm-values.md b/stable/dizquetv/5.0.6/helm-values.md similarity index 100% rename from stable/dizquetv/5.0.5/helm-values.md rename to stable/dizquetv/5.0.6/helm-values.md diff --git a/stable/dizquetv/5.0.5/ix_values.yaml b/stable/dizquetv/5.0.6/ix_values.yaml similarity index 100% rename from stable/dizquetv/5.0.5/ix_values.yaml rename to stable/dizquetv/5.0.6/ix_values.yaml diff --git a/stable/dizquetv/5.0.5/questions.yaml b/stable/dizquetv/5.0.6/questions.yaml similarity index 99% rename from stable/dizquetv/5.0.5/questions.yaml rename to stable/dizquetv/5.0.6/questions.yaml index 8cd5c382bba..53e1cc53dae 100644 --- a/stable/dizquetv/5.0.5/questions.yaml +++ b/stable/dizquetv/5.0.6/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10071 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/dizquetv/5.0.5/security.md b/stable/dizquetv/5.0.6/security.md similarity index 100% rename from stable/dizquetv/5.0.5/security.md rename to stable/dizquetv/5.0.6/security.md diff --git a/stable/dokuwiki/0.0.5/templates/common.yaml b/stable/dizquetv/5.0.6/templates/common.yaml similarity index 100% rename from stable/dokuwiki/0.0.5/templates/common.yaml rename to stable/dizquetv/5.0.6/templates/common.yaml diff --git a/stable/domoticz/0.0.7/values.yaml b/stable/dizquetv/5.0.6/values.yaml similarity index 100% rename from stable/domoticz/0.0.7/values.yaml rename to stable/dizquetv/5.0.6/values.yaml diff --git a/stable/dokuwiki/0.0.5/CHANGELOG.md b/stable/dokuwiki/0.0.6/CHANGELOG.md similarity index 86% rename from stable/dokuwiki/0.0.5/CHANGELOG.md rename to stable/dokuwiki/0.0.6/CHANGELOG.md index 5374012a1a7..8037dc9751e 100644 --- a/stable/dokuwiki/0.0.5/CHANGELOG.md +++ b/stable/dokuwiki/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [dokuwiki-0.0.6](https://github.com/truecharts/apps/compare/dokuwiki-0.0.5...dokuwiki-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [dokuwiki-0.0.5](https://github.com/truecharts/apps/compare/dokuwiki-0.0.4...dokuwiki-0.0.5) (2021-12-19) diff --git a/stable/doublecommander/2.0.27/CONFIG.md b/stable/dokuwiki/0.0.6/CONFIG.md similarity index 100% rename from stable/doublecommander/2.0.27/CONFIG.md rename to stable/dokuwiki/0.0.6/CONFIG.md diff --git a/stable/dokuwiki/0.0.6/Chart.lock b/stable/dokuwiki/0.0.6/Chart.lock new file mode 100644 index 00000000000..138b5fe23b3 --- /dev/null +++ b/stable/dokuwiki/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:12:36.161082292Z" diff --git a/stable/dokuwiki/0.0.5/Chart.yaml b/stable/dokuwiki/0.0.6/Chart.yaml similarity index 98% rename from stable/dokuwiki/0.0.5/Chart.yaml rename to stable/dokuwiki/0.0.6/Chart.yaml index d8e5cb6450e..03bad156645 100644 --- a/stable/dokuwiki/0.0.5/Chart.yaml +++ b/stable/dokuwiki/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: dokuwiki -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.28" description: Dokuwiki is a simple to use and highly versatile Open Source wiki software that doesn't require a database. type: application diff --git a/stable/dokuwiki/0.0.5/README.md b/stable/dokuwiki/0.0.6/README.md similarity index 100% rename from stable/dokuwiki/0.0.5/README.md rename to stable/dokuwiki/0.0.6/README.md diff --git a/stable/dokuwiki/0.0.5/app-readme.md b/stable/dokuwiki/0.0.6/app-readme.md similarity index 100% rename from stable/dokuwiki/0.0.5/app-readme.md rename to stable/dokuwiki/0.0.6/app-readme.md diff --git a/stable/doublecommander/2.0.27/charts/common-8.9.24.tgz b/stable/dokuwiki/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/doublecommander/2.0.27/charts/common-8.9.24.tgz rename to stable/dokuwiki/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/dokuwiki/0.0.5/helm-values.md b/stable/dokuwiki/0.0.6/helm-values.md similarity index 100% rename from stable/dokuwiki/0.0.5/helm-values.md rename to stable/dokuwiki/0.0.6/helm-values.md diff --git a/stable/dokuwiki/0.0.5/ix_values.yaml b/stable/dokuwiki/0.0.6/ix_values.yaml similarity index 100% rename from stable/dokuwiki/0.0.5/ix_values.yaml rename to stable/dokuwiki/0.0.6/ix_values.yaml diff --git a/stable/dokuwiki/0.0.5/questions.yaml b/stable/dokuwiki/0.0.6/questions.yaml similarity index 100% rename from stable/dokuwiki/0.0.5/questions.yaml rename to stable/dokuwiki/0.0.6/questions.yaml diff --git a/stable/dokuwiki/0.0.5/security.md b/stable/dokuwiki/0.0.6/security.md similarity index 100% rename from stable/dokuwiki/0.0.5/security.md rename to stable/dokuwiki/0.0.6/security.md diff --git a/stable/domoticz/0.0.7/templates/common.yaml b/stable/dokuwiki/0.0.6/templates/common.yaml similarity index 100% rename from stable/domoticz/0.0.7/templates/common.yaml rename to stable/dokuwiki/0.0.6/templates/common.yaml diff --git a/stable/doublecommander/2.0.27/values.yaml b/stable/dokuwiki/0.0.6/values.yaml similarity index 100% rename from stable/doublecommander/2.0.27/values.yaml rename to stable/dokuwiki/0.0.6/values.yaml diff --git a/stable/domoticz/0.0.7/Chart.lock b/stable/domoticz/0.0.7/Chart.lock deleted file mode 100644 index cd44fd573d1..00000000000 --- a/stable/domoticz/0.0.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:17.658380003Z" diff --git a/stable/domoticz/0.0.7/CHANGELOG.md b/stable/domoticz/0.0.8/CHANGELOG.md similarity index 90% rename from stable/domoticz/0.0.7/CHANGELOG.md rename to stable/domoticz/0.0.8/CHANGELOG.md index 9307fe9802a..f1da698e866 100644 --- a/stable/domoticz/0.0.7/CHANGELOG.md +++ b/stable/domoticz/0.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [domoticz-0.0.8](https://github.com/truecharts/apps/compare/domoticz-0.0.7...domoticz-0.0.8) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [domoticz-0.0.7](https://github.com/truecharts/apps/compare/domoticz-0.0.6...domoticz-0.0.7) (2021-12-19) diff --git a/stable/dsmr-reader/5.0.14/CONFIG.md b/stable/domoticz/0.0.8/CONFIG.md similarity index 100% rename from stable/dsmr-reader/5.0.14/CONFIG.md rename to stable/domoticz/0.0.8/CONFIG.md diff --git a/stable/domoticz/0.0.8/Chart.lock b/stable/domoticz/0.0.8/Chart.lock new file mode 100644 index 00000000000..85b077dae2e --- /dev/null +++ b/stable/domoticz/0.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:12:45.322444499Z" diff --git a/stable/domoticz/0.0.7/Chart.yaml b/stable/domoticz/0.0.8/Chart.yaml similarity index 98% rename from stable/domoticz/0.0.7/Chart.yaml rename to stable/domoticz/0.0.8/Chart.yaml index 39e0cd762d6..78cf1b5bacc 100644 --- a/stable/domoticz/0.0.7/Chart.yaml +++ b/stable/domoticz/0.0.8/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: domoticz -version: 0.0.7 +version: 0.0.8 appVersion: "2021.1.202" description: "Domoticz is a Home Automation System that lets you monitor and configure various devices like Lights, Switches and much more." type: application diff --git a/stable/domoticz/0.0.7/README.md b/stable/domoticz/0.0.8/README.md similarity index 100% rename from stable/domoticz/0.0.7/README.md rename to stable/domoticz/0.0.8/README.md diff --git a/stable/domoticz/0.0.7/app-readme.md b/stable/domoticz/0.0.8/app-readme.md similarity index 100% rename from stable/domoticz/0.0.7/app-readme.md rename to stable/domoticz/0.0.8/app-readme.md diff --git a/stable/dsmr-reader/5.0.14/charts/common-8.9.24.tgz b/stable/domoticz/0.0.8/charts/common-8.9.24.tgz similarity index 100% rename from stable/dsmr-reader/5.0.14/charts/common-8.9.24.tgz rename to stable/domoticz/0.0.8/charts/common-8.9.24.tgz diff --git a/stable/domoticz/0.0.7/helm-values.md b/stable/domoticz/0.0.8/helm-values.md similarity index 100% rename from stable/domoticz/0.0.7/helm-values.md rename to stable/domoticz/0.0.8/helm-values.md diff --git a/stable/domoticz/0.0.7/ix_values.yaml b/stable/domoticz/0.0.8/ix_values.yaml similarity index 100% rename from stable/domoticz/0.0.7/ix_values.yaml rename to stable/domoticz/0.0.8/ix_values.yaml diff --git a/stable/domoticz/0.0.7/questions.yaml b/stable/domoticz/0.0.8/questions.yaml similarity index 100% rename from stable/domoticz/0.0.7/questions.yaml rename to stable/domoticz/0.0.8/questions.yaml diff --git a/stable/domoticz/0.0.7/security.md b/stable/domoticz/0.0.8/security.md similarity index 100% rename from stable/domoticz/0.0.7/security.md rename to stable/domoticz/0.0.8/security.md diff --git a/stable/dsmr-reader/5.0.14/templates/common.yaml b/stable/domoticz/0.0.8/templates/common.yaml similarity index 100% rename from stable/dsmr-reader/5.0.14/templates/common.yaml rename to stable/domoticz/0.0.8/templates/common.yaml diff --git a/stable/dsmr-reader/5.0.14/values.yaml b/stable/domoticz/0.0.8/values.yaml similarity index 100% rename from stable/dsmr-reader/5.0.14/values.yaml rename to stable/domoticz/0.0.8/values.yaml diff --git a/stable/doublecommander/2.0.27/Chart.lock b/stable/doublecommander/2.0.27/Chart.lock deleted file mode 100644 index 266836c7568..00000000000 --- a/stable/doublecommander/2.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:31.635619459Z" diff --git a/stable/doublecommander/2.0.27/CHANGELOG.md b/stable/doublecommander/2.0.28/CHANGELOG.md similarity index 90% rename from stable/doublecommander/2.0.27/CHANGELOG.md rename to stable/doublecommander/2.0.28/CHANGELOG.md index c9a8f9104ec..cce263f573e 100644 --- a/stable/doublecommander/2.0.27/CHANGELOG.md +++ b/stable/doublecommander/2.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [doublecommander-2.0.28](https://github.com/truecharts/apps/compare/doublecommander-2.0.27...doublecommander-2.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [doublecommander-2.0.27](https://github.com/truecharts/apps/compare/doublecommander-2.0.26...doublecommander-2.0.27) (2021-12-19) @@ -87,13 +97,3 @@ -### [doublecommander-2.0.19](https://github.com/truecharts/apps/compare/doublecommander-2.0.18...doublecommander-2.0.19) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [doublecommander-2.0.18](https://github.com/truecharts/apps/compare/doublecommander-2.0.17...doublecommander-2.0.18) (2021-12-04) diff --git a/stable/duckdns/0.0.5/CONFIG.md b/stable/doublecommander/2.0.28/CONFIG.md similarity index 100% rename from stable/duckdns/0.0.5/CONFIG.md rename to stable/doublecommander/2.0.28/CONFIG.md diff --git a/stable/doublecommander/2.0.28/Chart.lock b/stable/doublecommander/2.0.28/Chart.lock new file mode 100644 index 00000000000..1047ac65f11 --- /dev/null +++ b/stable/doublecommander/2.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:00.741992855Z" diff --git a/stable/doublecommander/2.0.27/Chart.yaml b/stable/doublecommander/2.0.28/Chart.yaml similarity index 98% rename from stable/doublecommander/2.0.27/Chart.yaml rename to stable/doublecommander/2.0.28/Chart.yaml index 6b206487f88..4b907e3561a 100644 --- a/stable/doublecommander/2.0.27/Chart.yaml +++ b/stable/doublecommander/2.0.28/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-doublecommander - https://doublecmd.sourceforge.io/ type: application -version: 2.0.27 +version: 2.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/doublecommander/2.0.27/README.md b/stable/doublecommander/2.0.28/README.md similarity index 100% rename from stable/doublecommander/2.0.27/README.md rename to stable/doublecommander/2.0.28/README.md diff --git a/stable/doublecommander/2.0.27/app-readme.md b/stable/doublecommander/2.0.28/app-readme.md similarity index 100% rename from stable/doublecommander/2.0.27/app-readme.md rename to stable/doublecommander/2.0.28/app-readme.md diff --git a/stable/duckdns/0.0.5/charts/common-8.9.24.tgz b/stable/doublecommander/2.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/duckdns/0.0.5/charts/common-8.9.24.tgz rename to stable/doublecommander/2.0.28/charts/common-8.9.24.tgz diff --git a/stable/doublecommander/2.0.27/helm-values.md b/stable/doublecommander/2.0.28/helm-values.md similarity index 100% rename from stable/doublecommander/2.0.27/helm-values.md rename to stable/doublecommander/2.0.28/helm-values.md diff --git a/stable/doublecommander/2.0.27/ix_values.yaml b/stable/doublecommander/2.0.28/ix_values.yaml similarity index 100% rename from stable/doublecommander/2.0.27/ix_values.yaml rename to stable/doublecommander/2.0.28/ix_values.yaml diff --git a/stable/doublecommander/2.0.27/questions.yaml b/stable/doublecommander/2.0.28/questions.yaml similarity index 99% rename from stable/doublecommander/2.0.27/questions.yaml rename to stable/doublecommander/2.0.28/questions.yaml index 10a8dfbc90b..32bf4ffed26 100644 --- a/stable/doublecommander/2.0.27/questions.yaml +++ b/stable/doublecommander/2.0.28/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10034 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/doublecommander/2.0.27/security.md b/stable/doublecommander/2.0.28/security.md similarity index 100% rename from stable/doublecommander/2.0.27/security.md rename to stable/doublecommander/2.0.28/security.md diff --git a/stable/doublecommander/2.0.27/templates/common.yaml b/stable/doublecommander/2.0.28/templates/common.yaml similarity index 100% rename from stable/doublecommander/2.0.27/templates/common.yaml rename to stable/doublecommander/2.0.28/templates/common.yaml diff --git a/stable/duckdns/0.0.5/values.yaml b/stable/doublecommander/2.0.28/values.yaml similarity index 100% rename from stable/duckdns/0.0.5/values.yaml rename to stable/doublecommander/2.0.28/values.yaml diff --git a/stable/dsmr-reader/5.0.14/CHANGELOG.md b/stable/dsmr-reader/5.0.15/CHANGELOG.md similarity index 88% rename from stable/dsmr-reader/5.0.14/CHANGELOG.md rename to stable/dsmr-reader/5.0.15/CHANGELOG.md index b8eab35c176..dad1f939b8b 100644 --- a/stable/dsmr-reader/5.0.14/CHANGELOG.md +++ b/stable/dsmr-reader/5.0.15/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [dsmr-reader-5.0.15](https://github.com/truecharts/apps/compare/dsmr-reader-5.0.14...dsmr-reader-5.0.15) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [dsmr-reader-5.0.14](https://github.com/truecharts/apps/compare/dsmr-reader-5.0.13...dsmr-reader-5.0.14) (2021-12-19) @@ -86,14 +97,3 @@ #### Fix * try to patch the CI again... - - - - -### [dsmr-reader-5.0.6](https://github.com/truecharts/apps/compare/dsmr-reader-5.0.5...dsmr-reader-5.0.6) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - diff --git a/stable/duplicati/4.0.24/CONFIG.md b/stable/dsmr-reader/5.0.15/CONFIG.md similarity index 100% rename from stable/duplicati/4.0.24/CONFIG.md rename to stable/dsmr-reader/5.0.15/CONFIG.md diff --git a/stable/babybuddy/5.0.20/Chart.lock b/stable/dsmr-reader/5.0.15/Chart.lock similarity index 84% rename from stable/babybuddy/5.0.20/Chart.lock rename to stable/dsmr-reader/5.0.15/Chart.lock index 32b0ce7d98a..cc13142bbd8 100644 --- a/stable/babybuddy/5.0.20/Chart.lock +++ b/stable/dsmr-reader/5.0.15/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:20:22.911390561Z" +generated: "2021-12-19T23:13:11.784865076Z" diff --git a/stable/dsmr-reader/5.0.14/Chart.yaml b/stable/dsmr-reader/5.0.15/Chart.yaml similarity index 98% rename from stable/dsmr-reader/5.0.14/Chart.yaml rename to stable/dsmr-reader/5.0.15/Chart.yaml index 3dbbca28004..5df442badc6 100644 --- a/stable/dsmr-reader/5.0.14/Chart.yaml +++ b/stable/dsmr-reader/5.0.15/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "2021.09.02" description: DSMR-protocol reader, telegram data storage and energy consumption visualizer. name: dsmr-reader -version: 5.0.14 +version: 5.0.15 kubeVersion: ">=1.16.0-0" keywords: - dsmr-reader diff --git a/stable/dsmr-reader/5.0.14/README.md b/stable/dsmr-reader/5.0.15/README.md similarity index 100% rename from stable/dsmr-reader/5.0.14/README.md rename to stable/dsmr-reader/5.0.15/README.md diff --git a/stable/dsmr-reader/5.0.14/app-readme.md b/stable/dsmr-reader/5.0.15/app-readme.md similarity index 100% rename from stable/dsmr-reader/5.0.14/app-readme.md rename to stable/dsmr-reader/5.0.15/app-readme.md diff --git a/stable/duplicati/4.0.24/charts/common-8.9.24.tgz b/stable/dsmr-reader/5.0.15/charts/common-8.9.24.tgz similarity index 100% rename from stable/duplicati/4.0.24/charts/common-8.9.24.tgz rename to stable/dsmr-reader/5.0.15/charts/common-8.9.24.tgz diff --git a/stable/dsmr-reader/5.0.14/charts/postgresql-6.0.34.tgz b/stable/dsmr-reader/5.0.15/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/dsmr-reader/5.0.14/charts/postgresql-6.0.34.tgz rename to stable/dsmr-reader/5.0.15/charts/postgresql-6.0.34.tgz diff --git a/stable/dsmr-reader/5.0.14/helm-values.md b/stable/dsmr-reader/5.0.15/helm-values.md similarity index 84% rename from stable/dsmr-reader/5.0.14/helm-values.md rename to stable/dsmr-reader/5.0.15/helm-values.md index 64036ead800..d9c0d7f47ba 100644 --- a/stable/dsmr-reader/5.0.14/helm-values.md +++ b/stable/dsmr-reader/5.0.15/helm-values.md @@ -13,11 +13,6 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | env | object | See below | environment variables. See [image docs](https://github.com/xirixiz/dsmr-reader-docker#dsmr-reader---environment-variables) for more details. | | env.TZ | string | `"UTC"` | Set the container timezone | -| envTpl.DJANGO_DATABASE_ENGINE | string | `"django.db.backends.postgresql"` | | -| envTpl.DJANGO_DATABASE_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DJANGO_DATABASE_PORT | string | `"5432"` | | -| envTpl.DJANGO_DATABASE_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | -| envTpl.DJANGO_TIME_ZONE | string | `"{{ .Values.env.TZ }}"` | | | envValueFrom.DJANGO_DATABASE_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DJANGO_DATABASE_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DJANGO_DATABASE_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/dsmr-reader/5.0.14/ix_values.yaml b/stable/dsmr-reader/5.0.15/ix_values.yaml similarity index 99% rename from stable/dsmr-reader/5.0.14/ix_values.yaml rename to stable/dsmr-reader/5.0.15/ix_values.yaml index 582c8d89586..675d2825d2e 100644 --- a/stable/dsmr-reader/5.0.14/ix_values.yaml +++ b/stable/dsmr-reader/5.0.15/ix_values.yaml @@ -11,6 +11,11 @@ image: env: # -- Set the container timezone TZ: UTC + DJANGO_TIME_ZONE: "{{ .Values.env.TZ }}" + DJANGO_DATABASE_ENGINE: "django.db.backends.postgresql" + DJANGO_DATABASE_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" + DJANGO_DATABASE_USER: "{{ .Values.postgresql.postgresqlUsername }}" + DJANGO_DATABASE_PORT: "5432" securityContext: readOnlyRootFilesystem: false @@ -20,13 +25,6 @@ podSecurityContext: runAsUser: 0 runAsGroup: 0 -envTpl: - DJANGO_TIME_ZONE: "{{ .Values.env.TZ }}" - DJANGO_DATABASE_ENGINE: "django.db.backends.postgresql" - DJANGO_DATABASE_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" - DJANGO_DATABASE_USER: "{{ .Values.postgresql.postgresqlUsername }}" - DJANGO_DATABASE_PORT: "5432" - envValueFrom: DJANGO_DATABASE_PASSWORD: secretKeyRef: diff --git a/stable/dsmr-reader/5.0.14/questions.yaml b/stable/dsmr-reader/5.0.15/questions.yaml similarity index 99% rename from stable/dsmr-reader/5.0.14/questions.yaml rename to stable/dsmr-reader/5.0.15/questions.yaml index f8d4136abe2..2f1f1d1ef9b 100644 --- a/stable/dsmr-reader/5.0.14/questions.yaml +++ b/stable/dsmr-reader/5.0.15/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10009 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/dsmr-reader/5.0.14/security.md b/stable/dsmr-reader/5.0.15/security.md similarity index 100% rename from stable/dsmr-reader/5.0.14/security.md rename to stable/dsmr-reader/5.0.15/security.md diff --git a/stable/duckdns/0.0.5/templates/common.yaml b/stable/dsmr-reader/5.0.15/templates/common.yaml similarity index 100% rename from stable/duckdns/0.0.5/templates/common.yaml rename to stable/dsmr-reader/5.0.15/templates/common.yaml diff --git a/stable/duplicati/4.0.24/values.yaml b/stable/dsmr-reader/5.0.15/values.yaml similarity index 100% rename from stable/duplicati/4.0.24/values.yaml rename to stable/dsmr-reader/5.0.15/values.yaml diff --git a/stable/duckdns/0.0.5/Chart.lock b/stable/duckdns/0.0.5/Chart.lock deleted file mode 100644 index b39b7def17b..00000000000 --- a/stable/duckdns/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:47.337913008Z" diff --git a/stable/duckdns/0.0.5/CHANGELOG.md b/stable/duckdns/0.0.6/CHANGELOG.md similarity index 87% rename from stable/duckdns/0.0.5/CHANGELOG.md rename to stable/duckdns/0.0.6/CHANGELOG.md index fedffe8221c..34b58d6c739 100644 --- a/stable/duckdns/0.0.5/CHANGELOG.md +++ b/stable/duckdns/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [duckdns-0.0.6](https://github.com/truecharts/apps/compare/duckdns-0.0.5...duckdns-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [duckdns-0.0.5](https://github.com/truecharts/apps/compare/duckdns-0.0.4...duckdns-0.0.5) (2021-12-19) diff --git a/stable/emby/9.0.26/CONFIG.md b/stable/duckdns/0.0.6/CONFIG.md similarity index 100% rename from stable/emby/9.0.26/CONFIG.md rename to stable/duckdns/0.0.6/CONFIG.md diff --git a/stable/duckdns/0.0.6/Chart.lock b/stable/duckdns/0.0.6/Chart.lock new file mode 100644 index 00000000000..53e23a8eb4a --- /dev/null +++ b/stable/duckdns/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:20.748698477Z" diff --git a/stable/duckdns/0.0.5/Chart.yaml b/stable/duckdns/0.0.6/Chart.yaml similarity index 98% rename from stable/duckdns/0.0.5/Chart.yaml rename to stable/duckdns/0.0.6/Chart.yaml index 8b0977ee602..9a397360110 100644 --- a/stable/duckdns/0.0.5/Chart.yaml +++ b/stable/duckdns/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: duckdns -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.17" description: Duckdns is a free service which will point a DNS (sub domains of duckdns.org) to an IP of your choice. type: application diff --git a/stable/duckdns/0.0.5/README.md b/stable/duckdns/0.0.6/README.md similarity index 100% rename from stable/duckdns/0.0.5/README.md rename to stable/duckdns/0.0.6/README.md diff --git a/stable/duckdns/0.0.5/app-readme.md b/stable/duckdns/0.0.6/app-readme.md similarity index 100% rename from stable/duckdns/0.0.5/app-readme.md rename to stable/duckdns/0.0.6/app-readme.md diff --git a/stable/emby/9.0.26/charts/common-8.9.24.tgz b/stable/duckdns/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/emby/9.0.26/charts/common-8.9.24.tgz rename to stable/duckdns/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/duckdns/0.0.5/helm-values.md b/stable/duckdns/0.0.6/helm-values.md similarity index 100% rename from stable/duckdns/0.0.5/helm-values.md rename to stable/duckdns/0.0.6/helm-values.md diff --git a/stable/duckdns/0.0.5/ix_values.yaml b/stable/duckdns/0.0.6/ix_values.yaml similarity index 100% rename from stable/duckdns/0.0.5/ix_values.yaml rename to stable/duckdns/0.0.6/ix_values.yaml diff --git a/stable/duckdns/0.0.5/questions.yaml b/stable/duckdns/0.0.6/questions.yaml similarity index 100% rename from stable/duckdns/0.0.5/questions.yaml rename to stable/duckdns/0.0.6/questions.yaml diff --git a/stable/duckdns/0.0.5/security.md b/stable/duckdns/0.0.6/security.md similarity index 100% rename from stable/duckdns/0.0.5/security.md rename to stable/duckdns/0.0.6/security.md diff --git a/stable/duplicati/4.0.24/templates/common.yaml b/stable/duckdns/0.0.6/templates/common.yaml similarity index 100% rename from stable/duplicati/4.0.24/templates/common.yaml rename to stable/duckdns/0.0.6/templates/common.yaml diff --git a/stable/emby/9.0.26/values.yaml b/stable/duckdns/0.0.6/values.yaml similarity index 100% rename from stable/emby/9.0.26/values.yaml rename to stable/duckdns/0.0.6/values.yaml diff --git a/stable/duplicati/4.0.24/Chart.lock b/stable/duplicati/4.0.24/Chart.lock deleted file mode 100644 index 3b01136e89b..00000000000 --- a/stable/duplicati/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:53.655013752Z" diff --git a/stable/duplicati/4.0.24/CHANGELOG.md b/stable/duplicati/4.0.25/CHANGELOG.md similarity index 90% rename from stable/duplicati/4.0.24/CHANGELOG.md rename to stable/duplicati/4.0.25/CHANGELOG.md index f1015cb69ed..203626e733d 100644 --- a/stable/duplicati/4.0.24/CHANGELOG.md +++ b/stable/duplicati/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [duplicati-4.0.25](https://github.com/truecharts/apps/compare/duplicati-4.0.24...duplicati-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [duplicati-4.0.24](https://github.com/truecharts/apps/compare/duplicati-4.0.23...duplicati-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [duplicati-4.0.16](https://github.com/truecharts/apps/compare/duplicati-4.0.15...duplicati-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [duplicati-4.0.15](https://github.com/truecharts/apps/compare/duplicati-4.0.14...duplicati-4.0.15) (2021-12-04) - diff --git a/stable/embystat/0.0.5/CONFIG.md b/stable/duplicati/4.0.25/CONFIG.md similarity index 100% rename from stable/embystat/0.0.5/CONFIG.md rename to stable/duplicati/4.0.25/CONFIG.md diff --git a/stable/duplicati/4.0.25/Chart.lock b/stable/duplicati/4.0.25/Chart.lock new file mode 100644 index 00000000000..92f596004c0 --- /dev/null +++ b/stable/duplicati/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:23.788045931Z" diff --git a/stable/duplicati/4.0.24/Chart.yaml b/stable/duplicati/4.0.25/Chart.yaml similarity index 97% rename from stable/duplicati/4.0.24/Chart.yaml rename to stable/duplicati/4.0.25/Chart.yaml index 5a159329f6a..ebdb5febdab 100644 --- a/stable/duplicati/4.0.24/Chart.yaml +++ b/stable/duplicati/4.0.25/Chart.yaml @@ -18,7 +18,7 @@ name: duplicati sources: - https://hub.docker.com/r/linuxserver/duplicati/ - https://github.com/duplicati/duplicati -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/duplicati/4.0.24/README.md b/stable/duplicati/4.0.25/README.md similarity index 100% rename from stable/duplicati/4.0.24/README.md rename to stable/duplicati/4.0.25/README.md diff --git a/stable/duplicati/4.0.24/app-readme.md b/stable/duplicati/4.0.25/app-readme.md similarity index 100% rename from stable/duplicati/4.0.24/app-readme.md rename to stable/duplicati/4.0.25/app-readme.md diff --git a/stable/embystat/0.0.5/charts/common-8.9.24.tgz b/stable/duplicati/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/embystat/0.0.5/charts/common-8.9.24.tgz rename to stable/duplicati/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/duplicati/4.0.24/helm-values.md b/stable/duplicati/4.0.25/helm-values.md similarity index 100% rename from stable/duplicati/4.0.24/helm-values.md rename to stable/duplicati/4.0.25/helm-values.md diff --git a/stable/duplicati/4.0.24/ix_values.yaml b/stable/duplicati/4.0.25/ix_values.yaml similarity index 100% rename from stable/duplicati/4.0.24/ix_values.yaml rename to stable/duplicati/4.0.25/ix_values.yaml diff --git a/stable/duplicati/4.0.24/questions.yaml b/stable/duplicati/4.0.25/questions.yaml similarity index 99% rename from stable/duplicati/4.0.24/questions.yaml rename to stable/duplicati/4.0.25/questions.yaml index 51bdaac4df6..f75a1f81c59 100644 --- a/stable/duplicati/4.0.24/questions.yaml +++ b/stable/duplicati/4.0.25/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 8200 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/duplicati/4.0.24/security.md b/stable/duplicati/4.0.25/security.md similarity index 100% rename from stable/duplicati/4.0.24/security.md rename to stable/duplicati/4.0.25/security.md diff --git a/stable/emby/9.0.26/templates/common.yaml b/stable/duplicati/4.0.25/templates/common.yaml similarity index 100% rename from stable/emby/9.0.26/templates/common.yaml rename to stable/duplicati/4.0.25/templates/common.yaml diff --git a/stable/embystat/0.0.5/values.yaml b/stable/duplicati/4.0.25/values.yaml similarity index 100% rename from stable/embystat/0.0.5/values.yaml rename to stable/duplicati/4.0.25/values.yaml diff --git a/stable/emby/9.0.26/Chart.lock b/stable/emby/9.0.26/Chart.lock deleted file mode 100644 index 870e133d159..00000000000 --- a/stable/emby/9.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:27:08.12519762Z" diff --git a/stable/emby/9.0.26/CHANGELOG.md b/stable/emby/9.0.27/CHANGELOG.md similarity index 90% rename from stable/emby/9.0.26/CHANGELOG.md rename to stable/emby/9.0.27/CHANGELOG.md index f84146abe9b..731acb29f70 100644 --- a/stable/emby/9.0.26/CHANGELOG.md +++ b/stable/emby/9.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [emby-9.0.27](https://github.com/truecharts/apps/compare/embystat-0.0.5...emby-9.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [emby-9.0.26](https://github.com/truecharts/apps/compare/emby-9.0.25...emby-9.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [emby-9.0.18](https://github.com/truecharts/apps/compare/emby-9.0.17...emby-9.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [emby-9.0.17](https://github.com/truecharts/apps/compare/emby-9.0.16...emby-9.0.17) (2021-12-04) - diff --git a/stable/emulatorjs/0.0.6/CONFIG.md b/stable/emby/9.0.27/CONFIG.md similarity index 100% rename from stable/emulatorjs/0.0.6/CONFIG.md rename to stable/emby/9.0.27/CONFIG.md diff --git a/stable/emby/9.0.27/Chart.lock b/stable/emby/9.0.27/Chart.lock new file mode 100644 index 00000000000..0e5f2b53034 --- /dev/null +++ b/stable/emby/9.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:28.772943327Z" diff --git a/stable/emby/9.0.26/Chart.yaml b/stable/emby/9.0.27/Chart.yaml similarity index 97% rename from stable/emby/9.0.26/Chart.yaml rename to stable/emby/9.0.27/Chart.yaml index 9ebe0ea7026..01b6a24efcf 100644 --- a/stable/emby/9.0.26/Chart.yaml +++ b/stable/emby/9.0.27/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://hub.docker.com/r/linuxserver/emby - https://github.com/linuxserver/docker-emby.git type: application -version: 9.0.26 +version: 9.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/emby/9.0.26/README.md b/stable/emby/9.0.27/README.md similarity index 100% rename from stable/emby/9.0.26/README.md rename to stable/emby/9.0.27/README.md diff --git a/stable/emby/9.0.26/app-readme.md b/stable/emby/9.0.27/app-readme.md similarity index 100% rename from stable/emby/9.0.26/app-readme.md rename to stable/emby/9.0.27/app-readme.md diff --git a/stable/emulatorjs/0.0.6/charts/common-8.9.24.tgz b/stable/emby/9.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/emulatorjs/0.0.6/charts/common-8.9.24.tgz rename to stable/emby/9.0.27/charts/common-8.9.24.tgz diff --git a/stable/emby/9.0.26/helm-values.md b/stable/emby/9.0.27/helm-values.md similarity index 100% rename from stable/emby/9.0.26/helm-values.md rename to stable/emby/9.0.27/helm-values.md diff --git a/stable/emby/9.0.26/ix_values.yaml b/stable/emby/9.0.27/ix_values.yaml similarity index 100% rename from stable/emby/9.0.26/ix_values.yaml rename to stable/emby/9.0.27/ix_values.yaml diff --git a/stable/emby/9.0.26/questions.yaml b/stable/emby/9.0.27/questions.yaml similarity index 99% rename from stable/emby/9.0.26/questions.yaml rename to stable/emby/9.0.27/questions.yaml index 1e67504791b..9a15626bac6 100644 --- a/stable/emby/9.0.26/questions.yaml +++ b/stable/emby/9.0.27/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10079 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/emby/9.0.26/security.md b/stable/emby/9.0.27/security.md similarity index 100% rename from stable/emby/9.0.26/security.md rename to stable/emby/9.0.27/security.md diff --git a/stable/embystat/0.0.5/templates/common.yaml b/stable/emby/9.0.27/templates/common.yaml similarity index 100% rename from stable/embystat/0.0.5/templates/common.yaml rename to stable/emby/9.0.27/templates/common.yaml diff --git a/stable/emulatorjs/0.0.6/values.yaml b/stable/emby/9.0.27/values.yaml similarity index 100% rename from stable/emulatorjs/0.0.6/values.yaml rename to stable/emby/9.0.27/values.yaml diff --git a/stable/embystat/0.0.5/Chart.lock b/stable/embystat/0.0.5/Chart.lock deleted file mode 100644 index 4280aad84c7..00000000000 --- a/stable/embystat/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:27:05.494591917Z" diff --git a/stable/embystat/0.0.5/CHANGELOG.md b/stable/embystat/0.0.6/CHANGELOG.md similarity index 86% rename from stable/embystat/0.0.5/CHANGELOG.md rename to stable/embystat/0.0.6/CHANGELOG.md index dfbc8f48de0..591a11d7f1a 100644 --- a/stable/embystat/0.0.5/CHANGELOG.md +++ b/stable/embystat/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [embystat-0.0.6](https://github.com/truecharts/apps/compare/embystat-0.0.5...embystat-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [embystat-0.0.5](https://github.com/truecharts/apps/compare/embystat-0.0.4...embystat-0.0.5) (2021-12-19) diff --git a/stable/endlessh/0.0.5/CONFIG.md b/stable/embystat/0.0.6/CONFIG.md similarity index 100% rename from stable/endlessh/0.0.5/CONFIG.md rename to stable/embystat/0.0.6/CONFIG.md diff --git a/stable/embystat/0.0.6/Chart.lock b/stable/embystat/0.0.6/Chart.lock new file mode 100644 index 00000000000..337182ad3fe --- /dev/null +++ b/stable/embystat/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:43.042557231Z" diff --git a/stable/embystat/0.0.5/Chart.yaml b/stable/embystat/0.0.6/Chart.yaml similarity index 98% rename from stable/embystat/0.0.5/Chart.yaml rename to stable/embystat/0.0.6/Chart.yaml index 04a5eca5a84..eb462f11589 100644 --- a/stable/embystat/0.0.5/Chart.yaml +++ b/stable/embystat/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: embystat -version: 0.0.5 +version: 0.0.6 appVersion: "0.2.0" description: Embystat is a personal web server that can calculate all kinds of statistics from your (local) Emby server. type: application diff --git a/stable/embystat/0.0.5/README.md b/stable/embystat/0.0.6/README.md similarity index 100% rename from stable/embystat/0.0.5/README.md rename to stable/embystat/0.0.6/README.md diff --git a/stable/embystat/0.0.5/app-readme.md b/stable/embystat/0.0.6/app-readme.md similarity index 100% rename from stable/embystat/0.0.5/app-readme.md rename to stable/embystat/0.0.6/app-readme.md diff --git a/stable/endlessh/0.0.5/charts/common-8.9.24.tgz b/stable/embystat/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/endlessh/0.0.5/charts/common-8.9.24.tgz rename to stable/embystat/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/embystat/0.0.5/helm-values.md b/stable/embystat/0.0.6/helm-values.md similarity index 100% rename from stable/embystat/0.0.5/helm-values.md rename to stable/embystat/0.0.6/helm-values.md diff --git a/stable/embystat/0.0.5/ix_values.yaml b/stable/embystat/0.0.6/ix_values.yaml similarity index 100% rename from stable/embystat/0.0.5/ix_values.yaml rename to stable/embystat/0.0.6/ix_values.yaml diff --git a/stable/embystat/0.0.5/questions.yaml b/stable/embystat/0.0.6/questions.yaml similarity index 100% rename from stable/embystat/0.0.5/questions.yaml rename to stable/embystat/0.0.6/questions.yaml diff --git a/stable/embystat/0.0.5/security.md b/stable/embystat/0.0.6/security.md similarity index 100% rename from stable/embystat/0.0.5/security.md rename to stable/embystat/0.0.6/security.md diff --git a/stable/emulatorjs/0.0.6/templates/common.yaml b/stable/embystat/0.0.6/templates/common.yaml similarity index 100% rename from stable/emulatorjs/0.0.6/templates/common.yaml rename to stable/embystat/0.0.6/templates/common.yaml diff --git a/stable/endlessh/0.0.5/values.yaml b/stable/embystat/0.0.6/values.yaml similarity index 100% rename from stable/endlessh/0.0.5/values.yaml rename to stable/embystat/0.0.6/values.yaml diff --git a/stable/emulatorjs/0.0.6/Chart.lock b/stable/emulatorjs/0.0.6/Chart.lock deleted file mode 100644 index c511e532ef9..00000000000 --- a/stable/emulatorjs/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:27:17.800570867Z" diff --git a/stable/emulatorjs/0.0.6/CHANGELOG.md b/stable/emulatorjs/0.0.7/CHANGELOG.md similarity index 88% rename from stable/emulatorjs/0.0.6/CHANGELOG.md rename to stable/emulatorjs/0.0.7/CHANGELOG.md index f52b6978b1f..a23621927e8 100644 --- a/stable/emulatorjs/0.0.6/CHANGELOG.md +++ b/stable/emulatorjs/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [emulatorjs-0.0.7](https://github.com/truecharts/apps/compare/emulatorjs-0.0.6...emulatorjs-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [emulatorjs-0.0.6](https://github.com/truecharts/apps/compare/emulatorjs-0.0.5...emulatorjs-0.0.6) (2021-12-19) diff --git a/stable/esphome/9.0.29/CONFIG.md b/stable/emulatorjs/0.0.7/CONFIG.md similarity index 100% rename from stable/esphome/9.0.29/CONFIG.md rename to stable/emulatorjs/0.0.7/CONFIG.md diff --git a/stable/emulatorjs/0.0.7/Chart.lock b/stable/emulatorjs/0.0.7/Chart.lock new file mode 100644 index 00000000000..396263cae46 --- /dev/null +++ b/stable/emulatorjs/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:56.073108139Z" diff --git a/stable/emulatorjs/0.0.6/Chart.yaml b/stable/emulatorjs/0.0.7/Chart.yaml similarity index 98% rename from stable/emulatorjs/0.0.6/Chart.yaml rename to stable/emulatorjs/0.0.7/Chart.yaml index 51f1ea30a91..f6f2fefe112 100644 --- a/stable/emulatorjs/0.0.6/Chart.yaml +++ b/stable/emulatorjs/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: emulatorjs -version: 0.0.6 +version: 0.0.7 appVersion: "1.4.2" description: Emulatorjs - In browser web based emulation portable to nearly any device for many retro consoles. type: application diff --git a/stable/emulatorjs/0.0.6/README.md b/stable/emulatorjs/0.0.7/README.md similarity index 100% rename from stable/emulatorjs/0.0.6/README.md rename to stable/emulatorjs/0.0.7/README.md diff --git a/stable/emulatorjs/0.0.6/app-readme.md b/stable/emulatorjs/0.0.7/app-readme.md similarity index 100% rename from stable/emulatorjs/0.0.6/app-readme.md rename to stable/emulatorjs/0.0.7/app-readme.md diff --git a/stable/esphome/9.0.29/charts/common-8.9.24.tgz b/stable/emulatorjs/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/esphome/9.0.29/charts/common-8.9.24.tgz rename to stable/emulatorjs/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/emulatorjs/0.0.6/helm-values.md b/stable/emulatorjs/0.0.7/helm-values.md similarity index 100% rename from stable/emulatorjs/0.0.6/helm-values.md rename to stable/emulatorjs/0.0.7/helm-values.md diff --git a/stable/emulatorjs/0.0.6/ix_values.yaml b/stable/emulatorjs/0.0.7/ix_values.yaml similarity index 100% rename from stable/emulatorjs/0.0.6/ix_values.yaml rename to stable/emulatorjs/0.0.7/ix_values.yaml diff --git a/stable/emulatorjs/0.0.6/questions.yaml b/stable/emulatorjs/0.0.7/questions.yaml similarity index 100% rename from stable/emulatorjs/0.0.6/questions.yaml rename to stable/emulatorjs/0.0.7/questions.yaml diff --git a/stable/emulatorjs/0.0.6/security.md b/stable/emulatorjs/0.0.7/security.md similarity index 100% rename from stable/emulatorjs/0.0.6/security.md rename to stable/emulatorjs/0.0.7/security.md diff --git a/stable/endlessh/0.0.5/templates/common.yaml b/stable/emulatorjs/0.0.7/templates/common.yaml similarity index 100% rename from stable/endlessh/0.0.5/templates/common.yaml rename to stable/emulatorjs/0.0.7/templates/common.yaml diff --git a/stable/esphome/9.0.29/values.yaml b/stable/emulatorjs/0.0.7/values.yaml similarity index 100% rename from stable/esphome/9.0.29/values.yaml rename to stable/emulatorjs/0.0.7/values.yaml diff --git a/stable/endlessh/0.0.5/Chart.lock b/stable/endlessh/0.0.5/Chart.lock deleted file mode 100644 index c761d6f07f2..00000000000 --- a/stable/endlessh/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:27:26.971736268Z" diff --git a/stable/endlessh/0.0.5/CHANGELOG.md b/stable/endlessh/0.0.6/CHANGELOG.md similarity index 86% rename from stable/endlessh/0.0.5/CHANGELOG.md rename to stable/endlessh/0.0.6/CHANGELOG.md index ddcb9f4a190..409175859e4 100644 --- a/stable/endlessh/0.0.5/CHANGELOG.md +++ b/stable/endlessh/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [endlessh-0.0.6](https://github.com/truecharts/apps/compare/endlessh-0.0.5...endlessh-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [endlessh-0.0.5](https://github.com/truecharts/apps/compare/endlessh-0.0.4...endlessh-0.0.5) (2021-12-19) diff --git a/stable/etherpad/5.0.15/CONFIG.md b/stable/endlessh/0.0.6/CONFIG.md similarity index 100% rename from stable/etherpad/5.0.15/CONFIG.md rename to stable/endlessh/0.0.6/CONFIG.md diff --git a/stable/endlessh/0.0.6/Chart.lock b/stable/endlessh/0.0.6/Chart.lock new file mode 100644 index 00000000000..3f983e7225b --- /dev/null +++ b/stable/endlessh/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:13:57.624471633Z" diff --git a/stable/endlessh/0.0.5/Chart.yaml b/stable/endlessh/0.0.6/Chart.yaml similarity index 98% rename from stable/endlessh/0.0.5/Chart.yaml rename to stable/endlessh/0.0.6/Chart.yaml index d4568dbe50c..4c530c4a064 100644 --- a/stable/endlessh/0.0.5/Chart.yaml +++ b/stable/endlessh/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: endlessh -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.21" description: Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. type: application diff --git a/stable/endlessh/0.0.5/README.md b/stable/endlessh/0.0.6/README.md similarity index 100% rename from stable/endlessh/0.0.5/README.md rename to stable/endlessh/0.0.6/README.md diff --git a/stable/endlessh/0.0.5/app-readme.md b/stable/endlessh/0.0.6/app-readme.md similarity index 100% rename from stable/endlessh/0.0.5/app-readme.md rename to stable/endlessh/0.0.6/app-readme.md diff --git a/stable/etherpad/5.0.15/charts/common-8.9.24.tgz b/stable/endlessh/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/etherpad/5.0.15/charts/common-8.9.24.tgz rename to stable/endlessh/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/endlessh/0.0.5/helm-values.md b/stable/endlessh/0.0.6/helm-values.md similarity index 100% rename from stable/endlessh/0.0.5/helm-values.md rename to stable/endlessh/0.0.6/helm-values.md diff --git a/stable/endlessh/0.0.5/ix_values.yaml b/stable/endlessh/0.0.6/ix_values.yaml similarity index 100% rename from stable/endlessh/0.0.5/ix_values.yaml rename to stable/endlessh/0.0.6/ix_values.yaml diff --git a/stable/endlessh/0.0.5/questions.yaml b/stable/endlessh/0.0.6/questions.yaml similarity index 100% rename from stable/endlessh/0.0.5/questions.yaml rename to stable/endlessh/0.0.6/questions.yaml diff --git a/stable/endlessh/0.0.5/security.md b/stable/endlessh/0.0.6/security.md similarity index 100% rename from stable/endlessh/0.0.5/security.md rename to stable/endlessh/0.0.6/security.md diff --git a/stable/esphome/9.0.29/templates/common.yaml b/stable/endlessh/0.0.6/templates/common.yaml similarity index 100% rename from stable/esphome/9.0.29/templates/common.yaml rename to stable/endlessh/0.0.6/templates/common.yaml diff --git a/stable/etherpad/5.0.15/values.yaml b/stable/endlessh/0.0.6/values.yaml similarity index 100% rename from stable/etherpad/5.0.15/values.yaml rename to stable/endlessh/0.0.6/values.yaml diff --git a/stable/esphome/9.0.29/Chart.lock b/stable/esphome/9.0.29/Chart.lock deleted file mode 100644 index 1de2a05d91c..00000000000 --- a/stable/esphome/9.0.29/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:27:35.400700289Z" diff --git a/stable/esphome/9.0.29/CHANGELOG.md b/stable/esphome/9.0.30/CHANGELOG.md similarity index 90% rename from stable/esphome/9.0.29/CHANGELOG.md rename to stable/esphome/9.0.30/CHANGELOG.md index 6a873056ca9..24918a15d19 100644 --- a/stable/esphome/9.0.29/CHANGELOG.md +++ b/stable/esphome/9.0.30/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [esphome-9.0.30](https://github.com/truecharts/apps/compare/esphome-9.0.29...esphome-9.0.30) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [esphome-9.0.29](https://github.com/truecharts/apps/compare/esphome-9.0.28...esphome-9.0.29) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [esphome-9.0.20](https://github.com/truecharts/apps/compare/esphome-9.0.19...esphome-9.0.20) (2021-12-05) - diff --git a/stable/external-service/4.0.23/CONFIG.md b/stable/esphome/9.0.30/CONFIG.md similarity index 100% rename from stable/external-service/4.0.23/CONFIG.md rename to stable/esphome/9.0.30/CONFIG.md diff --git a/stable/esphome/9.0.30/Chart.lock b/stable/esphome/9.0.30/Chart.lock new file mode 100644 index 00000000000..9373335d602 --- /dev/null +++ b/stable/esphome/9.0.30/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:14:09.478962367Z" diff --git a/stable/esphome/9.0.29/Chart.yaml b/stable/esphome/9.0.30/Chart.yaml similarity index 98% rename from stable/esphome/9.0.29/Chart.yaml rename to stable/esphome/9.0.30/Chart.yaml index 836be8ae3fd..cdb714d19ca 100644 --- a/stable/esphome/9.0.29/Chart.yaml +++ b/stable/esphome/9.0.30/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/esphome/esphome - https://hub.docker.com/u/esphome type: application -version: 9.0.29 +version: 9.0.30 annotations: truecharts.org/catagories: | - tools diff --git a/stable/esphome/9.0.29/README.md b/stable/esphome/9.0.30/README.md similarity index 100% rename from stable/esphome/9.0.29/README.md rename to stable/esphome/9.0.30/README.md diff --git a/stable/esphome/9.0.29/app-readme.md b/stable/esphome/9.0.30/app-readme.md similarity index 100% rename from stable/esphome/9.0.29/app-readme.md rename to stable/esphome/9.0.30/app-readme.md diff --git a/stable/external-service/4.0.23/charts/common-8.9.24.tgz b/stable/esphome/9.0.30/charts/common-8.9.24.tgz similarity index 100% rename from stable/external-service/4.0.23/charts/common-8.9.24.tgz rename to stable/esphome/9.0.30/charts/common-8.9.24.tgz diff --git a/stable/esphome/9.0.29/helm-values.md b/stable/esphome/9.0.30/helm-values.md similarity index 100% rename from stable/esphome/9.0.29/helm-values.md rename to stable/esphome/9.0.30/helm-values.md diff --git a/stable/esphome/9.0.29/ix_values.yaml b/stable/esphome/9.0.30/ix_values.yaml similarity index 100% rename from stable/esphome/9.0.29/ix_values.yaml rename to stable/esphome/9.0.30/ix_values.yaml diff --git a/stable/esphome/9.0.29/questions.yaml b/stable/esphome/9.0.30/questions.yaml similarity index 99% rename from stable/esphome/9.0.29/questions.yaml rename to stable/esphome/9.0.30/questions.yaml index 283a2d37644..5cac754256f 100644 --- a/stable/esphome/9.0.29/questions.yaml +++ b/stable/esphome/9.0.30/questions.yaml @@ -343,7 +343,6 @@ questions: schema: type: int default: 6052 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/esphome/9.0.29/security.md b/stable/esphome/9.0.30/security.md similarity index 100% rename from stable/esphome/9.0.29/security.md rename to stable/esphome/9.0.30/security.md diff --git a/stable/etherpad/5.0.15/templates/common.yaml b/stable/esphome/9.0.30/templates/common.yaml similarity index 100% rename from stable/etherpad/5.0.15/templates/common.yaml rename to stable/esphome/9.0.30/templates/common.yaml diff --git a/stable/external-service/4.0.23/values.yaml b/stable/esphome/9.0.30/values.yaml similarity index 100% rename from stable/external-service/4.0.23/values.yaml rename to stable/esphome/9.0.30/values.yaml diff --git a/stable/etherpad/5.0.15/CHANGELOG.md b/stable/etherpad/5.0.16/CHANGELOG.md similarity index 88% rename from stable/etherpad/5.0.15/CHANGELOG.md rename to stable/etherpad/5.0.16/CHANGELOG.md index 9f2ea8d7ec2..b19b0a52c19 100644 --- a/stable/etherpad/5.0.15/CHANGELOG.md +++ b/stable/etherpad/5.0.16/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [etherpad-5.0.16](https://github.com/truecharts/apps/compare/etherpad-5.0.15...etherpad-5.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [etherpad-5.0.15](https://github.com/truecharts/apps/compare/etherpad-5.0.14...etherpad-5.0.15) (2021-12-19) @@ -86,14 +97,3 @@ - -### [etherpad-5.0.7](https://github.com/truecharts/apps/compare/etherpad-5.0.6...etherpad-5.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [etherpad-5.0.6](https://github.com/truecharts/apps/compare/etherpad-5.0.5...etherpad-5.0.6) (2021-12-04) diff --git a/stable/filezilla/2.0.24/CONFIG.md b/stable/etherpad/5.0.16/CONFIG.md similarity index 100% rename from stable/filezilla/2.0.24/CONFIG.md rename to stable/etherpad/5.0.16/CONFIG.md diff --git a/stable/blog/0.0.14/Chart.lock b/stable/etherpad/5.0.16/Chart.lock similarity index 84% rename from stable/blog/0.0.14/Chart.lock rename to stable/etherpad/5.0.16/Chart.lock index 1f31ea2c4c3..5abf304fb4b 100644 --- a/stable/blog/0.0.14/Chart.lock +++ b/stable/etherpad/5.0.16/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:21:03.338121022Z" +generated: "2021-12-19T23:14:18.686136858Z" diff --git a/stable/etherpad/5.0.15/Chart.yaml b/stable/etherpad/5.0.16/Chart.yaml similarity index 98% rename from stable/etherpad/5.0.15/Chart.yaml rename to stable/etherpad/5.0.16/Chart.yaml index 53ebc08655e..a378e2a9182 100644 --- a/stable/etherpad/5.0.15/Chart.yaml +++ b/stable/etherpad/5.0.16/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 appVersion: "1.8.14" -version: 5.0.15 +version: 5.0.16 kubeVersion: '>=1.16.0-0' name: etherpad description: A real-time collaborative editor scalable to thousands of simultaneous real time users. diff --git a/stable/etherpad/5.0.15/README.md b/stable/etherpad/5.0.16/README.md similarity index 100% rename from stable/etherpad/5.0.15/README.md rename to stable/etherpad/5.0.16/README.md diff --git a/stable/etherpad/5.0.15/app-readme.md b/stable/etherpad/5.0.16/app-readme.md similarity index 100% rename from stable/etherpad/5.0.15/app-readme.md rename to stable/etherpad/5.0.16/app-readme.md diff --git a/stable/filezilla/2.0.24/charts/common-8.9.24.tgz b/stable/etherpad/5.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/filezilla/2.0.24/charts/common-8.9.24.tgz rename to stable/etherpad/5.0.16/charts/common-8.9.24.tgz diff --git a/stable/etherpad/5.0.15/charts/postgresql-6.0.34.tgz b/stable/etherpad/5.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/etherpad/5.0.15/charts/postgresql-6.0.34.tgz rename to stable/etherpad/5.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/etherpad/5.0.15/helm-values.md b/stable/etherpad/5.0.16/helm-values.md similarity index 88% rename from stable/etherpad/5.0.15/helm-values.md rename to stable/etherpad/5.0.16/helm-values.md index cba109f72f8..073f9dc9a2a 100644 --- a/stable/etherpad/5.0.15/helm-values.md +++ b/stable/etherpad/5.0.16/helm-values.md @@ -11,11 +11,10 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| -| env | object | `{}` | | -| envTpl.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DB_PORT | string | `"5432"` | | -| envTpl.DB_TYPE | string | `"postgres"` | | -| envTpl.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.DB_PORT | string | `"5432"` | | +| env.DB_TYPE | string | `"postgres"` | | +| env.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DB_PASS.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/etherpad/5.0.15/ix_values.yaml b/stable/etherpad/5.0.16/ix_values.yaml similarity index 98% rename from stable/etherpad/5.0.15/ix_values.yaml rename to stable/etherpad/5.0.16/ix_values.yaml index 465e604bda5..1f83da2631b 100644 --- a/stable/etherpad/5.0.15/ix_values.yaml +++ b/stable/etherpad/5.0.16/ix_values.yaml @@ -8,9 +8,7 @@ secret: {} # See more environment variables in the etherpad documentation # https://github.com/ether/etherpad-lite/blob/develop/doc/docker.md # For Mariadb, use DB_TYPE: mysql https://github.com/ether/etherpad-lite/issues/4214 -env: {} - -envTpl: +env: DB_TYPE: "postgres" DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/etherpad/5.0.15/questions.yaml b/stable/etherpad/5.0.16/questions.yaml similarity index 99% rename from stable/etherpad/5.0.15/questions.yaml rename to stable/etherpad/5.0.16/questions.yaml index 078a6492926..033e3cfd5b3 100644 --- a/stable/etherpad/5.0.15/questions.yaml +++ b/stable/etherpad/5.0.16/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10060 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/etherpad/5.0.15/security.md b/stable/etherpad/5.0.16/security.md similarity index 100% rename from stable/etherpad/5.0.15/security.md rename to stable/etherpad/5.0.16/security.md diff --git a/stable/external-service/4.0.23/templates/common.yaml b/stable/etherpad/5.0.16/templates/common.yaml similarity index 100% rename from stable/external-service/4.0.23/templates/common.yaml rename to stable/etherpad/5.0.16/templates/common.yaml diff --git a/stable/filezilla/2.0.24/values.yaml b/stable/etherpad/5.0.16/values.yaml similarity index 100% rename from stable/filezilla/2.0.24/values.yaml rename to stable/etherpad/5.0.16/values.yaml diff --git a/stable/external-service/4.0.23/Chart.lock b/stable/external-service/4.0.23/Chart.lock deleted file mode 100644 index 50036263ac9..00000000000 --- a/stable/external-service/4.0.23/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:28:00.030720207Z" diff --git a/stable/external-service/4.0.23/CHANGELOG.md b/stable/external-service/4.0.24/CHANGELOG.md similarity index 93% rename from stable/external-service/4.0.23/CHANGELOG.md rename to stable/external-service/4.0.24/CHANGELOG.md index d9503eb61cc..a4afcf651d3 100644 --- a/stable/external-service/4.0.23/CHANGELOG.md +++ b/stable/external-service/4.0.24/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [external-service-4.0.24](https://github.com/truecharts/apps/compare/external-service-4.0.23...external-service-4.0.24) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [external-service-4.0.23](https://github.com/truecharts/apps/compare/external-service-4.0.22...external-service-4.0.23) (2021-12-19) @@ -88,12 +97,3 @@ #### Chore -* bump apps to generate security page - - - - -### [external-service-4.0.14](https://github.com/truecharts/apps/compare/external-service-4.0.13...external-service-4.0.14) (2021-12-04) - -#### Chore - diff --git a/stable/firefox-syncserver/5.0.15/CONFIG.md b/stable/external-service/4.0.24/CONFIG.md similarity index 100% rename from stable/firefox-syncserver/5.0.15/CONFIG.md rename to stable/external-service/4.0.24/CONFIG.md diff --git a/stable/external-service/4.0.24/Chart.lock b/stable/external-service/4.0.24/Chart.lock new file mode 100644 index 00000000000..917ddd001bc --- /dev/null +++ b/stable/external-service/4.0.24/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:14:31.527490587Z" diff --git a/stable/external-service/4.0.23/Chart.yaml b/stable/external-service/4.0.24/Chart.yaml similarity index 97% rename from stable/external-service/4.0.23/Chart.yaml rename to stable/external-service/4.0.24/Chart.yaml index 17f3005b3d4..8c7451b6057 100644 --- a/stable/external-service/4.0.23/Chart.yaml +++ b/stable/external-service/4.0.24/Chart.yaml @@ -20,7 +20,7 @@ name: external-service sources: - https://github.com/truecharts/apps/tree/master/charts/stable/external-service type: application -version: 4.0.23 +version: 4.0.24 annotations: truecharts.org/catagories: | - networking diff --git a/stable/external-service/4.0.23/README.md b/stable/external-service/4.0.24/README.md similarity index 100% rename from stable/external-service/4.0.23/README.md rename to stable/external-service/4.0.24/README.md diff --git a/stable/external-service/4.0.23/app-readme.md b/stable/external-service/4.0.24/app-readme.md similarity index 100% rename from stable/external-service/4.0.23/app-readme.md rename to stable/external-service/4.0.24/app-readme.md diff --git a/stable/firefox-syncserver/5.0.15/charts/common-8.9.24.tgz b/stable/external-service/4.0.24/charts/common-8.9.24.tgz similarity index 100% rename from stable/firefox-syncserver/5.0.15/charts/common-8.9.24.tgz rename to stable/external-service/4.0.24/charts/common-8.9.24.tgz diff --git a/stable/external-service/4.0.23/helm-values.md b/stable/external-service/4.0.24/helm-values.md similarity index 100% rename from stable/external-service/4.0.23/helm-values.md rename to stable/external-service/4.0.24/helm-values.md diff --git a/stable/external-service/4.0.23/ix_values.yaml b/stable/external-service/4.0.24/ix_values.yaml similarity index 100% rename from stable/external-service/4.0.23/ix_values.yaml rename to stable/external-service/4.0.24/ix_values.yaml diff --git a/stable/external-service/4.0.23/questions.yaml b/stable/external-service/4.0.24/questions.yaml similarity index 100% rename from stable/external-service/4.0.23/questions.yaml rename to stable/external-service/4.0.24/questions.yaml diff --git a/stable/external-service/4.0.23/security.md b/stable/external-service/4.0.24/security.md similarity index 100% rename from stable/external-service/4.0.23/security.md rename to stable/external-service/4.0.24/security.md diff --git a/stable/firefox-syncserver/5.0.15/templates/common.yaml b/stable/external-service/4.0.24/templates/common.yaml similarity index 100% rename from stable/firefox-syncserver/5.0.15/templates/common.yaml rename to stable/external-service/4.0.24/templates/common.yaml diff --git a/stable/firefox-syncserver/5.0.15/values.yaml b/stable/external-service/4.0.24/values.yaml similarity index 100% rename from stable/firefox-syncserver/5.0.15/values.yaml rename to stable/external-service/4.0.24/values.yaml diff --git a/stable/filezilla/2.0.24/Chart.lock b/stable/filezilla/2.0.24/Chart.lock deleted file mode 100644 index 412c84744ac..00000000000 --- a/stable/filezilla/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:28:04.542092841Z" diff --git a/stable/filezilla/2.0.24/CHANGELOG.md b/stable/filezilla/2.0.25/CHANGELOG.md similarity index 90% rename from stable/filezilla/2.0.24/CHANGELOG.md rename to stable/filezilla/2.0.25/CHANGELOG.md index 6a775a67d42..2b34b11af90 100644 --- a/stable/filezilla/2.0.24/CHANGELOG.md +++ b/stable/filezilla/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [filezilla-2.0.25](https://github.com/truecharts/apps/compare/filezilla-2.0.24...filezilla-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [filezilla-2.0.24](https://github.com/truecharts/apps/compare/filezilla-2.0.23...filezilla-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [filezilla-2.0.16](https://github.com/truecharts/apps/compare/filezilla-2.0.15...filezilla-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [filezilla-2.0.15](https://github.com/truecharts/apps/compare/filezilla-2.0.14...filezilla-2.0.15) (2021-12-04) - diff --git a/stable/firefox/0.0.5/CONFIG.md b/stable/filezilla/2.0.25/CONFIG.md similarity index 100% rename from stable/firefox/0.0.5/CONFIG.md rename to stable/filezilla/2.0.25/CONFIG.md diff --git a/stable/filezilla/2.0.25/Chart.lock b/stable/filezilla/2.0.25/Chart.lock new file mode 100644 index 00000000000..a7a21a33321 --- /dev/null +++ b/stable/filezilla/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:14:36.191997527Z" diff --git a/stable/filezilla/2.0.24/Chart.yaml b/stable/filezilla/2.0.25/Chart.yaml similarity index 97% rename from stable/filezilla/2.0.24/Chart.yaml rename to stable/filezilla/2.0.25/Chart.yaml index 24cf056be9c..4608cd24d91 100644 --- a/stable/filezilla/2.0.24/Chart.yaml +++ b/stable/filezilla/2.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://filezilla-project.org/ - https://github.com/linuxserver/docker-filezilla type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/filezilla/2.0.24/README.md b/stable/filezilla/2.0.25/README.md similarity index 100% rename from stable/filezilla/2.0.24/README.md rename to stable/filezilla/2.0.25/README.md diff --git a/stable/filezilla/2.0.24/app-readme.md b/stable/filezilla/2.0.25/app-readme.md similarity index 100% rename from stable/filezilla/2.0.24/app-readme.md rename to stable/filezilla/2.0.25/app-readme.md diff --git a/stable/firefox/0.0.5/charts/common-8.9.24.tgz b/stable/filezilla/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/firefox/0.0.5/charts/common-8.9.24.tgz rename to stable/filezilla/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/filezilla/2.0.24/helm-values.md b/stable/filezilla/2.0.25/helm-values.md similarity index 100% rename from stable/filezilla/2.0.24/helm-values.md rename to stable/filezilla/2.0.25/helm-values.md diff --git a/stable/filezilla/2.0.24/ix_values.yaml b/stable/filezilla/2.0.25/ix_values.yaml similarity index 100% rename from stable/filezilla/2.0.24/ix_values.yaml rename to stable/filezilla/2.0.25/ix_values.yaml diff --git a/stable/filezilla/2.0.24/questions.yaml b/stable/filezilla/2.0.25/questions.yaml similarity index 99% rename from stable/filezilla/2.0.24/questions.yaml rename to stable/filezilla/2.0.25/questions.yaml index 5f748b6c0e0..7960700503c 100644 --- a/stable/filezilla/2.0.24/questions.yaml +++ b/stable/filezilla/2.0.25/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10035 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/filezilla/2.0.24/security.md b/stable/filezilla/2.0.25/security.md similarity index 100% rename from stable/filezilla/2.0.24/security.md rename to stable/filezilla/2.0.25/security.md diff --git a/stable/filezilla/2.0.24/templates/common.yaml b/stable/filezilla/2.0.25/templates/common.yaml similarity index 100% rename from stable/filezilla/2.0.24/templates/common.yaml rename to stable/filezilla/2.0.25/templates/common.yaml diff --git a/stable/firefox/0.0.5/values.yaml b/stable/filezilla/2.0.25/values.yaml similarity index 100% rename from stable/firefox/0.0.5/values.yaml rename to stable/filezilla/2.0.25/values.yaml diff --git a/stable/fireflyiii/13.1.7/CHANGELOG.md b/stable/fireflyiii/13.1.7/CHANGELOG.md new file mode 100644 index 00000000000..7675a82bcde --- /dev/null +++ b/stable/fireflyiii/13.1.7/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [fireflyiii-13.1.7](https://github.com/truecharts/apps/compare/fireflyiii-13.1.6...fireflyiii-13.1.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [fireflyiii-13.1.6](https://github.com/truecharts/apps/compare/fireflyiii-13.1.5...fireflyiii-13.1.6) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [fireflyiii-13.1.5](https://github.com/truecharts/apps/compare/fireflyiii-13.1.4...fireflyiii-13.1.5) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + +#### Fix + +* fix identation on secrets ([#1553](https://github.com/truecharts/apps/issues/1553)) + + + + +### [fireflyiii-13.1.4](https://github.com/truecharts/apps/compare/fireflyiii-13.1.3...fireflyiii-13.1.4) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [fireflyiii-13.1.3](https://github.com/truecharts/apps/compare/fireflyiii-13.1.2...fireflyiii-13.1.3) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [fireflyiii-13.1.2](https://github.com/truecharts/apps/compare/fireflyiii-13.1.1...fireflyiii-13.1.2) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [fireflyiii-13.1.1](https://github.com/truecharts/apps/compare/fireflyiii-13.1.0...fireflyiii-13.1.1) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + +#### Feat + +* enable redis ([#1478](https://github.com/truecharts/apps/issues/1478)) + + + + +### [fireflyiii-13.1.0](https://github.com/truecharts/apps/compare/fireflyiii-13.0.10...fireflyiii-13.1.0) (2021-12-07) + +#### Feat + +* add cron support ([#1470](https://github.com/truecharts/apps/issues/1470)) + + + + +### [fireflyiii-13.0.10](https://github.com/truecharts/apps/compare/fireflyiii-13.0.9...fireflyiii-13.0.10) (2021-12-05) + +#### Chore + +* fix some remaining issues after refactor work + + + + +### fireflyiii-13.0.9 (2021-12-05) + +#### Chore diff --git a/stable/flaresolverr/4.0.26/CONFIG.md b/stable/fireflyiii/13.1.7/CONFIG.md similarity index 100% rename from stable/flaresolverr/4.0.26/CONFIG.md rename to stable/fireflyiii/13.1.7/CONFIG.md diff --git a/stable/paperless-ng/1.0.3/Chart.lock b/stable/fireflyiii/13.1.7/Chart.lock similarity index 87% rename from stable/paperless-ng/1.0.3/Chart.lock rename to stable/fireflyiii/13.1.7/Chart.lock index d392ff2e5b7..00498a41064 100644 --- a/stable/paperless-ng/1.0.3/Chart.lock +++ b/stable/fireflyiii/13.1.7/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org version: 1.0.39 digest: sha256:c2c7ac7915e674cd178c16d569e957b93faa00b4b4eb4bd3eead9a2b29c26a3f -generated: "2021-12-19T18:42:24.220764275Z" +generated: "2021-12-19T23:14:43.188950021Z" diff --git a/stable/fireflyiii/13.1.7/Chart.yaml b/stable/fireflyiii/13.1.7/Chart.yaml new file mode 100644 index 00000000000..f08193f5c25 --- /dev/null +++ b/stable/fireflyiii/13.1.7/Chart.yaml @@ -0,0 +1,36 @@ +apiVersion: v2 +appVersion: "5.6.5" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.39 +deprecated: false +description: A free and open source personal finance manager +home: https://github.com/firefly-iii/firefly-iii/ +icon: https://truecharts.org/_static/img/appicons/fireflyiii-icon.png +keywords: +- fireflyiii +- finacial +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: fireflyiii +sources: +- https://github.com/firefly-iii/firefly-iii/ +type: application +version: 13.1.7 +annotations: + truecharts.org/catagories: | + - finacial + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/fireflyiii/13.1.7/README.md b/stable/fireflyiii/13.1.7/README.md new file mode 100644 index 00000000000..3143ad27985 --- /dev/null +++ b/stable/fireflyiii/13.1.7/README.md @@ -0,0 +1,39 @@ +# Introduction + +A free and open source personal finance manager + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.34 | +| https://truecharts.org | common | 8.9.24 | +| https://truecharts.org | redis | 1.0.39 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/fireflyiii/13.1.7/app-readme.md b/stable/fireflyiii/13.1.7/app-readme.md new file mode 100644 index 00000000000..cc381c8e1e8 --- /dev/null +++ b/stable/fireflyiii/13.1.7/app-readme.md @@ -0,0 +1,3 @@ +A free and open source personal finance manager + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/flaresolverr/4.0.26/charts/common-8.9.24.tgz b/stable/fireflyiii/13.1.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/flaresolverr/4.0.26/charts/common-8.9.24.tgz rename to stable/fireflyiii/13.1.7/charts/common-8.9.24.tgz diff --git a/stable/firefox-syncserver/5.0.15/charts/postgresql-6.0.34.tgz b/stable/fireflyiii/13.1.7/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/firefox-syncserver/5.0.15/charts/postgresql-6.0.34.tgz rename to stable/fireflyiii/13.1.7/charts/postgresql-6.0.34.tgz diff --git a/stable/friendica/0.0.16/charts/redis-1.0.39.tgz b/stable/fireflyiii/13.1.7/charts/redis-1.0.39.tgz similarity index 100% rename from stable/friendica/0.0.16/charts/redis-1.0.39.tgz rename to stable/fireflyiii/13.1.7/charts/redis-1.0.39.tgz diff --git a/stable/fireflyiii/13.1.7/helm-values.md b/stable/fireflyiii/13.1.7/helm-values.md new file mode 100644 index 00000000000..d6565a01cc9 --- /dev/null +++ b/stable/fireflyiii/13.1.7/helm-values.md @@ -0,0 +1,61 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| cronjob.annotations | object | `{}` | | +| cronjob.failedJobsHistoryLimit | int | `5` | | +| cronjob.schedule | string | `"0 3 * * *"` | | +| cronjob.successfulJobsHistoryLimit | int | `2` | | +| env.CACHE_DRIVER | string | `"redis"` | | +| env.DB_CONNECTION | string | `"pgsql"` | | +| env.DB_DATABASE | string | `"firefly"` | | +| env.DB_PORT | int | `5432` | | +| env.DB_USERNAME | string | `"firefly"` | | +| env.REDIS_CACHE_DB | string | `"1"` | | +| env.REDIS_DB | string | `"0"` | | +| env.REDIS_PORT | int | `6379` | | +| env.REDIS_SCHEME | string | `"tcp"` | | +| env.SESSION_DRIVER | string | `"redis"` | | +| envValueFrom.APP_KEY.secretKeyRef.key | string | `"APP_KEY"` | | +| envValueFrom.APP_KEY.secretKeyRef.name | string | `"fireflyiii-secrets"` | | +| envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.STATIC_CRON_TOKEN.secretKeyRef.key | string | `"STATIC_CRON_TOKEN"` | | +| envValueFrom.STATIC_CRON_TOKEN.secretKeyRef.name | string | `"fireflyiii-secrets"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/fireflyiii-core"` | | +| image.tag | string | `"v5.6.5@sha256:fe75d9df1daf62871eccb976643ff393ed1bd402b61baa0f17f7ad5289697264"` | | +| persistence.data.enabled | bool | `true` | | +| persistence.data.mountPath | string | `"/var/www/html/storage/upload"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"firefly"` | | +| postgresql.postgresqlUsername | string | `"firefly"` | | +| probes.liveness.path | string | `"/login"` | | +| probes.readiness.path | string | `"/login"` | | +| probes.startup.path | string | `"/login"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10082` | | +| service.main.ports.main.targetPort | int | `8080` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/fireflyiii/13.1.7/ix_values.yaml b/stable/fireflyiii/13.1.7/ix_values.yaml new file mode 100644 index 00000000000..74a8d800d37 --- /dev/null +++ b/stable/fireflyiii/13.1.7/ix_values.yaml @@ -0,0 +1,90 @@ +image: + repository: tccr.io/truecharts/fireflyiii-core + pullPolicy: IfNotPresent + tag: v5.6.5@sha256:fe75d9df1daf62871eccb976643ff393ed1bd402b61baa0f17f7ad5289697264 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 10082 + targetPort: 8080 + +probes: + liveness: + path: "/login" + + readiness: + path: "/login" + + startup: + path: "/login" + +env: + DB_USERNAME: firefly + DB_DATABASE: firefly + DB_CONNECTION: pgsql + DB_PORT: 5432 + REDIS_DB: "0" + REDIS_CACHE_DB: "1" + CACHE_DRIVER: redis + SESSION_DRIVER: redis + REDIS_SCHEME: tcp + REDIS_PORT: 6379 + +envValueFrom: + DB_HOST: + secretKeyRef: + name: dbcreds + key: plainhost + DB_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + REDIS_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + STATIC_CRON_TOKEN: + secretKeyRef: + name: fireflyiii-secrets + key: STATIC_CRON_TOKEN + APP_KEY: + secretKeyRef: + name: fireflyiii-secrets + key: APP_KEY + +persistence: + data: + enabled: true + mountPath: "/var/www/html/storage/upload" + +cronjob: + schedule: "0 3 * * *" + annotations: {} + failedJobsHistoryLimit: 5 + successfulJobsHistoryLimit: 2 + +# Enabled redis +redis: + enabled: true + existingSecret: "rediscreds" + +# Enabled postgres +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: firefly + postgresqlDatabase: firefly diff --git a/stable/fireflyiii/13.1.7/questions.yaml b/stable/fireflyiii/13.1.7/questions.yaml new file mode 100644 index 00000000000..3a4f2c2701a --- /dev/null +++ b/stable/fireflyiii/13.1.7/questions.yaml @@ -0,0 +1,1827 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10082 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8080 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: data + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/fireflyiii/13.1.7/security.md b/stable/fireflyiii/13.1.7/security.md new file mode 100644 index 00000000000..1e86e0819f9 --- /dev/null +++ b/stable/fireflyiii/13.1.7/security.md @@ -0,0 +1,1522 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: fireflyiii/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'fireflyiii' of CronJob 'RELEASE-NAME-fireflyiii-cronjob' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'fireflyiii' of CronJob 'RELEASE-NAME-fireflyiii-cronjob' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'fireflyiii' of CronJob 'RELEASE-NAME-fireflyiii-cronjob' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-fireflyiii' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'fireflyiii' of CronJob 'RELEASE-NAME-fireflyiii-cronjob' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-fireflyiii' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-fireflyiii' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + tccr.io/truecharts/fireflyiii-core:v5.6.5@sha256:fe75d9df1daf62871eccb976643ff393ed1bd402b61baa0f17f7ad5289697264 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:7a9857fa3f8626b7fd1cbbafaff00dea68a08a30973284c98f232c0168a75b5c + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/fireflyiii-core:v5.6.5@sha256:fe75d9df1daf62871eccb976643ff393ed1bd402b61baa0f17f7ad5289697264 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2 | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.tenable.com/security/tns-2021-17
| +| apache2 | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2 | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2 | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2 | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2 | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2 | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2 | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-bin | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.tenable.com/security/tns-2021-17
| +| apache2-bin | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-bin | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-bin | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-bin | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-bin | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-bin | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-bin | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-data | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.tenable.com/security/tns-2021-17
| +| apache2-data | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-data | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-data | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-data | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-data | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-data | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-data | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-utils | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.tenable.com/security/tns-2021-17
| +| apache2-utils | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-utils | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-utils | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-utils | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-utils | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-utils | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-utils | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| binutils | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12700 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104541
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
| +| binutils | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils | CVE-2021-3648 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils | CVE-2021-37322 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-common | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12700 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104541
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-common | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-common | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-common | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils-common | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils-common | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils-common | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils-common | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils-common | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-common | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-common | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-common | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
| +| binutils-common | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-common | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-common | CVE-2021-3648 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-common | CVE-2021-37322 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-common | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12700 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104541
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-x86-64-linux-gnu | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-x86-64-linux-gnu | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils-x86-64-linux-gnu | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils-x86-64-linux-gnu | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils-x86-64-linux-gnu | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-x86-64-linux-gnu | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-x86-64-linux-gnu | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-x86-64-linux-gnu | CVE-2021-3648 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-x86-64-linux-gnu | CVE-2021-37322 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| cpp-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| cpp-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| g++-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| g++-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gcc-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libasan5 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libasan5 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libatomic1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libatomic1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libbinutils | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12700 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104541
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libbinutils | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libbinutils | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libbinutils | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| libbinutils | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| libbinutils | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| libbinutils | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| libbinutils | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| libbinutils | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libbinutils | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libbinutils | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libbinutils | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
| +| libbinutils | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libbinutils | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libbinutils | CVE-2021-3648 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libbinutils | CVE-2021-37322 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libbinutils | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-dev-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-dev-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-dev-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-dev-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6-dev | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6-dev | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6-dev | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6-dev | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6-dev | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6-dev | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcc1-0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libcc1-0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc-8-dev | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc-8-dev | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-0 | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgomp1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgomp1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libicu63 | CVE-2020-21913 | MEDIUM | 63.1-6+deb10u1 | 63.1-6+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913
https://github.com/unicode-org/icu/pull/886
https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html
https://ubuntu.com/security/notices/USN-5133-1
https://unicode-org.atlassian.net/browse/ICU-20850
https://www.debian.org/security/2021/dsa-5014
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libitm1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libitm1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libjansson4 | CVE-2020-36325 | LOW | 2.12-1 | |
Expand...https://github.com/akheron/jansson/issues/548
| +| libjpeg62-turbo | CVE-2017-15232 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
| +| libjpeg62-turbo | CVE-2018-11813 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
| +| libjpeg62-turbo | CVE-2020-17541 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblsan0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| liblsan0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| liblua5.2-0 | CVE-2021-43519 | MEDIUM | 5.2.4-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmpx2 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libmpx2 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libonig5 | CVE-2019-13224 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
https://linux.oracle.com/cve/CVE-2019-13224.html
https://linux.oracle.com/errata/ELSA-2020-5861.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
https://security.gentoo.org/glsa/201911-03
https://support.f5.com/csp/article/K00103182
https://support.f5.com/csp/article/K00103182?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4088-1
https://usn.ubuntu.com/4088-1/
| +| libonig5 | CVE-2019-13225 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225
https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c
https://linux.oracle.com/cve/CVE-2019-13225.html
https://linux.oracle.com/errata/ELSA-2020-5861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
https://security.gentoo.org/glsa/201911-03
| +| libonig5 | CVE-2019-16163 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163
https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180
https://github.com/kkos/oniguruma/compare/v6.9.2...v6.9.3
https://github.com/kkos/oniguruma/issues/147
https://linux.oracle.com/cve/CVE-2019-16163.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWOWZZNFSAWM3BUTQNAE3PD44A6JU4KE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW47MSFZ6WYOAOFXHBDGU4LYACFRKC2Y/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19012 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19012
https://github.com/kkos/oniguruma/issues/164
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19203 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203
https://github.com/ManhNDd/CVE-2019-19203
https://github.com/kkos/oniguruma/issues/163
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19203
https://linux.oracle.com/cve/CVE-2019-19203.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
| +| libonig5 | CVE-2019-19204 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204
https://github.com/ManhNDd/CVE-2019-19204
https://github.com/kkos/oniguruma/issues/162
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19204
https://linux.oracle.com/cve/CVE-2019-19204.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19246 | LOW | 6.9.1-1 | |
Expand...https://bugs.php.net/bug.php?id=78559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246
https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b
https://linux.oracle.com/cve/CVE-2019-19246.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.28 | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.28 | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2018-14048 | LOW | 1.6.36-6 | |
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
| +| libpng16-16 | CVE-2018-14550 | LOW | 1.6.36-6 | |
Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283
https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
https://github.com/glennrp/libpng/issues/246
https://nvd.nist.gov/vuln/detail/CVE-2018-14550
https://security.gentoo.org/glsa/201908-02
https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.36-6 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpq5 | CVE-2019-9193 | LOW | 11.14-0+deb10u1 | |
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/
https://security.netapp.com/advisory/ntap-20190502-0003/
https://www.postgresql.org/about/news/1935/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
| +| libquadmath0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libquadmath0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++-8-dev | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++-8-dev | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libtsan0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libtsan0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libubsan1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libubsan1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 4.19.208-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 4.19.208-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-36385 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
https://linux.oracle.com/cve/CVE-2020-36385.html
https://linux.oracle.com/errata/ELSA-2021-4777.html
https://security.netapp.com/advisory/ntap-20210720-0004/
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-20322 | HIGH | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
| +| linux-libc-dev | CVE-2021-3493 | HIGH | 4.19.208-1 | |
Expand...http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3493
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
https://ubuntu.com/security/notices/USN-4915-1
https://ubuntu.com/security/notices/USN-4916-1
https://ubuntu.com/security/notices/USN-4917-1
https://www.openwall.com/lists/oss-security/2021/04/16/1
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 4.19.208-1 | |
Expand...https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-38207 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
https://security.netapp.com/advisory/ntap-20210902-0007/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2021-38300 | HIGH | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/09/15/5
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
https://security.netapp.com/advisory/ntap-20211008-0003/
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 4.19.208-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 4.19.208-1 | |
Expand...https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 4.19.208-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 4.19.208-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-16120 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120
https://git.kernel.org/linus/05acefb4872dae89e772729efb194af754c877e8
https://git.kernel.org/linus/48bd024b8a40d73ad6b086de2615738da0c7004f
https://git.kernel.org/linus/56230d956739b9cb1cbde439d76227d77979a04d
https://git.kernel.org/linus/b6650dab404c701d7fe08a108b746542a934da84
https://git.kernel.org/linus/d1d04ef8572bc8c22265057bd3d5a79f223f8f52
https://launchpad.net/bugs/1894980
https://launchpad.net/bugs/1900141
https://linux.oracle.com/cve/CVE-2020-16120.html
https://linux.oracle.com/errata/ELSA-2021-9087.html
https://ubuntu.com/USN-4576-1
https://ubuntu.com/USN-4577-1
https://ubuntu.com/USN-4578-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4578-1
https://www.openwall.com/lists/oss-security/2020/10/13/6
https://www.openwall.com/lists/oss-security/2020/10/14/2
| +| linux-libc-dev | CVE-2020-26141 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26145 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26145.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26541 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
https://linux.oracle.com/cve/CVE-2020-26541.html
https://linux.oracle.com/errata/ELSA-2021-2570.html
https://lkml.org/lkml/2020/9/15/1871
https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/
https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
| +| linux-libc-dev | CVE-2020-36322 | MEDIUM | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454
https://linux.oracle.com/cve/CVE-2020-36322.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://ubuntu.com/security/notices/USN-5136-1
| +| linux-libc-dev | CVE-2021-20317 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-28950 | MEDIUM | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://linux.oracle.com/cve/CVE-2021-28950.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://ubuntu.com/security/notices/USN-4911-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 4.19.208-1 | |
Expand...https://lkml.org/lkml/2021/8/28/238
https://www.openwall.com/lists/oss-security/2021/07/22/1
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 4.19.208-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://github.com/szymonh/inspector-gadget
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 4.19.208-1 | |
Expand...https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2004-0230 | LOW | 4.19.208-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 4.19.208-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 4.19.208-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 4.19.208-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 4.19.208-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 4.19.208-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 4.19.208-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 4.19.208-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-12615 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108549
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K60924046
https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp;utm_medium=RSS
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html
| +| linux-libc-dev | CVE-2019-16229 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19064 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4300-1
https://usn.ubuntu.com/4300-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2019-19083 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-0929 | LOW | 4.19.208-1 | |
Expand...https://source.android.com/security/bulletin/2021-11-01
| +| linux-libc-dev | CVE-2021-26934 | LOW | 4.19.208-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3760 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-45095 | UNKNOWN | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| m4 | CVE-2008-1687 | LOW | 1.4.18-2 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| +| m4 | CVE-2008-1688 | LOW | 1.4.18-2 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| perl | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.28 | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.28 | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| re2c | CVE-2018-21232 | LOW | 1.1.1-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
https://github.com/skvadrik/re2c/issues/219
https://www.openwall.com/lists/oss-security/2020/04/27/2
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**composer** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| laravel/framework | CVE-2021-43808 | MEDIUM | v8.73.2 | 8.75.0, 6.20.42, 7.30.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43808
https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:7a9857fa3f8626b7fd1cbbafaff00dea68a08a30973284c98f232c0168a75b5c (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/fireflyiii/13.1.7/templates/_cronjob.tpl b/stable/fireflyiii/13.1.7/templates/_cronjob.tpl new file mode 100644 index 00000000000..600f0a49e17 --- /dev/null +++ b/stable/fireflyiii/13.1.7/templates/_cronjob.tpl @@ -0,0 +1,54 @@ +{{/* Define the cronjob */}} +{{- define "fireflyiii.cronjob" -}} +{{- $jobName := include "common.names.fullname" . }} + +--- +apiVersion: batch/v1 +kind: CronJob +metadata: + name: {{ printf "%s-cronjob" $jobName }} + labels: + {{- include "common.labels" . | nindent 4 }} +spec: + schedule: "{{ .Values.cronjob.schedule }}" + concurrencyPolicy: Forbid + {{- with .Values.cronjob.failedJobsHistoryLimit }} + failedJobsHistoryLimit: {{ . }} + {{- end }} + {{- with .Values.cronjob.successfulJobsHistoryLimit }} + successfulJobsHistoryLimit: {{ . }} + {{- end }} + jobTemplate: + metadata: + spec: + template: + metadata: + spec: + securityContext: + runAsUser: 568 + runAsGroup: 568 + restartPolicy: Never + containers: + - name: {{ .Chart.Name }} + securityContext: + privileged: false + readOnlyRootFilesystem: true + allowPrivilegeEscalation: false + runAsNonRoot: true + capabilities: + drop: + - ALL + env: + - name: STATIC_CRON_TOKEN + valueFrom: + secretKeyRef: + name: fireflyiii-secrets + key: STATIC_CRON_TOKEN + image: "{{ .Values.alpineImage.repository }}:{{ .Values.alpineImage.tag }}" + args: + - curl + - "http://{{ $jobName }}.ix-{{ .Release.Name }}.svc.cluster.local:{{ .Values.service.main.ports.main.port }}/api/v1/cron/$STATIC_CRON_TOKEN" + resources: +{{ toYaml .Values.resources | indent 16 }} + +{{- end -}} diff --git a/stable/fireflyiii/13.1.7/templates/_secrets.tpl b/stable/fireflyiii/13.1.7/templates/_secrets.tpl new file mode 100644 index 00000000000..d86254983a7 --- /dev/null +++ b/stable/fireflyiii/13.1.7/templates/_secrets.tpl @@ -0,0 +1,24 @@ +{{/* Define the secrets */}} +{{- define "fireflyiii.secrets" -}} +--- + +apiVersion: v1 +kind: Secret +type: Opaque +metadata: + name: fireflyiii-secrets +{{- $fireflyiiiprevious := lookup "v1" "Secret" .Release.Namespace "fireflyiii-secrets" }} +{{- $static_cron_token := "" }} +{{- $app_key := "" }} +data: + {{- if $fireflyiiiprevious}} + STATIC_CRON_TOKEN: {{ index $fireflyiiiprevious.data "STATIC_CRON_TOKEN" }} + APP_KEY: {{ index $fireflyiiiprevious.data "APP_KEY" }} + {{- else }} + {{- $static_cron_token := randAlphaNum 32 }} + {{- $app_key := randAlphaNum 32 }} + STATIC_CRON_TOKEN: {{ $static_cron_token | b64enc | quote }} + APP_KEY: {{ $static_cron_token | b64enc | quote }} + {{- end }} + +{{- end -}} diff --git a/stable/fireflyiii/13.1.7/templates/common.yaml b/stable/fireflyiii/13.1.7/templates/common.yaml new file mode 100644 index 00000000000..a646e86ff5c --- /dev/null +++ b/stable/fireflyiii/13.1.7/templates/common.yaml @@ -0,0 +1,11 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render secrets for fireflyiii */}} +{{- include "fireflyiii.secrets" . }} + +{{/* Render cronjob for fireflyiii */}} +{{- include "fireflyiii.cronjob" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/flaresolverr/4.0.26/values.yaml b/stable/fireflyiii/13.1.7/values.yaml similarity index 100% rename from stable/flaresolverr/4.0.26/values.yaml rename to stable/fireflyiii/13.1.7/values.yaml diff --git a/stable/firefox-syncserver/5.0.15/Chart.lock b/stable/firefox-syncserver/5.0.15/Chart.lock deleted file mode 100644 index 3290c858577..00000000000 --- a/stable/firefox-syncserver/5.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:28:24.474085494Z" diff --git a/stable/firefox-syncserver/5.0.15/CHANGELOG.md b/stable/firefox-syncserver/5.0.16/CHANGELOG.md similarity index 89% rename from stable/firefox-syncserver/5.0.15/CHANGELOG.md rename to stable/firefox-syncserver/5.0.16/CHANGELOG.md index d7fdf69f30a..fff86fa241a 100644 --- a/stable/firefox-syncserver/5.0.15/CHANGELOG.md +++ b/stable/firefox-syncserver/5.0.16/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [firefox-syncserver-5.0.16](https://github.com/truecharts/apps/compare/firefox-syncserver-5.0.15...firefox-syncserver-5.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [firefox-syncserver-5.0.15](https://github.com/truecharts/apps/compare/firefox-syncserver-5.0.14...firefox-syncserver-5.0.15) (2021-12-19) @@ -87,13 +97,3 @@ -### [firefox-syncserver-5.0.7](https://github.com/truecharts/apps/compare/firefox-syncserver-5.0.6...firefox-syncserver-5.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [firefox-syncserver-5.0.6](https://github.com/truecharts/apps/compare/firefox-syncserver-5.0.5...firefox-syncserver-5.0.6) (2021-12-04) diff --git a/stable/fleet/0.0.5/CONFIG.md b/stable/firefox-syncserver/5.0.16/CONFIG.md similarity index 100% rename from stable/fleet/0.0.5/CONFIG.md rename to stable/firefox-syncserver/5.0.16/CONFIG.md diff --git a/stable/firefox-syncserver/5.0.16/Chart.lock b/stable/firefox-syncserver/5.0.16/Chart.lock new file mode 100644 index 00000000000..f9188a21f7d --- /dev/null +++ b/stable/firefox-syncserver/5.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:14:55.161743526Z" diff --git a/stable/firefox-syncserver/5.0.15/Chart.yaml b/stable/firefox-syncserver/5.0.16/Chart.yaml similarity index 98% rename from stable/firefox-syncserver/5.0.15/Chart.yaml rename to stable/firefox-syncserver/5.0.16/Chart.yaml index 57fe5ab01c3..c6d65c0e27d 100644 --- a/stable/firefox-syncserver/5.0.15/Chart.yaml +++ b/stable/firefox-syncserver/5.0.16/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 appVersion: "1.8.0" -version: 5.0.15 +version: 5.0.16 kubeVersion: '>=1.16.0-0' name: firefox-syncserver description: This is an all-in-one package for running a self-hosted Firefox Sync server. diff --git a/stable/firefox-syncserver/5.0.15/README.md b/stable/firefox-syncserver/5.0.16/README.md similarity index 100% rename from stable/firefox-syncserver/5.0.15/README.md rename to stable/firefox-syncserver/5.0.16/README.md diff --git a/stable/firefox-syncserver/5.0.15/app-readme.md b/stable/firefox-syncserver/5.0.16/app-readme.md similarity index 100% rename from stable/firefox-syncserver/5.0.15/app-readme.md rename to stable/firefox-syncserver/5.0.16/app-readme.md diff --git a/stable/fleet/0.0.5/charts/common-8.9.24.tgz b/stable/firefox-syncserver/5.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/fleet/0.0.5/charts/common-8.9.24.tgz rename to stable/firefox-syncserver/5.0.16/charts/common-8.9.24.tgz diff --git a/stable/gitea/5.0.18/charts/postgresql-6.0.34.tgz b/stable/firefox-syncserver/5.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/gitea/5.0.18/charts/postgresql-6.0.34.tgz rename to stable/firefox-syncserver/5.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/firefox-syncserver/5.0.15/helm-values.md b/stable/firefox-syncserver/5.0.16/helm-values.md similarity index 100% rename from stable/firefox-syncserver/5.0.15/helm-values.md rename to stable/firefox-syncserver/5.0.16/helm-values.md diff --git a/stable/firefox-syncserver/5.0.15/ix_values.yaml b/stable/firefox-syncserver/5.0.16/ix_values.yaml similarity index 100% rename from stable/firefox-syncserver/5.0.15/ix_values.yaml rename to stable/firefox-syncserver/5.0.16/ix_values.yaml diff --git a/stable/firefox-syncserver/5.0.15/questions.yaml b/stable/firefox-syncserver/5.0.16/questions.yaml similarity index 99% rename from stable/firefox-syncserver/5.0.15/questions.yaml rename to stable/firefox-syncserver/5.0.16/questions.yaml index 31db21f0b8e..c658c77ac63 100644 --- a/stable/firefox-syncserver/5.0.15/questions.yaml +++ b/stable/firefox-syncserver/5.0.16/questions.yaml @@ -398,7 +398,6 @@ questions: schema: type: int default: 10051 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/firefox-syncserver/5.0.15/security.md b/stable/firefox-syncserver/5.0.16/security.md similarity index 100% rename from stable/firefox-syncserver/5.0.15/security.md rename to stable/firefox-syncserver/5.0.16/security.md diff --git a/stable/firefox/0.0.5/templates/common.yaml b/stable/firefox-syncserver/5.0.16/templates/common.yaml similarity index 100% rename from stable/firefox/0.0.5/templates/common.yaml rename to stable/firefox-syncserver/5.0.16/templates/common.yaml diff --git a/stable/fleet/0.0.5/values.yaml b/stable/firefox-syncserver/5.0.16/values.yaml similarity index 100% rename from stable/fleet/0.0.5/values.yaml rename to stable/firefox-syncserver/5.0.16/values.yaml diff --git a/stable/firefox/0.0.5/Chart.lock b/stable/firefox/0.0.5/Chart.lock deleted file mode 100644 index 6151514fcc6..00000000000 --- a/stable/firefox/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:28:25.491481826Z" diff --git a/stable/firefox/0.0.5/CHANGELOG.md b/stable/firefox/0.0.6/CHANGELOG.md similarity index 87% rename from stable/firefox/0.0.5/CHANGELOG.md rename to stable/firefox/0.0.6/CHANGELOG.md index d906ae72b24..4de64dbf86a 100644 --- a/stable/firefox/0.0.5/CHANGELOG.md +++ b/stable/firefox/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [firefox-0.0.6](https://github.com/truecharts/apps/compare/firefox-0.0.5...firefox-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [firefox-0.0.5](https://github.com/truecharts/apps/compare/firefox-0.0.4...firefox-0.0.5) (2021-12-19) diff --git a/stable/flood/4.0.24/CONFIG.md b/stable/firefox/0.0.6/CONFIG.md similarity index 100% rename from stable/flood/4.0.24/CONFIG.md rename to stable/firefox/0.0.6/CONFIG.md diff --git a/stable/firefox/0.0.6/Chart.lock b/stable/firefox/0.0.6/Chart.lock new file mode 100644 index 00000000000..eab1320eaf3 --- /dev/null +++ b/stable/firefox/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:14:56.246599034Z" diff --git a/stable/firefox/0.0.5/Chart.yaml b/stable/firefox/0.0.6/Chart.yaml similarity index 97% rename from stable/firefox/0.0.5/Chart.yaml rename to stable/firefox/0.0.6/Chart.yaml index 5328f4a6c9b..6eb65979fbc 100644 --- a/stable/firefox/0.0.5/Chart.yaml +++ b/stable/firefox/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: firefox -version: 0.0.5 +version: 0.0.6 appVersion: "78.15.0" description: Firefox Browser, also known as Mozilla Firefox or simply Firefox, type: application diff --git a/stable/firefox/0.0.5/README.md b/stable/firefox/0.0.6/README.md similarity index 100% rename from stable/firefox/0.0.5/README.md rename to stable/firefox/0.0.6/README.md diff --git a/stable/firefox/0.0.5/app-readme.md b/stable/firefox/0.0.6/app-readme.md similarity index 100% rename from stable/firefox/0.0.5/app-readme.md rename to stable/firefox/0.0.6/app-readme.md diff --git a/stable/flood/4.0.24/charts/common-8.9.24.tgz b/stable/firefox/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/flood/4.0.24/charts/common-8.9.24.tgz rename to stable/firefox/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/firefox/0.0.5/helm-values.md b/stable/firefox/0.0.6/helm-values.md similarity index 100% rename from stable/firefox/0.0.5/helm-values.md rename to stable/firefox/0.0.6/helm-values.md diff --git a/stable/firefox/0.0.5/ix_values.yaml b/stable/firefox/0.0.6/ix_values.yaml similarity index 100% rename from stable/firefox/0.0.5/ix_values.yaml rename to stable/firefox/0.0.6/ix_values.yaml diff --git a/stable/firefox/0.0.5/questions.yaml b/stable/firefox/0.0.6/questions.yaml similarity index 100% rename from stable/firefox/0.0.5/questions.yaml rename to stable/firefox/0.0.6/questions.yaml diff --git a/stable/firefox/0.0.5/security.md b/stable/firefox/0.0.6/security.md similarity index 100% rename from stable/firefox/0.0.5/security.md rename to stable/firefox/0.0.6/security.md diff --git a/stable/flaresolverr/4.0.26/templates/common.yaml b/stable/firefox/0.0.6/templates/common.yaml similarity index 100% rename from stable/flaresolverr/4.0.26/templates/common.yaml rename to stable/firefox/0.0.6/templates/common.yaml diff --git a/stable/flood/4.0.24/values.yaml b/stable/firefox/0.0.6/values.yaml similarity index 100% rename from stable/flood/4.0.24/values.yaml rename to stable/firefox/0.0.6/values.yaml diff --git a/stable/flaresolverr/4.0.26/Chart.lock b/stable/flaresolverr/4.0.26/Chart.lock deleted file mode 100644 index bf930e45bd1..00000000000 --- a/stable/flaresolverr/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:28:38.562800838Z" diff --git a/stable/flaresolverr/4.0.26/CHANGELOG.md b/stable/flaresolverr/4.0.27/CHANGELOG.md similarity index 90% rename from stable/flaresolverr/4.0.26/CHANGELOG.md rename to stable/flaresolverr/4.0.27/CHANGELOG.md index 99b7f1ae532..0be93213332 100644 --- a/stable/flaresolverr/4.0.26/CHANGELOG.md +++ b/stable/flaresolverr/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [flaresolverr-4.0.27](https://github.com/truecharts/apps/compare/flaresolverr-4.0.26...flaresolverr-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [flaresolverr-4.0.26](https://github.com/truecharts/apps/compare/flaresolverr-4.0.25...flaresolverr-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [flaresolverr-4.0.18](https://github.com/truecharts/apps/compare/flaresolverr-4.0.17...flaresolverr-4.0.18) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [flaresolverr-4.0.17](https://github.com/truecharts/apps/compare/flaresolverr-4.0.16...flaresolverr-4.0.17) (2021-12-04) - diff --git a/stable/focalboard/4.0.25/CONFIG.md b/stable/flaresolverr/4.0.27/CONFIG.md similarity index 100% rename from stable/focalboard/4.0.25/CONFIG.md rename to stable/flaresolverr/4.0.27/CONFIG.md diff --git a/stable/dizquetv/5.0.5/Chart.lock b/stable/flaresolverr/4.0.27/Chart.lock similarity index 79% rename from stable/dizquetv/5.0.5/Chart.lock rename to stable/flaresolverr/4.0.27/Chart.lock index 579b0230752..5be2d2f160c 100644 --- a/stable/dizquetv/5.0.5/Chart.lock +++ b/stable/flaresolverr/4.0.27/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:02.16185344Z" +generated: "2021-12-19T23:15:09.05449601Z" diff --git a/stable/flaresolverr/4.0.26/Chart.yaml b/stable/flaresolverr/4.0.27/Chart.yaml similarity index 97% rename from stable/flaresolverr/4.0.26/Chart.yaml rename to stable/flaresolverr/4.0.27/Chart.yaml index ac830cafef9..2ee7982ec84 100644 --- a/stable/flaresolverr/4.0.26/Chart.yaml +++ b/stable/flaresolverr/4.0.27/Chart.yaml @@ -19,7 +19,7 @@ name: flaresolverr sources: - https://github.com/FlareSolverr/FlareSolverr - https://hub.docker.com/r/flaresolverr/flaresolverr -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/flaresolverr/4.0.26/README.md b/stable/flaresolverr/4.0.27/README.md similarity index 100% rename from stable/flaresolverr/4.0.26/README.md rename to stable/flaresolverr/4.0.27/README.md diff --git a/stable/flaresolverr/4.0.26/app-readme.md b/stable/flaresolverr/4.0.27/app-readme.md similarity index 100% rename from stable/flaresolverr/4.0.26/app-readme.md rename to stable/flaresolverr/4.0.27/app-readme.md diff --git a/stable/focalboard/4.0.25/charts/common-8.9.24.tgz b/stable/flaresolverr/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/focalboard/4.0.25/charts/common-8.9.24.tgz rename to stable/flaresolverr/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/flaresolverr/4.0.26/helm-values.md b/stable/flaresolverr/4.0.27/helm-values.md similarity index 100% rename from stable/flaresolverr/4.0.26/helm-values.md rename to stable/flaresolverr/4.0.27/helm-values.md diff --git a/stable/flaresolverr/4.0.26/ix_values.yaml b/stable/flaresolverr/4.0.27/ix_values.yaml similarity index 100% rename from stable/flaresolverr/4.0.26/ix_values.yaml rename to stable/flaresolverr/4.0.27/ix_values.yaml diff --git a/stable/flaresolverr/4.0.26/questions.yaml b/stable/flaresolverr/4.0.27/questions.yaml similarity index 99% rename from stable/flaresolverr/4.0.26/questions.yaml rename to stable/flaresolverr/4.0.27/questions.yaml index 9ba0bb6aa23..6e4079bfd36 100644 --- a/stable/flaresolverr/4.0.26/questions.yaml +++ b/stable/flaresolverr/4.0.27/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8191 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/flaresolverr/4.0.26/security.md b/stable/flaresolverr/4.0.27/security.md similarity index 100% rename from stable/flaresolverr/4.0.26/security.md rename to stable/flaresolverr/4.0.27/security.md diff --git a/stable/fleet/0.0.5/templates/common.yaml b/stable/flaresolverr/4.0.27/templates/common.yaml similarity index 100% rename from stable/fleet/0.0.5/templates/common.yaml rename to stable/flaresolverr/4.0.27/templates/common.yaml diff --git a/stable/focalboard/4.0.25/values.yaml b/stable/flaresolverr/4.0.27/values.yaml similarity index 100% rename from stable/focalboard/4.0.25/values.yaml rename to stable/flaresolverr/4.0.27/values.yaml diff --git a/stable/fleet/0.0.5/CHANGELOG.md b/stable/fleet/0.0.6/CHANGELOG.md similarity index 87% rename from stable/fleet/0.0.5/CHANGELOG.md rename to stable/fleet/0.0.6/CHANGELOG.md index ba531cf7059..443520c74dc 100644 --- a/stable/fleet/0.0.5/CHANGELOG.md +++ b/stable/fleet/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [fleet-0.0.6](https://github.com/truecharts/apps/compare/fleet-0.0.5...fleet-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [fleet-0.0.5](https://github.com/truecharts/apps/compare/fleet-0.0.4...fleet-0.0.5) (2021-12-19) diff --git a/stable/foldingathome/0.0.6/CONFIG.md b/stable/fleet/0.0.6/CONFIG.md similarity index 100% rename from stable/foldingathome/0.0.6/CONFIG.md rename to stable/fleet/0.0.6/CONFIG.md diff --git a/stable/fleet/0.0.6/Chart.lock b/stable/fleet/0.0.6/Chart.lock new file mode 100644 index 00000000000..11578be296a --- /dev/null +++ b/stable/fleet/0.0.6/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:15:26.797269489Z" diff --git a/stable/fleet/0.0.5/Chart.yaml b/stable/fleet/0.0.6/Chart.yaml similarity index 98% rename from stable/fleet/0.0.5/Chart.yaml rename to stable/fleet/0.0.6/Chart.yaml index 1d8cfdeaf00..2b2df1c7301 100644 --- a/stable/fleet/0.0.5/Chart.yaml +++ b/stable/fleet/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: fleet -version: 0.0.5 +version: 0.0.6 appVersion: "2.3.2" description: Fleet provides an online web interface which displays a set of maintained images from one or more owned repositories. type: application diff --git a/stable/fleet/0.0.5/README.md b/stable/fleet/0.0.6/README.md similarity index 100% rename from stable/fleet/0.0.5/README.md rename to stable/fleet/0.0.6/README.md diff --git a/stable/fleet/0.0.5/app-readme.md b/stable/fleet/0.0.6/app-readme.md similarity index 100% rename from stable/fleet/0.0.5/app-readme.md rename to stable/fleet/0.0.6/app-readme.md diff --git a/stable/foldingathome/0.0.6/charts/common-8.9.24.tgz b/stable/fleet/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/foldingathome/0.0.6/charts/common-8.9.24.tgz rename to stable/fleet/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/fleet/0.0.5/charts/mariadb-1.0.37.tgz b/stable/fleet/0.0.6/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/fleet/0.0.5/charts/mariadb-1.0.37.tgz rename to stable/fleet/0.0.6/charts/mariadb-1.0.37.tgz diff --git a/stable/fleet/0.0.5/helm-values.md b/stable/fleet/0.0.6/helm-values.md similarity index 100% rename from stable/fleet/0.0.5/helm-values.md rename to stable/fleet/0.0.6/helm-values.md diff --git a/stable/fleet/0.0.5/ix_values.yaml b/stable/fleet/0.0.6/ix_values.yaml similarity index 100% rename from stable/fleet/0.0.5/ix_values.yaml rename to stable/fleet/0.0.6/ix_values.yaml diff --git a/stable/fleet/0.0.5/questions.yaml b/stable/fleet/0.0.6/questions.yaml similarity index 100% rename from stable/fleet/0.0.5/questions.yaml rename to stable/fleet/0.0.6/questions.yaml diff --git a/stable/fleet/0.0.5/security.md b/stable/fleet/0.0.6/security.md similarity index 99% rename from stable/fleet/0.0.5/security.md rename to stable/fleet/0.0.6/security.md index 79e5a2df1b7..2eb488dab66 100644 --- a/stable/fleet/0.0.5/security.md +++ b/stable/fleet/0.0.6/security.md @@ -290,8 +290,8 @@ hide: | com.fasterxml.jackson.core:jackson-databind | CVE-2019-12384 | MEDIUM | 2.9.6 | 2.7.9.6, 2.8.11.4, 2.9.9.1 |
Expand...https://access.redhat.com/errata/RHSA-2019:1820
https://access.redhat.com/errata/RHSA-2019:2720
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:2998
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2019:3292
https://access.redhat.com/errata/RHSA-2019:3297
https://access.redhat.com/errata/RHSA-2019:3901
https://access.redhat.com/errata/RHSA-2019:4352
https://blog.doyensec.com/2019/07/22/jackson-gadgets.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
https://doyensec.com/research.html
https://github.com/FasterXML/jackson-databind/commit/c9ef4a10d6f6633cf470d6a469514b68fa2be234
https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad
https://github.com/FasterXML/jackson-databind/issues/2334
https://github.com/advisories/GHSA-mph4-vhrx-mv67
https://linux.oracle.com/cve/CVE-2019-12384.html
https://linux.oracle.com/errata/ELSA-2019-2720.html
https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E
https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/
https://nvd.nist.gov/vuln/detail/CVE-2019-12384
https://seclists.org/bugtraq/2019/Oct/6
https://security.netapp.com/advisory/ntap-20190703-0002/
https://www.debian.org/security/2019/dsa-4542
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| | com.fasterxml.jackson.core:jackson-databind | CVE-2019-12814 | MEDIUM | 2.9.6 | 2.7.9.6, 2.8.11.4, 2.9.9.1 |
Expand...https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:3044
https://access.redhat.com/errata/RHSA-2019:3045
https://access.redhat.com/errata/RHSA-2019:3046
https://access.redhat.com/errata/RHSA-2019:3050
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2019:3292
https://access.redhat.com/errata/RHSA-2019:3297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
https://github.com/FasterXML/jackson-databind/commit/5f7c69bba07a7155adde130d9dee2e54a54f1fa5
https://github.com/FasterXML/jackson-databind/issues/2341
https://github.com/advisories/GHSA-cmfg-87vq-g5g4
https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E
https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E
https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E
https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/
https://nvd.nist.gov/vuln/detail/CVE-2019-12814
https://security.netapp.com/advisory/ntap-20190625-0006/
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.7 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| -| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| +| org.apache.logging.log4j:log4j-core | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.eclipse.jetty:jetty-client | CVE-2020-27216 | HIGH | 9.4.20.v20190813 | 9.3.29.v20201019, 9.4.32.v20200930, 11.0.1 |
Expand...https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-client | CVE-2021-28165 | HIGH | 9.4.20.v20190813 | 9.4.39.v20210325, 10.0.2, 11.0.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/20/3
https://github.com/advisories/GHSA-26vr-8j45-3r4w
https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-28165
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-client | CVE-2020-27223 | MEDIUM | 9.4.20.v20190813 | 9.4.36.v20210114, 10.0.1, 11.0.1 |
Expand...https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| diff --git a/stable/flood/4.0.24/templates/common.yaml b/stable/fleet/0.0.6/templates/common.yaml similarity index 100% rename from stable/flood/4.0.24/templates/common.yaml rename to stable/fleet/0.0.6/templates/common.yaml diff --git a/stable/foldingathome/0.0.6/values.yaml b/stable/fleet/0.0.6/values.yaml similarity index 100% rename from stable/foldingathome/0.0.6/values.yaml rename to stable/fleet/0.0.6/values.yaml diff --git a/stable/flood/4.0.24/Chart.lock b/stable/flood/4.0.24/Chart.lock deleted file mode 100644 index 32151a5ccc1..00000000000 --- a/stable/flood/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:17.38819747Z" diff --git a/stable/flood/4.0.24/CHANGELOG.md b/stable/flood/4.0.25/CHANGELOG.md similarity index 90% rename from stable/flood/4.0.24/CHANGELOG.md rename to stable/flood/4.0.25/CHANGELOG.md index 55b191db2f5..fbf78af767c 100644 --- a/stable/flood/4.0.24/CHANGELOG.md +++ b/stable/flood/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [flood-4.0.25](https://github.com/truecharts/apps/compare/flood-4.0.24...flood-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [flood-4.0.24](https://github.com/truecharts/apps/compare/flood-4.0.23...flood-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [flood-4.0.16](https://github.com/truecharts/apps/compare/flood-4.0.15...flood-4.0.16) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [flood-4.0.15](https://github.com/truecharts/apps/compare/flood-4.0.14...flood-4.0.15) (2021-12-04) - -#### Chore diff --git a/stable/fossil/2.0.24/CONFIG.md b/stable/flood/4.0.25/CONFIG.md similarity index 100% rename from stable/fossil/2.0.24/CONFIG.md rename to stable/flood/4.0.25/CONFIG.md diff --git a/stable/flood/4.0.25/Chart.lock b/stable/flood/4.0.25/Chart.lock new file mode 100644 index 00000000000..40167cee706 --- /dev/null +++ b/stable/flood/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:15:43.022901079Z" diff --git a/stable/flood/4.0.24/Chart.yaml b/stable/flood/4.0.25/Chart.yaml similarity index 97% rename from stable/flood/4.0.24/Chart.yaml rename to stable/flood/4.0.25/Chart.yaml index 99b66faa260..7dd7ca91370 100644 --- a/stable/flood/4.0.24/Chart.yaml +++ b/stable/flood/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: flood sources: - https://github.com/jesec/flood - https://hub.docker.com/r/jesec/flood -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/flood/4.0.24/README.md b/stable/flood/4.0.25/README.md similarity index 100% rename from stable/flood/4.0.24/README.md rename to stable/flood/4.0.25/README.md diff --git a/stable/flood/4.0.24/app-readme.md b/stable/flood/4.0.25/app-readme.md similarity index 100% rename from stable/flood/4.0.24/app-readme.md rename to stable/flood/4.0.25/app-readme.md diff --git a/stable/fossil/2.0.24/charts/common-8.9.24.tgz b/stable/flood/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/fossil/2.0.24/charts/common-8.9.24.tgz rename to stable/flood/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/flood/4.0.24/ci/ct-values.yaml b/stable/flood/4.0.25/ci/ct-values.yaml similarity index 100% rename from stable/flood/4.0.24/ci/ct-values.yaml rename to stable/flood/4.0.25/ci/ct-values.yaml diff --git a/stable/flood/4.0.24/helm-values.md b/stable/flood/4.0.25/helm-values.md similarity index 100% rename from stable/flood/4.0.24/helm-values.md rename to stable/flood/4.0.25/helm-values.md diff --git a/stable/flood/4.0.24/ix_values.yaml b/stable/flood/4.0.25/ix_values.yaml similarity index 100% rename from stable/flood/4.0.24/ix_values.yaml rename to stable/flood/4.0.25/ix_values.yaml diff --git a/stable/flood/4.0.24/questions.yaml b/stable/flood/4.0.25/questions.yaml similarity index 99% rename from stable/flood/4.0.24/questions.yaml rename to stable/flood/4.0.25/questions.yaml index 65b0419e395..19e371a7bdb 100644 --- a/stable/flood/4.0.24/questions.yaml +++ b/stable/flood/4.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10036 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/flood/4.0.24/security.md b/stable/flood/4.0.25/security.md similarity index 100% rename from stable/flood/4.0.24/security.md rename to stable/flood/4.0.25/security.md diff --git a/stable/focalboard/4.0.25/templates/common.yaml b/stable/flood/4.0.25/templates/common.yaml similarity index 100% rename from stable/focalboard/4.0.25/templates/common.yaml rename to stable/flood/4.0.25/templates/common.yaml diff --git a/stable/fossil/2.0.24/values.yaml b/stable/flood/4.0.25/values.yaml similarity index 100% rename from stable/fossil/2.0.24/values.yaml rename to stable/flood/4.0.25/values.yaml diff --git a/stable/focalboard/4.0.25/Chart.lock b/stable/focalboard/4.0.25/Chart.lock deleted file mode 100644 index 445776723f3..00000000000 --- a/stable/focalboard/4.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:18.965146825Z" diff --git a/stable/focalboard/4.0.25/CHANGELOG.md b/stable/focalboard/4.0.26/CHANGELOG.md similarity index 90% rename from stable/focalboard/4.0.25/CHANGELOG.md rename to stable/focalboard/4.0.26/CHANGELOG.md index 02b6dac79ea..9ed29f37d6c 100644 --- a/stable/focalboard/4.0.25/CHANGELOG.md +++ b/stable/focalboard/4.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [focalboard-4.0.26](https://github.com/truecharts/apps/compare/focalboard-4.0.25...focalboard-4.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [focalboard-4.0.25](https://github.com/truecharts/apps/compare/focalboard-4.0.24...focalboard-4.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [focalboard-4.0.17](https://github.com/truecharts/apps/compare/focalboard-4.0.16...focalboard-4.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [focalboard-4.0.16](https://github.com/truecharts/apps/compare/focalboard-4.0.15...focalboard-4.0.16) (2021-12-04) - diff --git a/stable/freeradius/4.0.27/CONFIG.md b/stable/focalboard/4.0.26/CONFIG.md similarity index 100% rename from stable/freeradius/4.0.27/CONFIG.md rename to stable/focalboard/4.0.26/CONFIG.md diff --git a/stable/focalboard/4.0.26/Chart.lock b/stable/focalboard/4.0.26/Chart.lock new file mode 100644 index 00000000000..db0dfc627bb --- /dev/null +++ b/stable/focalboard/4.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:15:46.523438044Z" diff --git a/stable/focalboard/4.0.25/Chart.yaml b/stable/focalboard/4.0.26/Chart.yaml similarity index 98% rename from stable/focalboard/4.0.25/Chart.yaml rename to stable/focalboard/4.0.26/Chart.yaml index 2075c941aae..0be25718e36 100644 --- a/stable/focalboard/4.0.25/Chart.yaml +++ b/stable/focalboard/4.0.26/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://www.focalboard.com/ - https://github.com/mattermost/focalboard - https://github.com/FlipEnergy/container-images/blob/main/focalboard -version: 4.0.25 +version: 4.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/focalboard/4.0.25/README.md b/stable/focalboard/4.0.26/README.md similarity index 100% rename from stable/focalboard/4.0.25/README.md rename to stable/focalboard/4.0.26/README.md diff --git a/stable/focalboard/4.0.25/app-readme.md b/stable/focalboard/4.0.26/app-readme.md similarity index 100% rename from stable/focalboard/4.0.25/app-readme.md rename to stable/focalboard/4.0.26/app-readme.md diff --git a/stable/freeradius/4.0.27/charts/common-8.9.24.tgz b/stable/focalboard/4.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/freeradius/4.0.27/charts/common-8.9.24.tgz rename to stable/focalboard/4.0.26/charts/common-8.9.24.tgz diff --git a/stable/focalboard/4.0.25/helm-values.md b/stable/focalboard/4.0.26/helm-values.md similarity index 100% rename from stable/focalboard/4.0.25/helm-values.md rename to stable/focalboard/4.0.26/helm-values.md diff --git a/stable/focalboard/4.0.25/ix_values.yaml b/stable/focalboard/4.0.26/ix_values.yaml similarity index 100% rename from stable/focalboard/4.0.25/ix_values.yaml rename to stable/focalboard/4.0.26/ix_values.yaml diff --git a/stable/focalboard/4.0.25/questions.yaml b/stable/focalboard/4.0.26/questions.yaml similarity index 99% rename from stable/focalboard/4.0.25/questions.yaml rename to stable/focalboard/4.0.26/questions.yaml index 427fdbbc561..5a15d62ba84 100644 --- a/stable/focalboard/4.0.25/questions.yaml +++ b/stable/focalboard/4.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10072 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/focalboard/4.0.25/security.md b/stable/focalboard/4.0.26/security.md similarity index 100% rename from stable/focalboard/4.0.25/security.md rename to stable/focalboard/4.0.26/security.md diff --git a/stable/foldingathome/0.0.6/templates/common.yaml b/stable/focalboard/4.0.26/templates/common.yaml similarity index 100% rename from stable/foldingathome/0.0.6/templates/common.yaml rename to stable/focalboard/4.0.26/templates/common.yaml diff --git a/stable/freeradius/4.0.27/values.yaml b/stable/focalboard/4.0.26/values.yaml similarity index 100% rename from stable/freeradius/4.0.27/values.yaml rename to stable/focalboard/4.0.26/values.yaml diff --git a/stable/foldingathome/0.0.6/Chart.lock b/stable/foldingathome/0.0.6/Chart.lock deleted file mode 100644 index 80d7a2daea9..00000000000 --- a/stable/foldingathome/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:21.062685702Z" diff --git a/stable/foldingathome/0.0.6/CHANGELOG.md b/stable/foldingathome/0.0.7/CHANGELOG.md similarity index 88% rename from stable/foldingathome/0.0.6/CHANGELOG.md rename to stable/foldingathome/0.0.7/CHANGELOG.md index 46a3d2de9b3..6ad5ca85e55 100644 --- a/stable/foldingathome/0.0.6/CHANGELOG.md +++ b/stable/foldingathome/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [foldingathome-0.0.7](https://github.com/truecharts/apps/compare/foldingathome-0.0.6...foldingathome-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [foldingathome-0.0.6](https://github.com/truecharts/apps/compare/foldingathome-0.0.5...foldingathome-0.0.6) (2021-12-19) diff --git a/stable/freshrss/9.0.28/CONFIG.md b/stable/foldingathome/0.0.7/CONFIG.md similarity index 100% rename from stable/freshrss/9.0.28/CONFIG.md rename to stable/foldingathome/0.0.7/CONFIG.md diff --git a/stable/foldingathome/0.0.7/Chart.lock b/stable/foldingathome/0.0.7/Chart.lock new file mode 100644 index 00000000000..e3536790973 --- /dev/null +++ b/stable/foldingathome/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:15:50.956701271Z" diff --git a/stable/foldingathome/0.0.6/Chart.yaml b/stable/foldingathome/0.0.7/Chart.yaml similarity index 98% rename from stable/foldingathome/0.0.6/Chart.yaml rename to stable/foldingathome/0.0.7/Chart.yaml index c93f2415ec4..f3619f43dae 100644 --- a/stable/foldingathome/0.0.6/Chart.yaml +++ b/stable/foldingathome/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: foldingathome -version: 0.0.6 +version: 0.0.7 appVersion: "7.6.21" description: Folding@home is a distributed computing project for simulating protein dynamics, including the process of protein folding and the movements of proteins implicated in a variety of diseases. type: application diff --git a/stable/foldingathome/0.0.6/README.md b/stable/foldingathome/0.0.7/README.md similarity index 100% rename from stable/foldingathome/0.0.6/README.md rename to stable/foldingathome/0.0.7/README.md diff --git a/stable/foldingathome/0.0.6/app-readme.md b/stable/foldingathome/0.0.7/app-readme.md similarity index 100% rename from stable/foldingathome/0.0.6/app-readme.md rename to stable/foldingathome/0.0.7/app-readme.md diff --git a/stable/freshrss/9.0.28/charts/common-8.9.24.tgz b/stable/foldingathome/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/freshrss/9.0.28/charts/common-8.9.24.tgz rename to stable/foldingathome/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/foldingathome/0.0.6/helm-values.md b/stable/foldingathome/0.0.7/helm-values.md similarity index 100% rename from stable/foldingathome/0.0.6/helm-values.md rename to stable/foldingathome/0.0.7/helm-values.md diff --git a/stable/foldingathome/0.0.6/ix_values.yaml b/stable/foldingathome/0.0.7/ix_values.yaml similarity index 100% rename from stable/foldingathome/0.0.6/ix_values.yaml rename to stable/foldingathome/0.0.7/ix_values.yaml diff --git a/stable/foldingathome/0.0.6/questions.yaml b/stable/foldingathome/0.0.7/questions.yaml similarity index 100% rename from stable/foldingathome/0.0.6/questions.yaml rename to stable/foldingathome/0.0.7/questions.yaml diff --git a/stable/foldingathome/0.0.6/security.md b/stable/foldingathome/0.0.7/security.md similarity index 100% rename from stable/foldingathome/0.0.6/security.md rename to stable/foldingathome/0.0.7/security.md diff --git a/stable/freshrss/9.0.28/templates/common.yaml b/stable/foldingathome/0.0.7/templates/common.yaml similarity index 100% rename from stable/freshrss/9.0.28/templates/common.yaml rename to stable/foldingathome/0.0.7/templates/common.yaml diff --git a/stable/freshrss/9.0.28/values.yaml b/stable/foldingathome/0.0.7/values.yaml similarity index 100% rename from stable/freshrss/9.0.28/values.yaml rename to stable/foldingathome/0.0.7/values.yaml diff --git a/stable/fossil/2.0.24/Chart.lock b/stable/fossil/2.0.24/Chart.lock deleted file mode 100644 index a0af57074e7..00000000000 --- a/stable/fossil/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:30.055506368Z" diff --git a/stable/fossil/2.0.24/CHANGELOG.md b/stable/fossil/2.0.25/CHANGELOG.md similarity index 90% rename from stable/fossil/2.0.24/CHANGELOG.md rename to stable/fossil/2.0.25/CHANGELOG.md index c09a4ea6a57..708fa474e10 100644 --- a/stable/fossil/2.0.24/CHANGELOG.md +++ b/stable/fossil/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [fossil-2.0.25](https://github.com/truecharts/apps/compare/fossil-2.0.24...fossil-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [fossil-2.0.24](https://github.com/truecharts/apps/compare/fossil-2.0.23...fossil-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [fossil-2.0.16](https://github.com/truecharts/apps/compare/fossil-2.0.15...fossil-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [fossil-2.0.15](https://github.com/truecharts/apps/compare/fossil-2.0.14...fossil-2.0.15) (2021-12-04) - diff --git a/stable/friendica/0.0.16/CONFIG.md b/stable/fossil/2.0.25/CONFIG.md similarity index 100% rename from stable/friendica/0.0.16/CONFIG.md rename to stable/fossil/2.0.25/CONFIG.md diff --git a/stable/fossil/2.0.25/Chart.lock b/stable/fossil/2.0.25/Chart.lock new file mode 100644 index 00000000000..6527dea9c57 --- /dev/null +++ b/stable/fossil/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:16:01.208584663Z" diff --git a/stable/fossil/2.0.24/Chart.yaml b/stable/fossil/2.0.25/Chart.yaml similarity index 97% rename from stable/fossil/2.0.24/Chart.yaml rename to stable/fossil/2.0.25/Chart.yaml index 0ac4ac5d50b..dbeb97ebe9c 100644 --- a/stable/fossil/2.0.24/Chart.yaml +++ b/stable/fossil/2.0.25/Chart.yaml @@ -20,7 +20,7 @@ name: fossil sources: - https://fossil-scm.org/ type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/fossil/2.0.24/README.md b/stable/fossil/2.0.25/README.md similarity index 100% rename from stable/fossil/2.0.24/README.md rename to stable/fossil/2.0.25/README.md diff --git a/stable/fossil/2.0.24/app-readme.md b/stable/fossil/2.0.25/app-readme.md similarity index 100% rename from stable/fossil/2.0.24/app-readme.md rename to stable/fossil/2.0.25/app-readme.md diff --git a/stable/friendica/0.0.16/charts/common-8.9.24.tgz b/stable/fossil/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/friendica/0.0.16/charts/common-8.9.24.tgz rename to stable/fossil/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/fossil/2.0.24/helm-values.md b/stable/fossil/2.0.25/helm-values.md similarity index 100% rename from stable/fossil/2.0.24/helm-values.md rename to stable/fossil/2.0.25/helm-values.md diff --git a/stable/fossil/2.0.24/ix_values.yaml b/stable/fossil/2.0.25/ix_values.yaml similarity index 100% rename from stable/fossil/2.0.24/ix_values.yaml rename to stable/fossil/2.0.25/ix_values.yaml diff --git a/stable/fossil/2.0.24/questions.yaml b/stable/fossil/2.0.25/questions.yaml similarity index 99% rename from stable/fossil/2.0.24/questions.yaml rename to stable/fossil/2.0.25/questions.yaml index 54d95c9148f..6b0e067b0eb 100644 --- a/stable/fossil/2.0.24/questions.yaml +++ b/stable/fossil/2.0.25/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10083 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/fossil/2.0.24/security.md b/stable/fossil/2.0.25/security.md similarity index 100% rename from stable/fossil/2.0.24/security.md rename to stable/fossil/2.0.25/security.md diff --git a/stable/fossil/2.0.24/templates/common.yaml b/stable/fossil/2.0.25/templates/common.yaml similarity index 100% rename from stable/fossil/2.0.24/templates/common.yaml rename to stable/fossil/2.0.25/templates/common.yaml diff --git a/stable/friendica/0.0.16/values.yaml b/stable/fossil/2.0.25/values.yaml similarity index 100% rename from stable/friendica/0.0.16/values.yaml rename to stable/fossil/2.0.25/values.yaml diff --git a/stable/freeradius/4.0.27/Chart.lock b/stable/freeradius/4.0.27/Chart.lock deleted file mode 100644 index 39e392eeff2..00000000000 --- a/stable/freeradius/4.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:38.844794292Z" diff --git a/stable/freeradius/4.0.27/CHANGELOG.md b/stable/freeradius/4.0.28/CHANGELOG.md similarity index 90% rename from stable/freeradius/4.0.27/CHANGELOG.md rename to stable/freeradius/4.0.28/CHANGELOG.md index f0492d3cbe2..570f2d2d980 100644 --- a/stable/freeradius/4.0.27/CHANGELOG.md +++ b/stable/freeradius/4.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [freeradius-4.0.28](https://github.com/truecharts/apps/compare/freeradius-4.0.27...freeradius-4.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [freeradius-4.0.27](https://github.com/truecharts/apps/compare/freeradius-4.0.26...freeradius-4.0.27) (2021-12-19) @@ -87,13 +97,3 @@ ### [freeradius-4.0.19](https://github.com/truecharts/apps/compare/freeradius-4.0.18...freeradius-4.0.19) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [freeradius-4.0.18](https://github.com/truecharts/apps/compare/freeradius-4.0.17...freeradius-4.0.18) (2021-12-05) - diff --git a/stable/gaps/9.0.25/CONFIG.md b/stable/freeradius/4.0.28/CONFIG.md similarity index 100% rename from stable/gaps/9.0.25/CONFIG.md rename to stable/freeradius/4.0.28/CONFIG.md diff --git a/stable/dokuwiki/0.0.5/Chart.lock b/stable/freeradius/4.0.28/Chart.lock similarity index 79% rename from stable/dokuwiki/0.0.5/Chart.lock rename to stable/freeradius/4.0.28/Chart.lock index 5eb444ad7b9..7ff1981df10 100644 --- a/stable/dokuwiki/0.0.5/Chart.lock +++ b/stable/freeradius/4.0.28/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:26:12.92319175Z" +generated: "2021-12-19T23:16:09.63781728Z" diff --git a/stable/freeradius/4.0.27/Chart.yaml b/stable/freeradius/4.0.28/Chart.yaml similarity index 97% rename from stable/freeradius/4.0.27/Chart.yaml rename to stable/freeradius/4.0.28/Chart.yaml index c2b6b6aede5..c3f0ca75f8c 100644 --- a/stable/freeradius/4.0.27/Chart.yaml +++ b/stable/freeradius/4.0.28/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://hub.docker.com/r/freeradius/freeradius-server/ - https://freeradius.org/ type: application -version: 4.0.27 +version: 4.0.28 annotations: truecharts.org/catagories: | - auth diff --git a/stable/freeradius/4.0.27/README.md b/stable/freeradius/4.0.28/README.md similarity index 100% rename from stable/freeradius/4.0.27/README.md rename to stable/freeradius/4.0.28/README.md diff --git a/stable/freeradius/4.0.27/app-readme.md b/stable/freeradius/4.0.28/app-readme.md similarity index 100% rename from stable/freeradius/4.0.27/app-readme.md rename to stable/freeradius/4.0.28/app-readme.md diff --git a/stable/gaps/9.0.25/charts/common-8.9.24.tgz b/stable/freeradius/4.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/gaps/9.0.25/charts/common-8.9.24.tgz rename to stable/freeradius/4.0.28/charts/common-8.9.24.tgz diff --git a/stable/freeradius/4.0.27/helm-values.md b/stable/freeradius/4.0.28/helm-values.md similarity index 100% rename from stable/freeradius/4.0.27/helm-values.md rename to stable/freeradius/4.0.28/helm-values.md diff --git a/stable/freeradius/4.0.27/ix_values.yaml b/stable/freeradius/4.0.28/ix_values.yaml similarity index 100% rename from stable/freeradius/4.0.27/ix_values.yaml rename to stable/freeradius/4.0.28/ix_values.yaml diff --git a/stable/freeradius/4.0.27/questions.yaml b/stable/freeradius/4.0.28/questions.yaml similarity index 99% rename from stable/freeradius/4.0.27/questions.yaml rename to stable/freeradius/4.0.28/questions.yaml index 95bde87c58b..e59121d77df 100644 --- a/stable/freeradius/4.0.27/questions.yaml +++ b/stable/freeradius/4.0.28/questions.yaml @@ -338,7 +338,6 @@ questions: schema: type: int default: 1812 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -437,7 +436,6 @@ questions: schema: type: int default: 1813 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/freeradius/4.0.27/security.md b/stable/freeradius/4.0.28/security.md similarity index 100% rename from stable/freeradius/4.0.27/security.md rename to stable/freeradius/4.0.28/security.md diff --git a/stable/freeradius/4.0.27/templates/common.yaml b/stable/freeradius/4.0.28/templates/common.yaml similarity index 100% rename from stable/freeradius/4.0.27/templates/common.yaml rename to stable/freeradius/4.0.28/templates/common.yaml diff --git a/stable/gaps/9.0.25/values.yaml b/stable/freeradius/4.0.28/values.yaml similarity index 100% rename from stable/gaps/9.0.25/values.yaml rename to stable/freeradius/4.0.28/values.yaml diff --git a/stable/freshrss/9.0.28/Chart.lock b/stable/freshrss/9.0.28/Chart.lock deleted file mode 100644 index 7e7d6757bfa..00000000000 --- a/stable/freshrss/9.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:47.019401442Z" diff --git a/stable/freshrss/9.0.28/CHANGELOG.md b/stable/freshrss/9.0.29/CHANGELOG.md similarity index 90% rename from stable/freshrss/9.0.28/CHANGELOG.md rename to stable/freshrss/9.0.29/CHANGELOG.md index a958178e672..d4e07008957 100644 --- a/stable/freshrss/9.0.28/CHANGELOG.md +++ b/stable/freshrss/9.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [freshrss-9.0.29](https://github.com/truecharts/apps/compare/freshrss-9.0.28...freshrss-9.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [freshrss-9.0.28](https://github.com/truecharts/apps/compare/freshrss-9.0.27...freshrss-9.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [freshrss-9.0.20](https://github.com/truecharts/apps/compare/freshrss-9.0.19...freshrss-9.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [freshrss-9.0.19](https://github.com/truecharts/apps/compare/freshrss-9.0.18...freshrss-9.0.19) (2021-12-04) - diff --git a/stable/gitea/5.0.18/CONFIG.md b/stable/freshrss/9.0.29/CONFIG.md similarity index 100% rename from stable/gitea/5.0.18/CONFIG.md rename to stable/freshrss/9.0.29/CONFIG.md diff --git a/stable/freshrss/9.0.29/Chart.lock b/stable/freshrss/9.0.29/Chart.lock new file mode 100644 index 00000000000..c60c0066fe3 --- /dev/null +++ b/stable/freshrss/9.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:16:14.170972938Z" diff --git a/stable/freshrss/9.0.28/Chart.yaml b/stable/freshrss/9.0.29/Chart.yaml similarity index 97% rename from stable/freshrss/9.0.28/Chart.yaml rename to stable/freshrss/9.0.29/Chart.yaml index 1be684bfb22..f932318eb81 100644 --- a/stable/freshrss/9.0.28/Chart.yaml +++ b/stable/freshrss/9.0.29/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/FreshRSS/FreshRSS - https://hub.docker.com/r/linuxserver/freshrss type: application -version: 9.0.28 +version: 9.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/freshrss/9.0.28/README.md b/stable/freshrss/9.0.29/README.md similarity index 100% rename from stable/freshrss/9.0.28/README.md rename to stable/freshrss/9.0.29/README.md diff --git a/stable/freshrss/9.0.28/app-readme.md b/stable/freshrss/9.0.29/app-readme.md similarity index 100% rename from stable/freshrss/9.0.28/app-readme.md rename to stable/freshrss/9.0.29/app-readme.md diff --git a/stable/gitea/5.0.18/charts/common-8.9.24.tgz b/stable/freshrss/9.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/gitea/5.0.18/charts/common-8.9.24.tgz rename to stable/freshrss/9.0.29/charts/common-8.9.24.tgz diff --git a/stable/freshrss/9.0.28/helm-values.md b/stable/freshrss/9.0.29/helm-values.md similarity index 100% rename from stable/freshrss/9.0.28/helm-values.md rename to stable/freshrss/9.0.29/helm-values.md diff --git a/stable/freshrss/9.0.28/ix_values.yaml b/stable/freshrss/9.0.29/ix_values.yaml similarity index 100% rename from stable/freshrss/9.0.28/ix_values.yaml rename to stable/freshrss/9.0.29/ix_values.yaml diff --git a/stable/freshrss/9.0.28/questions.yaml b/stable/freshrss/9.0.29/questions.yaml similarity index 99% rename from stable/freshrss/9.0.28/questions.yaml rename to stable/freshrss/9.0.29/questions.yaml index 60f95744967..1ea40c21850 100644 --- a/stable/freshrss/9.0.28/questions.yaml +++ b/stable/freshrss/9.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10010 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/freshrss/9.0.28/security.md b/stable/freshrss/9.0.29/security.md similarity index 100% rename from stable/freshrss/9.0.28/security.md rename to stable/freshrss/9.0.29/security.md diff --git a/stable/gaps/9.0.25/templates/common.yaml b/stable/freshrss/9.0.29/templates/common.yaml similarity index 100% rename from stable/gaps/9.0.25/templates/common.yaml rename to stable/freshrss/9.0.29/templates/common.yaml diff --git a/stable/gitea/5.0.18/values.yaml b/stable/freshrss/9.0.29/values.yaml similarity index 100% rename from stable/gitea/5.0.18/values.yaml rename to stable/freshrss/9.0.29/values.yaml diff --git a/stable/friendica/0.0.16/CHANGELOG.md b/stable/friendica/0.0.17/CHANGELOG.md similarity index 92% rename from stable/friendica/0.0.16/CHANGELOG.md rename to stable/friendica/0.0.17/CHANGELOG.md index 63cf563e8ad..0f8647351c5 100644 --- a/stable/friendica/0.0.16/CHANGELOG.md +++ b/stable/friendica/0.0.17/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [friendica-0.0.17](https://github.com/truecharts/apps/compare/friendica-0.0.16...friendica-0.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [friendica-0.0.16](https://github.com/truecharts/apps/compare/friendica-0.0.15...friendica-0.0.16) (2021-12-19) @@ -88,12 +97,3 @@ - -### [friendica-0.0.8](https://github.com/truecharts/apps/compare/friendica-0.0.7...friendica-0.0.8) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - diff --git a/stable/golinks/2.0.24/CONFIG.md b/stable/friendica/0.0.17/CONFIG.md similarity index 100% rename from stable/golinks/2.0.24/CONFIG.md rename to stable/friendica/0.0.17/CONFIG.md diff --git a/stable/friendica/0.0.16/Chart.lock b/stable/friendica/0.0.17/Chart.lock similarity index 87% rename from stable/friendica/0.0.16/Chart.lock rename to stable/friendica/0.0.17/Chart.lock index c93fa0cc795..85eecaa2d81 100644 --- a/stable/friendica/0.0.16/Chart.lock +++ b/stable/friendica/0.0.17/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org version: 1.0.39 digest: sha256:2d7a39d3e4923b7f7f6d6ec0659a198efbdbc8d064319676b8089e2eaa4f5275 -generated: "2021-12-19T18:29:54.018382811Z" +generated: "2021-12-19T23:16:19.133318706Z" diff --git a/stable/friendica/0.0.16/Chart.yaml b/stable/friendica/0.0.17/Chart.yaml similarity index 98% rename from stable/friendica/0.0.16/Chart.yaml rename to stable/friendica/0.0.17/Chart.yaml index d25d8c83e57..34ab7e320e8 100644 --- a/stable/friendica/0.0.16/Chart.yaml +++ b/stable/friendica/0.0.17/Chart.yaml @@ -27,7 +27,7 @@ name: friendica sources: - https://friendi.ca/ - https://hub.docker.com/_/friendica -version: 0.0.16 +version: 0.0.17 annotations: truecharts.org/catagories: | - social diff --git a/stable/friendica/0.0.16/README.md b/stable/friendica/0.0.17/README.md similarity index 100% rename from stable/friendica/0.0.16/README.md rename to stable/friendica/0.0.17/README.md diff --git a/stable/friendica/0.0.16/app-readme.md b/stable/friendica/0.0.17/app-readme.md similarity index 100% rename from stable/friendica/0.0.16/app-readme.md rename to stable/friendica/0.0.17/app-readme.md diff --git a/stable/golinks/2.0.24/charts/common-8.9.24.tgz b/stable/friendica/0.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/golinks/2.0.24/charts/common-8.9.24.tgz rename to stable/friendica/0.0.17/charts/common-8.9.24.tgz diff --git a/stable/friendica/0.0.16/charts/mariadb-1.0.37.tgz b/stable/friendica/0.0.17/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/friendica/0.0.16/charts/mariadb-1.0.37.tgz rename to stable/friendica/0.0.17/charts/mariadb-1.0.37.tgz diff --git a/stable/paperless-ng/1.0.3/charts/redis-1.0.39.tgz b/stable/friendica/0.0.17/charts/redis-1.0.39.tgz similarity index 100% rename from stable/paperless-ng/1.0.3/charts/redis-1.0.39.tgz rename to stable/friendica/0.0.17/charts/redis-1.0.39.tgz diff --git a/stable/friendica/0.0.16/helm-values.md b/stable/friendica/0.0.17/helm-values.md similarity index 100% rename from stable/friendica/0.0.16/helm-values.md rename to stable/friendica/0.0.17/helm-values.md diff --git a/stable/friendica/0.0.16/ix_values.yaml b/stable/friendica/0.0.17/ix_values.yaml similarity index 100% rename from stable/friendica/0.0.16/ix_values.yaml rename to stable/friendica/0.0.17/ix_values.yaml diff --git a/stable/friendica/0.0.16/questions.yaml b/stable/friendica/0.0.17/questions.yaml similarity index 100% rename from stable/friendica/0.0.16/questions.yaml rename to stable/friendica/0.0.17/questions.yaml diff --git a/stable/friendica/0.0.16/security.md b/stable/friendica/0.0.17/security.md similarity index 100% rename from stable/friendica/0.0.16/security.md rename to stable/friendica/0.0.17/security.md diff --git a/stable/friendica/0.0.16/templates/common.yaml b/stable/friendica/0.0.17/templates/common.yaml similarity index 100% rename from stable/friendica/0.0.16/templates/common.yaml rename to stable/friendica/0.0.17/templates/common.yaml diff --git a/stable/golinks/2.0.24/values.yaml b/stable/friendica/0.0.17/values.yaml similarity index 100% rename from stable/golinks/2.0.24/values.yaml rename to stable/friendica/0.0.17/values.yaml diff --git a/stable/gaps/9.0.25/Chart.lock b/stable/gaps/9.0.25/Chart.lock deleted file mode 100644 index 8059e7c2a1e..00000000000 --- a/stable/gaps/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:29:57.498318871Z" diff --git a/stable/gaps/9.0.25/CHANGELOG.md b/stable/gaps/9.0.26/CHANGELOG.md similarity index 90% rename from stable/gaps/9.0.25/CHANGELOG.md rename to stable/gaps/9.0.26/CHANGELOG.md index 9aee8146f08..96d5081e40e 100644 --- a/stable/gaps/9.0.25/CHANGELOG.md +++ b/stable/gaps/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [gaps-9.0.26](https://github.com/truecharts/apps/compare/gaps-9.0.25...gaps-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [gaps-9.0.25](https://github.com/truecharts/apps/compare/gaps-9.0.24...gaps-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [gaps-9.0.17](https://github.com/truecharts/apps/compare/gaps-9.0.16...gaps-9.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [gaps-9.0.16](https://github.com/truecharts/apps/compare/gaps-9.0.15...gaps-9.0.16) (2021-12-04) - diff --git a/stable/gonic/4.0.24/CONFIG.md b/stable/gaps/9.0.26/CONFIG.md similarity index 100% rename from stable/gonic/4.0.24/CONFIG.md rename to stable/gaps/9.0.26/CONFIG.md diff --git a/stable/gaps/9.0.26/Chart.lock b/stable/gaps/9.0.26/Chart.lock new file mode 100644 index 00000000000..e589f076a8b --- /dev/null +++ b/stable/gaps/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:16:26.546665046Z" diff --git a/stable/gaps/9.0.25/Chart.yaml b/stable/gaps/9.0.26/Chart.yaml similarity index 97% rename from stable/gaps/9.0.25/Chart.yaml rename to stable/gaps/9.0.26/Chart.yaml index 8c978998ee5..3b3863b7099 100644 --- a/stable/gaps/9.0.25/Chart.yaml +++ b/stable/gaps/9.0.26/Chart.yaml @@ -22,7 +22,7 @@ name: gaps sources: - https://github.com/JasonHHouse/gaps type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/gaps/9.0.25/README.md b/stable/gaps/9.0.26/README.md similarity index 100% rename from stable/gaps/9.0.25/README.md rename to stable/gaps/9.0.26/README.md diff --git a/stable/gaps/9.0.25/app-readme.md b/stable/gaps/9.0.26/app-readme.md similarity index 100% rename from stable/gaps/9.0.25/app-readme.md rename to stable/gaps/9.0.26/app-readme.md diff --git a/stable/gonic/4.0.24/charts/common-8.9.24.tgz b/stable/gaps/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/gonic/4.0.24/charts/common-8.9.24.tgz rename to stable/gaps/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/gaps/9.0.25/helm-values.md b/stable/gaps/9.0.26/helm-values.md similarity index 100% rename from stable/gaps/9.0.25/helm-values.md rename to stable/gaps/9.0.26/helm-values.md diff --git a/stable/gaps/9.0.25/ix_values.yaml b/stable/gaps/9.0.26/ix_values.yaml similarity index 100% rename from stable/gaps/9.0.25/ix_values.yaml rename to stable/gaps/9.0.26/ix_values.yaml diff --git a/stable/gaps/9.0.25/questions.yaml b/stable/gaps/9.0.26/questions.yaml similarity index 99% rename from stable/gaps/9.0.25/questions.yaml rename to stable/gaps/9.0.26/questions.yaml index 546f6715269..1e87004760f 100644 --- a/stable/gaps/9.0.25/questions.yaml +++ b/stable/gaps/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8484 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/gaps/9.0.25/security.md b/stable/gaps/9.0.26/security.md similarity index 99% rename from stable/gaps/9.0.25/security.md rename to stable/gaps/9.0.26/security.md index 43f8179bbf3..05872178f87 100644 --- a/stable/gaps/9.0.25/security.md +++ b/stable/gaps/9.0.26/security.md @@ -214,7 +214,7 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | ch.qos.logback:logback-core | CVE-2021-42550 | MEDIUM | 1.2.3 | |
Expand...http://logback.qos.ch/news.html
https://github.com/advisories/GHSA-668q-qrv7-99fm
https://github.com/cn-panda/logbackRceDemo
https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html
https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c
https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42
https://jira.qos.ch/browse/LOGBACK-1591
https://nvd.nist.gov/vuln/detail/CVE-2021-42550
| | org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.13.3 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
http://www.openwall.com/lists/oss-security/2021/12/13/1
http://www.openwall.com/lists/oss-security/2021/12/13/2
http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://issues.apache.org/jira/browse/LOG4J2-3214
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://twitter.com/kurtseifried/status/1469345530182455296
https://ubuntu.com/security/notices/USN-5192-1
https://ubuntu.com/security/notices/USN-5192-2
https://ubuntu.com/security/notices/USN-5197-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell
https://www.debian.org/security/2021/dsa-5020
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.13.3 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.13.3 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.logging.log4j:log4j-api | CVE-2021-45046 | LOW | 2.13.3 | 2.16.0 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://access.redhat.com/security/cve/CVE-2021-44228
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5197-1
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.cve.org/CVERecord?id=CVE-2021-45046
https://www.debian.org/security/2021/dsa-5022
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.openwall.com/lists/oss-security/2021/12/14/4
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-17527 | HIGH | 9.0.39 | 8.5.60, 9.0.40, 10.0.2 |
Expand...http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40
http://www.openwall.com/lists/oss-security/2020/12/03/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527
https://github.com/apache/tomcat/commit/21e3408671aac7e0d7e264e720cac8b1b189eb29 (8.5.60)
https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65 (9.0.40)
https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd5babd13d7a350b369b2f647b4dd32ce678af42f9aba5389df1ae6ca@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17527
https://security.gentoo.org/glsa/202012-23
https://security.netapp.com/advisory/ntap-20201210-0003/
https://www.debian.org/security/2021/dsa-4835
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | HIGH | 9.0.39 | 8.5.63, 9.0.43, 10.0.2 |
Expand...http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/1
https://github.com/advisories/GHSA-j39c-c8hj-x4j3
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25122
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://www.debian.org/security/2021/dsa-4891
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/gonic/4.0.24/templates/common.yaml b/stable/gaps/9.0.26/templates/common.yaml similarity index 100% rename from stable/gonic/4.0.24/templates/common.yaml rename to stable/gaps/9.0.26/templates/common.yaml diff --git a/stable/gonic/4.0.24/values.yaml b/stable/gaps/9.0.26/values.yaml similarity index 100% rename from stable/gonic/4.0.24/values.yaml rename to stable/gaps/9.0.26/values.yaml diff --git a/stable/gitea/5.0.18/CHANGELOG.md b/stable/gitea/5.0.19/CHANGELOG.md similarity index 89% rename from stable/gitea/5.0.18/CHANGELOG.md rename to stable/gitea/5.0.19/CHANGELOG.md index 7d5e7a9fee3..61baee8cf68 100644 --- a/stable/gitea/5.0.18/CHANGELOG.md +++ b/stable/gitea/5.0.19/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [gitea-5.0.19](https://github.com/truecharts/apps/compare/gitea-5.0.18...gitea-5.0.19) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [gitea-5.0.18](https://github.com/truecharts/apps/compare/gitea-5.0.17...gitea-5.0.18) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [gitea-5.0.9](https://github.com/truecharts/apps/compare/gitea-5.0.8...gitea-5.0.9) (2021-12-05) diff --git a/stable/gotify/5.0.16/CONFIG.md b/stable/gitea/5.0.19/CONFIG.md similarity index 100% rename from stable/gotify/5.0.16/CONFIG.md rename to stable/gitea/5.0.19/CONFIG.md diff --git a/stable/gitea/5.0.18/Chart.lock b/stable/gitea/5.0.19/Chart.lock similarity index 87% rename from stable/gitea/5.0.18/Chart.lock rename to stable/gitea/5.0.19/Chart.lock index b1f03802489..22425ed872c 100644 --- a/stable/gitea/5.0.18/Chart.lock +++ b/stable/gitea/5.0.19/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.36 digest: sha256:835fdca53956a5d3a1441852d666107b70481c90786d90021687e6896ed68957 -generated: "2021-12-19T18:30:05.777852403Z" +generated: "2021-12-19T23:16:39.151200568Z" diff --git a/stable/gitea/5.0.18/Chart.yaml b/stable/gitea/5.0.19/Chart.yaml similarity index 98% rename from stable/gitea/5.0.18/Chart.yaml rename to stable/gitea/5.0.19/Chart.yaml index 00d06c1d4c9..851b7e666e5 100644 --- a/stable/gitea/5.0.18/Chart.yaml +++ b/stable/gitea/5.0.19/Chart.yaml @@ -34,7 +34,7 @@ sources: - https://github.com/go-gitea/gitea - https://hub.docker.com/r/gitea/gitea/ type: application -version: 5.0.18 +version: 5.0.19 annotations: truecharts.org/catagories: | - GIT diff --git a/stable/gitea/5.0.18/README.md b/stable/gitea/5.0.19/README.md similarity index 100% rename from stable/gitea/5.0.18/README.md rename to stable/gitea/5.0.19/README.md diff --git a/stable/gitea/5.0.18/app-readme.md b/stable/gitea/5.0.19/app-readme.md similarity index 100% rename from stable/gitea/5.0.18/app-readme.md rename to stable/gitea/5.0.19/app-readme.md diff --git a/stable/gotify/5.0.16/charts/common-8.9.24.tgz b/stable/gitea/5.0.19/charts/common-8.9.24.tgz similarity index 100% rename from stable/gotify/5.0.16/charts/common-8.9.24.tgz rename to stable/gitea/5.0.19/charts/common-8.9.24.tgz diff --git a/stable/gitea/5.0.18/charts/memcached-1.0.36.tgz b/stable/gitea/5.0.19/charts/memcached-1.0.36.tgz similarity index 100% rename from stable/gitea/5.0.18/charts/memcached-1.0.36.tgz rename to stable/gitea/5.0.19/charts/memcached-1.0.36.tgz diff --git a/stable/gotify/5.0.16/charts/postgresql-6.0.34.tgz b/stable/gitea/5.0.19/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/gotify/5.0.16/charts/postgresql-6.0.34.tgz rename to stable/gitea/5.0.19/charts/postgresql-6.0.34.tgz diff --git a/stable/gitea/5.0.18/ci/basic-values.yaml b/stable/gitea/5.0.19/ci/basic-values.yaml similarity index 100% rename from stable/gitea/5.0.18/ci/basic-values.yaml rename to stable/gitea/5.0.19/ci/basic-values.yaml diff --git a/stable/gitea/5.0.18/ci/ingress-values.yaml b/stable/gitea/5.0.19/ci/ingress-values.yaml similarity index 100% rename from stable/gitea/5.0.18/ci/ingress-values.yaml rename to stable/gitea/5.0.19/ci/ingress-values.yaml diff --git a/stable/gitea/5.0.18/helm-values.md b/stable/gitea/5.0.19/helm-values.md similarity index 100% rename from stable/gitea/5.0.18/helm-values.md rename to stable/gitea/5.0.19/helm-values.md diff --git a/stable/gitea/5.0.18/ix_values.yaml b/stable/gitea/5.0.19/ix_values.yaml similarity index 100% rename from stable/gitea/5.0.18/ix_values.yaml rename to stable/gitea/5.0.19/ix_values.yaml diff --git a/stable/gitea/5.0.18/questions.yaml b/stable/gitea/5.0.19/questions.yaml similarity index 99% rename from stable/gitea/5.0.18/questions.yaml rename to stable/gitea/5.0.19/questions.yaml index 047ae06271e..c776b0119a7 100644 --- a/stable/gitea/5.0.18/questions.yaml +++ b/stable/gitea/5.0.19/questions.yaml @@ -432,7 +432,6 @@ questions: schema: type: int default: 10037 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -531,7 +530,6 @@ questions: schema: type: int default: 2222 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/gitea/5.0.18/security.md b/stable/gitea/5.0.19/security.md similarity index 100% rename from stable/gitea/5.0.18/security.md rename to stable/gitea/5.0.19/security.md diff --git a/stable/gitea/5.0.18/templates/_configmap.tpl b/stable/gitea/5.0.19/templates/_configmap.tpl similarity index 100% rename from stable/gitea/5.0.18/templates/_configmap.tpl rename to stable/gitea/5.0.19/templates/_configmap.tpl diff --git a/stable/gitea/5.0.18/templates/_secrets.tpl b/stable/gitea/5.0.19/templates/_secrets.tpl similarity index 100% rename from stable/gitea/5.0.18/templates/_secrets.tpl rename to stable/gitea/5.0.19/templates/_secrets.tpl diff --git a/stable/gitea/5.0.18/templates/common.yaml b/stable/gitea/5.0.19/templates/common.yaml similarity index 100% rename from stable/gitea/5.0.18/templates/common.yaml rename to stable/gitea/5.0.19/templates/common.yaml diff --git a/stable/gotify/5.0.16/values.yaml b/stable/gitea/5.0.19/values.yaml similarity index 100% rename from stable/gotify/5.0.16/values.yaml rename to stable/gitea/5.0.19/values.yaml diff --git a/stable/golinks/2.0.24/Chart.lock b/stable/golinks/2.0.24/Chart.lock deleted file mode 100644 index 84b8c658d49..00000000000 --- a/stable/golinks/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:30:11.124565678Z" diff --git a/stable/golinks/2.0.24/CHANGELOG.md b/stable/golinks/2.0.25/CHANGELOG.md similarity index 90% rename from stable/golinks/2.0.24/CHANGELOG.md rename to stable/golinks/2.0.25/CHANGELOG.md index 1994314a0be..936ed881342 100644 --- a/stable/golinks/2.0.24/CHANGELOG.md +++ b/stable/golinks/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [golinks-2.0.25](https://github.com/truecharts/apps/compare/golinks-2.0.24...golinks-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [golinks-2.0.24](https://github.com/truecharts/apps/compare/golinks-2.0.23...golinks-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [golinks-2.0.16](https://github.com/truecharts/apps/compare/golinks-2.0.15...golinks-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [golinks-2.0.15](https://github.com/truecharts/apps/compare/golinks-2.0.14...golinks-2.0.15) (2021-12-04) diff --git a/stable/grafana/2.0.8/CONFIG.md b/stable/golinks/2.0.25/CONFIG.md similarity index 100% rename from stable/grafana/2.0.8/CONFIG.md rename to stable/golinks/2.0.25/CONFIG.md diff --git a/stable/golinks/2.0.25/Chart.lock b/stable/golinks/2.0.25/Chart.lock new file mode 100644 index 00000000000..08972782c8d --- /dev/null +++ b/stable/golinks/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:16:41.355556416Z" diff --git a/stable/golinks/2.0.24/Chart.yaml b/stable/golinks/2.0.25/Chart.yaml similarity index 98% rename from stable/golinks/2.0.24/Chart.yaml rename to stable/golinks/2.0.25/Chart.yaml index 0c9754873bb..f7614fc5e72 100644 --- a/stable/golinks/2.0.24/Chart.yaml +++ b/stable/golinks/2.0.25/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/prologic/golinks - https://github.com/nicholaswilde/docker-golinks type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/golinks/2.0.24/README.md b/stable/golinks/2.0.25/README.md similarity index 100% rename from stable/golinks/2.0.24/README.md rename to stable/golinks/2.0.25/README.md diff --git a/stable/golinks/2.0.24/app-readme.md b/stable/golinks/2.0.25/app-readme.md similarity index 100% rename from stable/golinks/2.0.24/app-readme.md rename to stable/golinks/2.0.25/app-readme.md diff --git a/stable/grafana/2.0.8/charts/common-8.9.24.tgz b/stable/golinks/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/grafana/2.0.8/charts/common-8.9.24.tgz rename to stable/golinks/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/golinks/2.0.24/helm-values.md b/stable/golinks/2.0.25/helm-values.md similarity index 100% rename from stable/golinks/2.0.24/helm-values.md rename to stable/golinks/2.0.25/helm-values.md diff --git a/stable/golinks/2.0.24/ix_values.yaml b/stable/golinks/2.0.25/ix_values.yaml similarity index 100% rename from stable/golinks/2.0.24/ix_values.yaml rename to stable/golinks/2.0.25/ix_values.yaml diff --git a/stable/golinks/2.0.24/questions.yaml b/stable/golinks/2.0.25/questions.yaml similarity index 99% rename from stable/golinks/2.0.24/questions.yaml rename to stable/golinks/2.0.25/questions.yaml index 8ad863e2ce8..e60942e7662 100644 --- a/stable/golinks/2.0.24/questions.yaml +++ b/stable/golinks/2.0.25/questions.yaml @@ -363,7 +363,6 @@ questions: schema: type: int default: 10073 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/golinks/2.0.24/security.md b/stable/golinks/2.0.25/security.md similarity index 100% rename from stable/golinks/2.0.24/security.md rename to stable/golinks/2.0.25/security.md diff --git a/stable/golinks/2.0.24/templates/common.yaml b/stable/golinks/2.0.25/templates/common.yaml similarity index 100% rename from stable/golinks/2.0.24/templates/common.yaml rename to stable/golinks/2.0.25/templates/common.yaml diff --git a/stable/grafana/2.0.8/values.yaml b/stable/golinks/2.0.25/values.yaml similarity index 100% rename from stable/grafana/2.0.8/values.yaml rename to stable/golinks/2.0.25/values.yaml diff --git a/stable/gonic/4.0.24/Chart.lock b/stable/gonic/4.0.24/Chart.lock deleted file mode 100644 index 36dc94c08a7..00000000000 --- a/stable/gonic/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:30:29.122377099Z" diff --git a/stable/gonic/4.0.24/CHANGELOG.md b/stable/gonic/4.0.25/CHANGELOG.md similarity index 90% rename from stable/gonic/4.0.24/CHANGELOG.md rename to stable/gonic/4.0.25/CHANGELOG.md index 550ad039e75..1e78c4e1f59 100644 --- a/stable/gonic/4.0.24/CHANGELOG.md +++ b/stable/gonic/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [gonic-4.0.25](https://github.com/truecharts/apps/compare/gonic-4.0.24...gonic-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [gonic-4.0.24](https://github.com/truecharts/apps/compare/gonic-4.0.23...gonic-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [gonic-4.0.16](https://github.com/truecharts/apps/compare/gonic-4.0.15...gonic-4.0.16) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [gonic-4.0.15](https://github.com/truecharts/apps/compare/gonic-4.0.14...gonic-4.0.15) (2021-12-04) - -#### Chore diff --git a/stable/grav/2.0.24/CONFIG.md b/stable/gonic/4.0.25/CONFIG.md similarity index 100% rename from stable/grav/2.0.24/CONFIG.md rename to stable/gonic/4.0.25/CONFIG.md diff --git a/stable/gonic/4.0.25/Chart.lock b/stable/gonic/4.0.25/Chart.lock new file mode 100644 index 00000000000..2590185cf4d --- /dev/null +++ b/stable/gonic/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:05.534517303Z" diff --git a/stable/gonic/4.0.24/Chart.yaml b/stable/gonic/4.0.25/Chart.yaml similarity index 97% rename from stable/gonic/4.0.24/Chart.yaml rename to stable/gonic/4.0.25/Chart.yaml index fbeb4e78dec..3bec89dcee4 100644 --- a/stable/gonic/4.0.24/Chart.yaml +++ b/stable/gonic/4.0.25/Chart.yaml @@ -19,7 +19,7 @@ name: gonic sources: - https://github.com/sentriz/gonic - https://hub.docker.com/r/sentriz/gonic -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/gonic/4.0.24/README.md b/stable/gonic/4.0.25/README.md similarity index 100% rename from stable/gonic/4.0.24/README.md rename to stable/gonic/4.0.25/README.md diff --git a/stable/gonic/4.0.24/app-readme.md b/stable/gonic/4.0.25/app-readme.md similarity index 100% rename from stable/gonic/4.0.24/app-readme.md rename to stable/gonic/4.0.25/app-readme.md diff --git a/stable/grav/2.0.24/charts/common-8.9.24.tgz b/stable/gonic/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/grav/2.0.24/charts/common-8.9.24.tgz rename to stable/gonic/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/gonic/4.0.24/ci/ct-values.yaml b/stable/gonic/4.0.25/ci/ct-values.yaml similarity index 100% rename from stable/gonic/4.0.24/ci/ct-values.yaml rename to stable/gonic/4.0.25/ci/ct-values.yaml diff --git a/stable/gonic/4.0.24/helm-values.md b/stable/gonic/4.0.25/helm-values.md similarity index 100% rename from stable/gonic/4.0.24/helm-values.md rename to stable/gonic/4.0.25/helm-values.md diff --git a/stable/gonic/4.0.24/ix_values.yaml b/stable/gonic/4.0.25/ix_values.yaml similarity index 100% rename from stable/gonic/4.0.24/ix_values.yaml rename to stable/gonic/4.0.25/ix_values.yaml diff --git a/stable/gonic/4.0.24/questions.yaml b/stable/gonic/4.0.25/questions.yaml similarity index 99% rename from stable/gonic/4.0.24/questions.yaml rename to stable/gonic/4.0.25/questions.yaml index 8e1a141c91c..dcbdeb1b963 100644 --- a/stable/gonic/4.0.24/questions.yaml +++ b/stable/gonic/4.0.25/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10023 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/gonic/4.0.24/security.md b/stable/gonic/4.0.25/security.md similarity index 100% rename from stable/gonic/4.0.24/security.md rename to stable/gonic/4.0.25/security.md diff --git a/stable/grafana/2.0.8/templates/common.yaml b/stable/gonic/4.0.25/templates/common.yaml similarity index 100% rename from stable/grafana/2.0.8/templates/common.yaml rename to stable/gonic/4.0.25/templates/common.yaml diff --git a/stable/grav/2.0.24/values.yaml b/stable/gonic/4.0.25/values.yaml similarity index 100% rename from stable/grav/2.0.24/values.yaml rename to stable/gonic/4.0.25/values.yaml diff --git a/stable/gotify/5.0.16/CHANGELOG.md b/stable/gotify/5.0.17/CHANGELOG.md similarity index 86% rename from stable/gotify/5.0.16/CHANGELOG.md rename to stable/gotify/5.0.17/CHANGELOG.md index d705adcee37..0dd1671177a 100644 --- a/stable/gotify/5.0.16/CHANGELOG.md +++ b/stable/gotify/5.0.17/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [gotify-5.0.17](https://github.com/truecharts/apps/compare/gotify-5.0.16...gotify-5.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [gotify-5.0.16](https://github.com/truecharts/apps/compare/gotify-5.0.15...gotify-5.0.16) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - -### [gotify-5.0.8](https://github.com/truecharts/apps/compare/gotify-5.0.7...gotify-5.0.8) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - - - - diff --git a/stable/grocy/9.0.25/CONFIG.md b/stable/gotify/5.0.17/CONFIG.md similarity index 100% rename from stable/grocy/9.0.25/CONFIG.md rename to stable/gotify/5.0.17/CONFIG.md diff --git a/stable/gotify/5.0.17/Chart.lock b/stable/gotify/5.0.17/Chart.lock new file mode 100644 index 00000000000..e7fae0f8cfd --- /dev/null +++ b/stable/gotify/5.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:17:14.471447351Z" diff --git a/stable/gotify/5.0.16/Chart.yaml b/stable/gotify/5.0.17/Chart.yaml similarity index 98% rename from stable/gotify/5.0.16/Chart.yaml rename to stable/gotify/5.0.17/Chart.yaml index 0b4c280c14c..c359db181bf 100644 --- a/stable/gotify/5.0.16/Chart.yaml +++ b/stable/gotify/5.0.17/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 appVersion: "2.1.3" -version: 5.0.16 +version: 5.0.17 kubeVersion: '>=1.16.0-0' name: gotify description: a simple server for sending and receiving messages diff --git a/stable/gotify/5.0.16/README.md b/stable/gotify/5.0.17/README.md similarity index 100% rename from stable/gotify/5.0.16/README.md rename to stable/gotify/5.0.17/README.md diff --git a/stable/gotify/5.0.16/app-readme.md b/stable/gotify/5.0.17/app-readme.md similarity index 100% rename from stable/gotify/5.0.16/app-readme.md rename to stable/gotify/5.0.17/app-readme.md diff --git a/stable/grocy/9.0.25/charts/common-8.9.24.tgz b/stable/gotify/5.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/grocy/9.0.25/charts/common-8.9.24.tgz rename to stable/gotify/5.0.17/charts/common-8.9.24.tgz diff --git a/stable/joplin-server/5.0.15/charts/postgresql-6.0.34.tgz b/stable/gotify/5.0.17/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/joplin-server/5.0.15/charts/postgresql-6.0.34.tgz rename to stable/gotify/5.0.17/charts/postgresql-6.0.34.tgz diff --git a/stable/gotify/5.0.16/helm-values.md b/stable/gotify/5.0.17/helm-values.md similarity index 100% rename from stable/gotify/5.0.16/helm-values.md rename to stable/gotify/5.0.17/helm-values.md diff --git a/stable/gotify/5.0.16/ix_values.yaml b/stable/gotify/5.0.17/ix_values.yaml similarity index 100% rename from stable/gotify/5.0.16/ix_values.yaml rename to stable/gotify/5.0.17/ix_values.yaml diff --git a/stable/gotify/5.0.16/questions.yaml b/stable/gotify/5.0.17/questions.yaml similarity index 99% rename from stable/gotify/5.0.16/questions.yaml rename to stable/gotify/5.0.17/questions.yaml index 6bac10ebe02..f766ca93cc6 100644 --- a/stable/gotify/5.0.16/questions.yaml +++ b/stable/gotify/5.0.17/questions.yaml @@ -212,14 +212,6 @@ questions: schema: type: string default: "002" - - variable: GOTIFY_SERVER_PORT - label: "GOTIFY_SERVER_PORT" - description: "Sets the GOTIFY_SERVER_PORT env var" - schema: - type: int - required: true - hidden: true - default: 8080 - variable: GOTIFY_SERVER_KEEPALIVEPERIODSECONDS label: "GOTIFY_SERVER_KEEPALIVEPERIODSECONDS" description: "Sets the GOTIFY_SERVER_KEEPALIVEPERIODSECONDS env var" @@ -419,7 +411,6 @@ questions: schema: type: int default: 10084 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/gotify/5.0.16/security.md b/stable/gotify/5.0.17/security.md similarity index 100% rename from stable/gotify/5.0.16/security.md rename to stable/gotify/5.0.17/security.md diff --git a/stable/gotify/5.0.16/templates/_configmap.tpl b/stable/gotify/5.0.17/templates/_configmap.tpl similarity index 100% rename from stable/gotify/5.0.16/templates/_configmap.tpl rename to stable/gotify/5.0.17/templates/_configmap.tpl diff --git a/stable/gotify/5.0.16/templates/common.yaml b/stable/gotify/5.0.17/templates/common.yaml similarity index 100% rename from stable/gotify/5.0.16/templates/common.yaml rename to stable/gotify/5.0.17/templates/common.yaml diff --git a/stable/grocy/9.0.25/values.yaml b/stable/gotify/5.0.17/values.yaml similarity index 100% rename from stable/grocy/9.0.25/values.yaml rename to stable/gotify/5.0.17/values.yaml diff --git a/stable/grafana/2.0.8/Chart.lock b/stable/grafana/2.0.8/Chart.lock deleted file mode 100644 index 08053c08706..00000000000 --- a/stable/grafana/2.0.8/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:30:42.213866758Z" diff --git a/stable/grafana/2.0.8/CHANGELOG.md b/stable/grafana/2.0.9/CHANGELOG.md similarity index 92% rename from stable/grafana/2.0.8/CHANGELOG.md rename to stable/grafana/2.0.9/CHANGELOG.md index cdd83e5578a..d269cfa13c7 100644 --- a/stable/grafana/2.0.8/CHANGELOG.md +++ b/stable/grafana/2.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-2.0.9](https://github.com/truecharts/apps/compare/grafana-2.0.8...grafana-2.0.9) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [grafana-2.0.8](https://github.com/truecharts/apps/compare/grafana-2.0.7...grafana-2.0.8) (2021-12-19) @@ -88,12 +97,3 @@ ### [grafana-1.0.14](https://github.com/truecharts/apps/compare/grafana-1.0.13...grafana-1.0.14) (2021-12-11) -#### Chore - -* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) - - - - -### [grafana-1.0.13](https://github.com/truecharts/apps/compare/grafana-1.0.12...grafana-1.0.13) (2021-12-08) - diff --git a/stable/guacd/0.0.5/CONFIG.md b/stable/grafana/2.0.9/CONFIG.md similarity index 100% rename from stable/guacd/0.0.5/CONFIG.md rename to stable/grafana/2.0.9/CONFIG.md diff --git a/stable/grafana/2.0.9/Chart.lock b/stable/grafana/2.0.9/Chart.lock new file mode 100644 index 00000000000..b94068c6b94 --- /dev/null +++ b/stable/grafana/2.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:16.364184459Z" diff --git a/stable/grafana/2.0.8/Chart.yaml b/stable/grafana/2.0.9/Chart.yaml similarity index 98% rename from stable/grafana/2.0.8/Chart.yaml rename to stable/grafana/2.0.9/Chart.yaml index cb70f95c7cc..e225a085101 100644 --- a/stable/grafana/2.0.8/Chart.yaml +++ b/stable/grafana/2.0.9/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-grafana - https://grafana.com/ type: application -version: 2.0.8 +version: 2.0.9 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/grafana/2.0.8/README.md b/stable/grafana/2.0.9/README.md similarity index 100% rename from stable/grafana/2.0.8/README.md rename to stable/grafana/2.0.9/README.md diff --git a/stable/grafana/2.0.8/app-readme.md b/stable/grafana/2.0.9/app-readme.md similarity index 100% rename from stable/grafana/2.0.8/app-readme.md rename to stable/grafana/2.0.9/app-readme.md diff --git a/stable/guacd/0.0.5/charts/common-8.9.24.tgz b/stable/grafana/2.0.9/charts/common-8.9.24.tgz similarity index 100% rename from stable/guacd/0.0.5/charts/common-8.9.24.tgz rename to stable/grafana/2.0.9/charts/common-8.9.24.tgz diff --git a/stable/grafana/2.0.8/helm-values.md b/stable/grafana/2.0.9/helm-values.md similarity index 100% rename from stable/grafana/2.0.8/helm-values.md rename to stable/grafana/2.0.9/helm-values.md diff --git a/stable/grafana/2.0.8/ix_values.yaml b/stable/grafana/2.0.9/ix_values.yaml similarity index 100% rename from stable/grafana/2.0.8/ix_values.yaml rename to stable/grafana/2.0.9/ix_values.yaml diff --git a/stable/grafana/2.0.8/questions.yaml b/stable/grafana/2.0.9/questions.yaml similarity index 100% rename from stable/grafana/2.0.8/questions.yaml rename to stable/grafana/2.0.9/questions.yaml diff --git a/stable/grafana/2.0.8/security.md b/stable/grafana/2.0.9/security.md similarity index 100% rename from stable/grafana/2.0.8/security.md rename to stable/grafana/2.0.9/security.md diff --git a/stable/grocy/9.0.25/templates/common.yaml b/stable/grafana/2.0.9/templates/common.yaml similarity index 100% rename from stable/grocy/9.0.25/templates/common.yaml rename to stable/grafana/2.0.9/templates/common.yaml diff --git a/stable/grafana/2.0.8/templates/prometheusrules.yaml b/stable/grafana/2.0.9/templates/prometheusrules.yaml similarity index 100% rename from stable/grafana/2.0.8/templates/prometheusrules.yaml rename to stable/grafana/2.0.9/templates/prometheusrules.yaml diff --git a/stable/grafana/2.0.8/templates/servicemonitor.yaml b/stable/grafana/2.0.9/templates/servicemonitor.yaml similarity index 100% rename from stable/grafana/2.0.8/templates/servicemonitor.yaml rename to stable/grafana/2.0.9/templates/servicemonitor.yaml diff --git a/stable/guacd/0.0.5/values.yaml b/stable/grafana/2.0.9/values.yaml similarity index 100% rename from stable/guacd/0.0.5/values.yaml rename to stable/grafana/2.0.9/values.yaml diff --git a/stable/grav/2.0.24/Chart.lock b/stable/grav/2.0.24/Chart.lock deleted file mode 100644 index 2f8c2c04914..00000000000 --- a/stable/grav/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:30:54.444920486Z" diff --git a/stable/grav/2.0.24/CHANGELOG.md b/stable/grav/2.0.25/CHANGELOG.md similarity index 91% rename from stable/grav/2.0.24/CHANGELOG.md rename to stable/grav/2.0.25/CHANGELOG.md index b81b6eb14c1..5ab14c1cfdf 100644 --- a/stable/grav/2.0.24/CHANGELOG.md +++ b/stable/grav/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [grav-2.0.25](https://github.com/truecharts/apps/compare/grav-2.0.24...grav-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [grav-2.0.24](https://github.com/truecharts/apps/compare/grav-2.0.23...grav-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [grav-2.0.16](https://github.com/truecharts/apps/compare/grav-2.0.15...grav-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [grav-2.0.15](https://github.com/truecharts/apps/compare/grav-2.0.14...grav-2.0.15) (2021-12-04) - diff --git a/stable/habridge/0.0.6/CONFIG.md b/stable/grav/2.0.25/CONFIG.md similarity index 100% rename from stable/habridge/0.0.6/CONFIG.md rename to stable/grav/2.0.25/CONFIG.md diff --git a/stable/grav/2.0.25/Chart.lock b/stable/grav/2.0.25/Chart.lock new file mode 100644 index 00000000000..34c90f3f008 --- /dev/null +++ b/stable/grav/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:25.228545009Z" diff --git a/stable/grav/2.0.24/Chart.yaml b/stable/grav/2.0.25/Chart.yaml similarity index 97% rename from stable/grav/2.0.24/Chart.yaml rename to stable/grav/2.0.25/Chart.yaml index 42b3763582e..8894afe0282 100644 --- a/stable/grav/2.0.24/Chart.yaml +++ b/stable/grav/2.0.25/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-grav - https://github.com/getgrav/grav/ type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/grav/2.0.24/README.md b/stable/grav/2.0.25/README.md similarity index 100% rename from stable/grav/2.0.24/README.md rename to stable/grav/2.0.25/README.md diff --git a/stable/grav/2.0.24/app-readme.md b/stable/grav/2.0.25/app-readme.md similarity index 100% rename from stable/grav/2.0.24/app-readme.md rename to stable/grav/2.0.25/app-readme.md diff --git a/stable/habridge/0.0.6/charts/common-8.9.24.tgz b/stable/grav/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/habridge/0.0.6/charts/common-8.9.24.tgz rename to stable/grav/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/grav/2.0.24/helm-values.md b/stable/grav/2.0.25/helm-values.md similarity index 100% rename from stable/grav/2.0.24/helm-values.md rename to stable/grav/2.0.25/helm-values.md diff --git a/stable/grav/2.0.24/ix_values.yaml b/stable/grav/2.0.25/ix_values.yaml similarity index 100% rename from stable/grav/2.0.24/ix_values.yaml rename to stable/grav/2.0.25/ix_values.yaml diff --git a/stable/grav/2.0.24/questions.yaml b/stable/grav/2.0.25/questions.yaml similarity index 99% rename from stable/grav/2.0.24/questions.yaml rename to stable/grav/2.0.25/questions.yaml index 7fe2cf6e64d..165a731d679 100644 --- a/stable/grav/2.0.24/questions.yaml +++ b/stable/grav/2.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10012 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/grav/2.0.24/security.md b/stable/grav/2.0.25/security.md similarity index 100% rename from stable/grav/2.0.24/security.md rename to stable/grav/2.0.25/security.md diff --git a/stable/grav/2.0.24/templates/common.yaml b/stable/grav/2.0.25/templates/common.yaml similarity index 100% rename from stable/grav/2.0.24/templates/common.yaml rename to stable/grav/2.0.25/templates/common.yaml diff --git a/stable/habridge/0.0.6/values.yaml b/stable/grav/2.0.25/values.yaml similarity index 100% rename from stable/habridge/0.0.6/values.yaml rename to stable/grav/2.0.25/values.yaml diff --git a/stable/grocy/9.0.25/Chart.lock b/stable/grocy/9.0.25/Chart.lock deleted file mode 100644 index e191d5fa0ea..00000000000 --- a/stable/grocy/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:30:56.242690255Z" diff --git a/stable/grocy/9.0.25/CHANGELOG.md b/stable/grocy/9.0.26/CHANGELOG.md similarity index 90% rename from stable/grocy/9.0.25/CHANGELOG.md rename to stable/grocy/9.0.26/CHANGELOG.md index 453a1aec1d6..70265bdb5ce 100644 --- a/stable/grocy/9.0.25/CHANGELOG.md +++ b/stable/grocy/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [grocy-9.0.26](https://github.com/truecharts/apps/compare/grocy-9.0.25...grocy-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [grocy-9.0.25](https://github.com/truecharts/apps/compare/grocy-9.0.24...grocy-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [grocy-9.0.17](https://github.com/truecharts/apps/compare/grocy-9.0.16...grocy-9.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [grocy-9.0.16](https://github.com/truecharts/apps/compare/grocy-9.0.15...grocy-9.0.16) (2021-12-04) - diff --git a/stable/haste-server/4.0.24/CONFIG.md b/stable/grocy/9.0.26/CONFIG.md similarity index 100% rename from stable/haste-server/4.0.24/CONFIG.md rename to stable/grocy/9.0.26/CONFIG.md diff --git a/stable/grocy/9.0.26/Chart.lock b/stable/grocy/9.0.26/Chart.lock new file mode 100644 index 00000000000..1e175b81cad --- /dev/null +++ b/stable/grocy/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:30.032244106Z" diff --git a/stable/grocy/9.0.25/Chart.yaml b/stable/grocy/9.0.26/Chart.yaml similarity index 97% rename from stable/grocy/9.0.25/Chart.yaml rename to stable/grocy/9.0.26/Chart.yaml index 462df44b8f6..5b4d743659b 100644 --- a/stable/grocy/9.0.25/Chart.yaml +++ b/stable/grocy/9.0.26/Chart.yaml @@ -20,7 +20,7 @@ name: grocy sources: - https://github.com/grocy/grocy type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - Home-Automation diff --git a/stable/grocy/9.0.25/README.md b/stable/grocy/9.0.26/README.md similarity index 100% rename from stable/grocy/9.0.25/README.md rename to stable/grocy/9.0.26/README.md diff --git a/stable/grocy/9.0.25/app-readme.md b/stable/grocy/9.0.26/app-readme.md similarity index 100% rename from stable/grocy/9.0.25/app-readme.md rename to stable/grocy/9.0.26/app-readme.md diff --git a/stable/haste-server/4.0.24/charts/common-8.9.24.tgz b/stable/grocy/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/haste-server/4.0.24/charts/common-8.9.24.tgz rename to stable/grocy/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/grocy/9.0.25/helm-values.md b/stable/grocy/9.0.26/helm-values.md similarity index 100% rename from stable/grocy/9.0.25/helm-values.md rename to stable/grocy/9.0.26/helm-values.md diff --git a/stable/grocy/9.0.25/ix_values.yaml b/stable/grocy/9.0.26/ix_values.yaml similarity index 100% rename from stable/grocy/9.0.25/ix_values.yaml rename to stable/grocy/9.0.26/ix_values.yaml diff --git a/stable/grocy/9.0.25/questions.yaml b/stable/grocy/9.0.26/questions.yaml similarity index 99% rename from stable/grocy/9.0.25/questions.yaml rename to stable/grocy/9.0.26/questions.yaml index 0d9dc92f5c3..3878b5a6f61 100644 --- a/stable/grocy/9.0.25/questions.yaml +++ b/stable/grocy/9.0.26/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10013 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/grocy/9.0.25/security.md b/stable/grocy/9.0.26/security.md similarity index 100% rename from stable/grocy/9.0.25/security.md rename to stable/grocy/9.0.26/security.md diff --git a/stable/guacd/0.0.5/templates/common.yaml b/stable/grocy/9.0.26/templates/common.yaml similarity index 100% rename from stable/guacd/0.0.5/templates/common.yaml rename to stable/grocy/9.0.26/templates/common.yaml diff --git a/stable/haste-server/4.0.24/values.yaml b/stable/grocy/9.0.26/values.yaml similarity index 100% rename from stable/haste-server/4.0.24/values.yaml rename to stable/grocy/9.0.26/values.yaml diff --git a/stable/guacd/0.0.5/Chart.lock b/stable/guacd/0.0.5/Chart.lock deleted file mode 100644 index c2209dd1144..00000000000 --- a/stable/guacd/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:31:06.940020268Z" diff --git a/stable/guacd/0.0.5/CHANGELOG.md b/stable/guacd/0.0.6/CHANGELOG.md similarity index 85% rename from stable/guacd/0.0.5/CHANGELOG.md rename to stable/guacd/0.0.6/CHANGELOG.md index a39716ab718..5f9e0805fb5 100644 --- a/stable/guacd/0.0.5/CHANGELOG.md +++ b/stable/guacd/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [guacd-0.0.6](https://github.com/truecharts/apps/compare/guacd-0.0.5...guacd-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [guacd-0.0.5](https://github.com/truecharts/apps/compare/guacd-0.0.4...guacd-0.0.5) (2021-12-19) diff --git a/stable/headphones/2.0.24/CONFIG.md b/stable/guacd/0.0.6/CONFIG.md similarity index 100% rename from stable/headphones/2.0.24/CONFIG.md rename to stable/guacd/0.0.6/CONFIG.md diff --git a/stable/guacd/0.0.6/Chart.lock b/stable/guacd/0.0.6/Chart.lock new file mode 100644 index 00000000000..11c677dfd83 --- /dev/null +++ b/stable/guacd/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:42.27277543Z" diff --git a/stable/guacd/0.0.5/Chart.yaml b/stable/guacd/0.0.6/Chart.yaml similarity index 97% rename from stable/guacd/0.0.5/Chart.yaml rename to stable/guacd/0.0.6/Chart.yaml index cdf883891c4..aef13bb2f22 100644 --- a/stable/guacd/0.0.5/Chart.yaml +++ b/stable/guacd/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: guacd -version: 0.0.5 +version: 0.0.6 appVersion: "1.3.0" description: Guacd - Apache Guacamole is a clientless remote desktop gateway. type: application diff --git a/stable/guacd/0.0.5/README.md b/stable/guacd/0.0.6/README.md similarity index 100% rename from stable/guacd/0.0.5/README.md rename to stable/guacd/0.0.6/README.md diff --git a/stable/guacd/0.0.5/app-readme.md b/stable/guacd/0.0.6/app-readme.md similarity index 100% rename from stable/guacd/0.0.5/app-readme.md rename to stable/guacd/0.0.6/app-readme.md diff --git a/stable/headphones/2.0.24/charts/common-8.9.24.tgz b/stable/guacd/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/headphones/2.0.24/charts/common-8.9.24.tgz rename to stable/guacd/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/guacd/0.0.5/helm-values.md b/stable/guacd/0.0.6/helm-values.md similarity index 100% rename from stable/guacd/0.0.5/helm-values.md rename to stable/guacd/0.0.6/helm-values.md diff --git a/stable/guacd/0.0.5/ix_values.yaml b/stable/guacd/0.0.6/ix_values.yaml similarity index 100% rename from stable/guacd/0.0.5/ix_values.yaml rename to stable/guacd/0.0.6/ix_values.yaml diff --git a/stable/guacd/0.0.5/questions.yaml b/stable/guacd/0.0.6/questions.yaml similarity index 100% rename from stable/guacd/0.0.5/questions.yaml rename to stable/guacd/0.0.6/questions.yaml diff --git a/stable/guacd/0.0.5/security.md b/stable/guacd/0.0.6/security.md similarity index 100% rename from stable/guacd/0.0.5/security.md rename to stable/guacd/0.0.6/security.md diff --git a/stable/habridge/0.0.6/templates/common.yaml b/stable/guacd/0.0.6/templates/common.yaml similarity index 100% rename from stable/habridge/0.0.6/templates/common.yaml rename to stable/guacd/0.0.6/templates/common.yaml diff --git a/stable/headphones/2.0.24/values.yaml b/stable/guacd/0.0.6/values.yaml similarity index 100% rename from stable/headphones/2.0.24/values.yaml rename to stable/guacd/0.0.6/values.yaml diff --git a/stable/habridge/0.0.6/Chart.lock b/stable/habridge/0.0.6/Chart.lock deleted file mode 100644 index 9dc41950515..00000000000 --- a/stable/habridge/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:31:14.89793759Z" diff --git a/stable/habridge/0.0.6/CHANGELOG.md b/stable/habridge/0.0.7/CHANGELOG.md similarity index 88% rename from stable/habridge/0.0.6/CHANGELOG.md rename to stable/habridge/0.0.7/CHANGELOG.md index 61cd8cbca69..727d0b4e1f3 100644 --- a/stable/habridge/0.0.6/CHANGELOG.md +++ b/stable/habridge/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [habridge-0.0.7](https://github.com/truecharts/apps/compare/habridge-0.0.6...habridge-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [habridge-0.0.6](https://github.com/truecharts/apps/compare/habridge-0.0.5...habridge-0.0.6) (2021-12-19) diff --git a/stable/healthchecks/5.0.5/CONFIG.md b/stable/habridge/0.0.7/CONFIG.md similarity index 100% rename from stable/healthchecks/5.0.5/CONFIG.md rename to stable/habridge/0.0.7/CONFIG.md diff --git a/stable/habridge/0.0.7/Chart.lock b/stable/habridge/0.0.7/Chart.lock new file mode 100644 index 00000000000..6fd7817a9e2 --- /dev/null +++ b/stable/habridge/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:52.123220822Z" diff --git a/stable/habridge/0.0.6/Chart.yaml b/stable/habridge/0.0.7/Chart.yaml similarity index 98% rename from stable/habridge/0.0.6/Chart.yaml rename to stable/habridge/0.0.7/Chart.yaml index 1cae0f32a60..2c003cc3a47 100644 --- a/stable/habridge/0.0.6/Chart.yaml +++ b/stable/habridge/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: habridge -version: 0.0.6 +version: 0.0.7 appVersion: "5.4.0" description: Habridge emulates Philips Hue API to other home automation gateways such as an Amazon Echo/Dot or other systems that support Philips Hue. type: application diff --git a/stable/habridge/0.0.6/README.md b/stable/habridge/0.0.7/README.md similarity index 100% rename from stable/habridge/0.0.6/README.md rename to stable/habridge/0.0.7/README.md diff --git a/stable/habridge/0.0.6/app-readme.md b/stable/habridge/0.0.7/app-readme.md similarity index 100% rename from stable/habridge/0.0.6/app-readme.md rename to stable/habridge/0.0.7/app-readme.md diff --git a/stable/healthchecks/5.0.5/charts/common-8.9.24.tgz b/stable/habridge/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/healthchecks/5.0.5/charts/common-8.9.24.tgz rename to stable/habridge/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/habridge/0.0.6/helm-values.md b/stable/habridge/0.0.7/helm-values.md similarity index 100% rename from stable/habridge/0.0.6/helm-values.md rename to stable/habridge/0.0.7/helm-values.md diff --git a/stable/habridge/0.0.6/ix_values.yaml b/stable/habridge/0.0.7/ix_values.yaml similarity index 100% rename from stable/habridge/0.0.6/ix_values.yaml rename to stable/habridge/0.0.7/ix_values.yaml diff --git a/stable/habridge/0.0.6/questions.yaml b/stable/habridge/0.0.7/questions.yaml similarity index 100% rename from stable/habridge/0.0.6/questions.yaml rename to stable/habridge/0.0.7/questions.yaml diff --git a/stable/habridge/0.0.6/security.md b/stable/habridge/0.0.7/security.md similarity index 100% rename from stable/habridge/0.0.6/security.md rename to stable/habridge/0.0.7/security.md diff --git a/stable/haste-server/4.0.24/templates/common.yaml b/stable/habridge/0.0.7/templates/common.yaml similarity index 100% rename from stable/haste-server/4.0.24/templates/common.yaml rename to stable/habridge/0.0.7/templates/common.yaml diff --git a/stable/healthchecks/5.0.5/values.yaml b/stable/habridge/0.0.7/values.yaml similarity index 100% rename from stable/healthchecks/5.0.5/values.yaml rename to stable/habridge/0.0.7/values.yaml diff --git a/stable/handbrake/10.0.6/CHANGELOG.md b/stable/handbrake/10.0.6/CHANGELOG.md new file mode 100644 index 00000000000..a2232f7a305 --- /dev/null +++ b/stable/handbrake/10.0.6/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [handbrake-10.0.6](https://github.com/truecharts/apps/compare/handbrake-10.0.5...handbrake-10.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [handbrake-10.0.5](https://github.com/truecharts/apps/compare/handbrake-10.0.4...handbrake-10.0.5) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [handbrake-10.0.4](https://github.com/truecharts/apps/compare/handbrake-10.0.3...handbrake-10.0.4) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + + +### [handbrake-10.0.3](https://github.com/truecharts/apps/compare/handbrake-10.0.2...handbrake-10.0.3) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [handbrake-10.0.2](https://github.com/truecharts/apps/compare/handbrake-10.0.1...handbrake-10.0.2) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [handbrake-10.0.1](https://github.com/truecharts/apps/compare/handbrake-10.0.0...handbrake-10.0.1) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [handbrake-10.0.0](https://github.com/truecharts/apps/compare/handbrake-9.0.19...handbrake-10.0.0) (2021-12-11) + +#### Feat + +* move user/pass/secrets/keys from `env` to `secret` ([#1501](https://github.com/truecharts/apps/issues/1501)) + + + + +### [handbrake-9.0.19](https://github.com/truecharts/apps/compare/handbrake-9.0.18...handbrake-9.0.19) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [handbrake-9.0.18](https://github.com/truecharts/apps/compare/handbrake-9.0.17...handbrake-9.0.18) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### handbrake-9.0.17 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) diff --git a/stable/hedgedoc/0.0.5/CONFIG.md b/stable/handbrake/10.0.6/CONFIG.md similarity index 100% rename from stable/hedgedoc/0.0.5/CONFIG.md rename to stable/handbrake/10.0.6/CONFIG.md diff --git a/stable/handbrake/10.0.6/Chart.lock b/stable/handbrake/10.0.6/Chart.lock new file mode 100644 index 00000000000..aa5ba269aa1 --- /dev/null +++ b/stable/handbrake/10.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:17:57.909577373Z" diff --git a/stable/handbrake/10.0.6/Chart.yaml b/stable/handbrake/10.0.6/Chart.yaml new file mode 100644 index 00000000000..c9f87118716 --- /dev/null +++ b/stable/handbrake/10.0.6/Chart.yaml @@ -0,0 +1,32 @@ +apiVersion: v2 +appVersion: "1.24.2" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +deprecated: false +description: HandBrake is a tool for converting video from nearly any format to a + selection of modern, widely supported codecs. +home: https://github.com/truecharts/apps/tree/master/charts/stable/handbrake +icon: https://truecharts.org/_static/img/appicons/handbrake-icon.png +keywords: +- handbrake +- encode +- media +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: handbrake +sources: +- https://github.com/jlesage/docker-handbrake +- https://hub.docker.com/r/jlesage/handbrake/ +- https://handbrake.fr/ +type: application +version: 10.0.6 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/handbrake/10.0.6/README.md b/stable/handbrake/10.0.6/README.md new file mode 100644 index 00000000000..a020883ea18 --- /dev/null +++ b/stable/handbrake/10.0.6/README.md @@ -0,0 +1,39 @@ +# Introduction + +HandBrake is a tool for converting video from nearly any format to a selection of modern, widely supported codecs. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/handbrake/10.0.6/app-readme.md b/stable/handbrake/10.0.6/app-readme.md new file mode 100644 index 00000000000..f9af35c5f66 --- /dev/null +++ b/stable/handbrake/10.0.6/app-readme.md @@ -0,0 +1,3 @@ +HandBrake is a tool for converting video from nearly any format to a selection of modern, widely supported codecs. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/hedgedoc/0.0.5/charts/common-8.9.24.tgz b/stable/handbrake/10.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/hedgedoc/0.0.5/charts/common-8.9.24.tgz rename to stable/handbrake/10.0.6/charts/common-8.9.24.tgz diff --git a/stable/handbrake/10.0.6/helm-values.md b/stable/handbrake/10.0.6/helm-values.md new file mode 100644 index 00000000000..ed668358d7e --- /dev/null +++ b/stable/handbrake/10.0.6/helm-values.md @@ -0,0 +1,42 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.AUTOMATED_CONVERSION_FORMAT | string | `"mp4"` | | +| env.AUTOMATED_CONVERSION_KEEP_SOURCE | int | `1` | | +| env.AUTOMATED_CONVERSION_NON_VIDEO_FILE_ACTION | string | `"ignore"` | | +| env.AUTOMATED_CONVERSION_PRESET | string | `"General/Very Fast 1080p30"` | | +| env.CLEAN_TMP_DIR | int | `1` | | +| env.DISPLAY_HEIGHT | int | `768` | | +| env.DISPLAY_WIDTH | int | `1280` | | +| env.KEEP_APP_RUNNING | int | `0` | | +| env.PUID | int | `568` | | +| env.SECURE_CONNECTION | int | `0` | | +| env.USER_ID | string | `"{{ .Values.env.PUID }}"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/handbrake"` | | +| image.tag | string | `"v1.24.2@sha256:7b5fa65f152910287ac3346b8e71b67d9d85987ae28aec0730542506b9b5780a"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| secret.VNC_PASSWORD | string | `""` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10053` | | +| service.main.ports.main.targetPort | int | `5800` | | +| service.vnc.enabled | bool | `true` | | +| service.vnc.ports.vnc.enabled | bool | `true` | | +| service.vnc.ports.vnc.port | int | `10055` | | +| service.vnc.ports.vnc.targetPort | int | `5900` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/handbrake/10.0.6/ix_values.yaml b/stable/handbrake/10.0.6/ix_values.yaml new file mode 100644 index 00000000000..cc5b51bbe3b --- /dev/null +++ b/stable/handbrake/10.0.6/ix_values.yaml @@ -0,0 +1,50 @@ +image: + repository: tccr.io/truecharts/handbrake + tag: v1.24.2@sha256:7b5fa65f152910287ac3346b8e71b67d9d85987ae28aec0730542506b9b5780a + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 10053 + targetPort: 5800 + vnc: + enabled: true + ports: + vnc: + enabled: true + port: 10055 + targetPort: 5900 + +secret: + VNC_PASSWORD: "" +env: + # Permissions Settings + PUID: 568 + USER_ID: "{{ .Values.env.PUID }}" + # General Settings + KEEP_APP_RUNNING: 0 + CLEAN_TMP_DIR: 1 + # GUI Settings + DISPLAY_WIDTH: 1280 + DISPLAY_HEIGHT: 768 + SECURE_CONNECTION: 0 + # Automated Conversion Preset + AUTOMATED_CONVERSION_PRESET: "General/Very Fast 1080p30" + AUTOMATED_CONVERSION_FORMAT: "mp4" + AUTOMATED_CONVERSION_KEEP_SOURCE: 1 + AUTOMATED_CONVERSION_NON_VIDEO_FILE_ACTION: "ignore" + +persistence: + config: + enabled: true + mountPath: "/config" diff --git a/stable/handbrake/10.0.6/questions.yaml b/stable/handbrake/10.0.6/questions.yaml new file mode 100644 index 00000000000..f8e884c36ae --- /dev/null +++ b/stable/handbrake/10.0.6/questions.yaml @@ -0,0 +1,2010 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + # Portal + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: VNC_PASSWORD + label: "VNC_PASSWORD" + description: "Password needed to connect to the application's GUI. See the VNC Password section for more details." + schema: + type: string + private: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var for LinuxServer.io (compatible) containers" + schema: + type: int + default: 568 + - variable: gui + label: "GUI Settings" + description: "Always read description before changing a value here. Also refer to README" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: DISPLAY_WIDTH + label: "DISPLAY_WIDTH" + description: "Width (in pixels) of the application's window." + schema: + type: int + default: 1280 + required: true + - variable: DISPLAY_HEIGHT + label: "DISPLAY_HEIGHT" + description: "Height (in pixels) of the application's window." + schema: + type: int + default: 768 + required: true + - variable: SECURE_CONNECTION + label: "SECURE_CONNECTION" + description: "When set to 1, an encrypted connection is used to access the application's GUI (either via a web browser or VNC client). See the Security section for more details." + schema: + type: int + default: 0 + required: true + - variable: autoconv + label: "Automated Conversion Settings" + description: "Always read description before changing a value here. Also refer to README" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: AUTOMATED_CONVERSION_PRESET + label: "AUTOMATED_CONVERSION_PRESET" + description: "HandBrake preset used by the automatic video converter. Identification of a preset must follow the format /" + schema: + type: string + default: "General/Very Fast 1080p30" + required: true + - variable: AUTOMATED_CONVERSION_FORMAT + label: "AUTOMATED_CONVERSION_FORMAT" + description: "Video container format used by the automatic video converter for output files. This is typically the video filename extension." + schema: + type: string + default: "mp4" + required: true + - variable: AUTOMATED_CONVERSION_KEEP_SOURCE + label: "AUTOMATED_CONVERSION_KEEP_SOURCE" + description: "When set to 0, a video that has been successfully converted is removed from the watch folder." + schema: + type: int + default: 0 + required: true + - variable: AUTOMATED_CONVERSION_NON_VIDEO_FILE_ACTION + label: "AUTOMATED_CONVERSION_NON_VIDEO_FILE_ACTION" + description: "When set to ignore, a non-video file found in the watch folder is ignored. If set to copy, a non-video file is copied as-is to the output folder." + schema: + type: string + default: "ignore" + required: true + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10053 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 5800 + + + - variable: vnc + label: "VNC Service" + description: "VNC Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: vnc + label: "TCP Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10055 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 5900 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/handbrake/10.0.6/security.md b/stable/handbrake/10.0.6/security.md new file mode 100644 index 00000000000..e6f8fa7ee37 --- /dev/null +++ b/stable/handbrake/10.0.6/security.md @@ -0,0 +1,119 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: handbrake/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-handbrake' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-handbrake' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-handbrake' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/handbrake:v1.24.2@sha256:7b5fa65f152910287ac3346b8e71b67d9d85987ae28aec0730542506b9b5780a + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/handbrake:v1.24.2@sha256:7b5fa65f152910287ac3346b8e71b67d9d85987ae28aec0730542506b9b5780a (alpine 3.12.6) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apk-tools | CVE-2021-36159 | CRITICAL | 2.10.5-r1 | 2.10.7-r0 |
Expand...https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch
https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
| +| apk-tools | CVE-2021-30139 | HIGH | 2.10.5-r1 | 2.10.6-r0 |
Expand...https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741
https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606
| +| busybox | CVE-2021-28831 | HIGH | 1.31.1-r20 | 1.32.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| ncurses-libs | CVE-2021-39537 | HIGH | 6.2_p20200523-r0 | 6.2_p20200523-r1 |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-terminfo-base | CVE-2021-39537 | HIGH | 6.2_p20200523-r0 | 6.2_p20200523-r1 |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| nginx | CVE-2021-23017 | CRITICAL | 1.18.0-r1 | 1.18.0-r2 |
Expand...http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017
https://linux.oracle.com/cve/CVE-2021-23017.html
https://linux.oracle.com/errata/ELSA-2021-2290.html
https://lists.apache.org/thread.html/r37e6b2165f7c910d8e15fd54f4697857619ad2625f56583802004009@%3Cnotifications.apisix.apache.org%3E
https://lists.apache.org/thread.html/r4d4966221ca399ce948ef34884652265729d7d9ef8179c78d7f17e7f@%3Cnotifications.apisix.apache.org%3E
https://lists.apache.org/thread.html/r6fc5c57b38e93e36213e9a18c8a4e5dbd5ced1c7e57f08a1735975ba@%3Cnotifications.apisix.apache.org%3E
https://lists.apache.org/thread.html/rf232eecd47fdc44520192810560303073cefd684b321f85e311bad31@%3Cnotifications.apisix.apache.org%3E
https://lists.apache.org/thread.html/rf318aeeb4d7a3a312734780b47de83cefb7e6995da0b2cae5c28675c@%3Cnotifications.apisix.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SFVYHC7OXTEO4SMBWXDVK6E5IMEYMEE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNKOP2JR5L7KCIZTJRZDCUPJTUONMC5I/
https://security.netapp.com/advisory/ntap-20210708-0006/
https://support.f5.com/csp/article/K12331123,
https://ubuntu.com/security/notices/USN-4967-1
https://ubuntu.com/security/notices/USN-4967-2
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/
| +| openssl | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| openssl | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| ssl_client | CVE-2021-28831 | HIGH | 1.31.1-r20 | 1.32.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| xvfb | CVE-2021-3472 | HIGH | 1.20.10-r0 | 1.20.10-r1 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/13/1
https://bugzilla.redhat.com/show_bug.cgi?id=1944167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
https://linux.oracle.com/cve/CVE-2021-3472.html
https://linux.oracle.com/errata/ELSA-2021-2033.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDF7TAJE7NPZPNVOXSD5HBIFLNPUOD2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO6S5OPXUDYBSRSVWVLFLJ6AFERG4HNY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N63KL3T22HNFT4FJ7VMVF6U5Q4RFJIQF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEXPCLMVU25AUZTUXC4MYBGPKOAIM5TW/
https://lists.x.org/archives/xorg-announce/2021-April/003080.html
https://seclists.org/oss-sec/2021/q2/20
https://security.gentoo.org/glsa/202104-02
https://ubuntu.com/security/notices/USN-4905-1
https://ubuntu.com/security/notices/USN-4905-2
https://www.debian.org/security/2021/dsa-4893
https://www.tenable.com/plugins/nessus/148701
https://www.zerodayinitiative.com/advisories/ZDI-21-463/
| + diff --git a/stable/healthchecks/5.0.5/templates/common.yaml b/stable/handbrake/10.0.6/templates/common.yaml similarity index 100% rename from stable/healthchecks/5.0.5/templates/common.yaml rename to stable/handbrake/10.0.6/templates/common.yaml diff --git a/stable/hedgedoc/0.0.5/values.yaml b/stable/handbrake/10.0.6/values.yaml similarity index 100% rename from stable/hedgedoc/0.0.5/values.yaml rename to stable/handbrake/10.0.6/values.yaml diff --git a/stable/haste-server/4.0.24/Chart.lock b/stable/haste-server/4.0.24/Chart.lock deleted file mode 100644 index 345b4692c8d..00000000000 --- a/stable/haste-server/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:31:29.605883994Z" diff --git a/stable/haste-server/4.0.24/CHANGELOG.md b/stable/haste-server/4.0.25/CHANGELOG.md similarity index 90% rename from stable/haste-server/4.0.24/CHANGELOG.md rename to stable/haste-server/4.0.25/CHANGELOG.md index 0dcad2ad593..1dceba18d2c 100644 --- a/stable/haste-server/4.0.24/CHANGELOG.md +++ b/stable/haste-server/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [haste-server-4.0.25](https://github.com/truecharts/apps/compare/haste-server-4.0.24...haste-server-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [haste-server-4.0.24](https://github.com/truecharts/apps/compare/haste-server-4.0.23...haste-server-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [haste-server-4.0.16](https://github.com/truecharts/apps/compare/haste-server-4.0.15...haste-server-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [haste-server-4.0.15](https://github.com/truecharts/apps/compare/haste-server-4.0.14...haste-server-4.0.15) (2021-12-04) - diff --git a/stable/heimdall/9.0.29/CONFIG.md b/stable/haste-server/4.0.25/CONFIG.md similarity index 100% rename from stable/heimdall/9.0.29/CONFIG.md rename to stable/haste-server/4.0.25/CONFIG.md diff --git a/stable/haste-server/4.0.25/Chart.lock b/stable/haste-server/4.0.25/Chart.lock new file mode 100644 index 00000000000..bebfe1d91a0 --- /dev/null +++ b/stable/haste-server/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:18:06.755579356Z" diff --git a/stable/haste-server/4.0.24/Chart.yaml b/stable/haste-server/4.0.25/Chart.yaml similarity index 97% rename from stable/haste-server/4.0.24/Chart.yaml rename to stable/haste-server/4.0.25/Chart.yaml index ec30e9b5598..e7a06cd242f 100644 --- a/stable/haste-server/4.0.24/Chart.yaml +++ b/stable/haste-server/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: haste-server sources: - https://github.com/seejohnrun/haste-server - https://github.com/k8s-at-home/container-images -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/haste-server/4.0.24/README.md b/stable/haste-server/4.0.25/README.md similarity index 100% rename from stable/haste-server/4.0.24/README.md rename to stable/haste-server/4.0.25/README.md diff --git a/stable/haste-server/4.0.24/app-readme.md b/stable/haste-server/4.0.25/app-readme.md similarity index 100% rename from stable/haste-server/4.0.24/app-readme.md rename to stable/haste-server/4.0.25/app-readme.md diff --git a/stable/heimdall/9.0.29/charts/common-8.9.24.tgz b/stable/haste-server/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/heimdall/9.0.29/charts/common-8.9.24.tgz rename to stable/haste-server/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/haste-server/4.0.24/helm-values.md b/stable/haste-server/4.0.25/helm-values.md similarity index 100% rename from stable/haste-server/4.0.24/helm-values.md rename to stable/haste-server/4.0.25/helm-values.md diff --git a/stable/haste-server/4.0.24/ix_values.yaml b/stable/haste-server/4.0.25/ix_values.yaml similarity index 100% rename from stable/haste-server/4.0.24/ix_values.yaml rename to stable/haste-server/4.0.25/ix_values.yaml diff --git a/stable/haste-server/4.0.24/questions.yaml b/stable/haste-server/4.0.25/questions.yaml similarity index 99% rename from stable/haste-server/4.0.24/questions.yaml rename to stable/haste-server/4.0.25/questions.yaml index fffb8bfd3e0..bc107901739 100644 --- a/stable/haste-server/4.0.24/questions.yaml +++ b/stable/haste-server/4.0.25/questions.yaml @@ -355,7 +355,6 @@ questions: schema: type: int default: 7777 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/haste-server/4.0.24/security.md b/stable/haste-server/4.0.25/security.md similarity index 100% rename from stable/haste-server/4.0.24/security.md rename to stable/haste-server/4.0.25/security.md diff --git a/stable/hedgedoc/0.0.5/templates/common.yaml b/stable/haste-server/4.0.25/templates/common.yaml similarity index 100% rename from stable/hedgedoc/0.0.5/templates/common.yaml rename to stable/haste-server/4.0.25/templates/common.yaml diff --git a/stable/heimdall/9.0.29/values.yaml b/stable/haste-server/4.0.25/values.yaml similarity index 100% rename from stable/heimdall/9.0.29/values.yaml rename to stable/haste-server/4.0.25/values.yaml diff --git a/stable/headphones/2.0.24/Chart.lock b/stable/headphones/2.0.24/Chart.lock deleted file mode 100644 index 807218cc7e2..00000000000 --- a/stable/headphones/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:31:37.111843448Z" diff --git a/stable/headphones/2.0.24/CHANGELOG.md b/stable/headphones/2.0.25/CHANGELOG.md similarity index 90% rename from stable/headphones/2.0.24/CHANGELOG.md rename to stable/headphones/2.0.25/CHANGELOG.md index 6f0c67e1dd5..98276b76584 100644 --- a/stable/headphones/2.0.24/CHANGELOG.md +++ b/stable/headphones/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [headphones-2.0.25](https://github.com/truecharts/apps/compare/headphones-2.0.24...headphones-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [headphones-2.0.24](https://github.com/truecharts/apps/compare/headphones-2.0.23...headphones-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [headphones-2.0.16](https://github.com/truecharts/apps/compare/headphones-2.0.15...headphones-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [headphones-2.0.15](https://github.com/truecharts/apps/compare/headphones-2.0.14...headphones-2.0.15) (2021-12-04) - diff --git a/stable/htpcmanager/0.0.5/CONFIG.md b/stable/headphones/2.0.25/CONFIG.md similarity index 100% rename from stable/htpcmanager/0.0.5/CONFIG.md rename to stable/headphones/2.0.25/CONFIG.md diff --git a/stable/headphones/2.0.25/Chart.lock b/stable/headphones/2.0.25/Chart.lock new file mode 100644 index 00000000000..0a819e1d486 --- /dev/null +++ b/stable/headphones/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:18:11.507687373Z" diff --git a/stable/headphones/2.0.24/Chart.yaml b/stable/headphones/2.0.25/Chart.yaml similarity index 98% rename from stable/headphones/2.0.24/Chart.yaml rename to stable/headphones/2.0.25/Chart.yaml index 909e6e1affd..7abcffb8b7e 100644 --- a/stable/headphones/2.0.24/Chart.yaml +++ b/stable/headphones/2.0.25/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-headphones - https://github.com/rembo10/headphones type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/headphones/2.0.24/README.md b/stable/headphones/2.0.25/README.md similarity index 100% rename from stable/headphones/2.0.24/README.md rename to stable/headphones/2.0.25/README.md diff --git a/stable/headphones/2.0.24/app-readme.md b/stable/headphones/2.0.25/app-readme.md similarity index 100% rename from stable/headphones/2.0.24/app-readme.md rename to stable/headphones/2.0.25/app-readme.md diff --git a/stable/htpcmanager/0.0.5/charts/common-8.9.24.tgz b/stable/headphones/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/htpcmanager/0.0.5/charts/common-8.9.24.tgz rename to stable/headphones/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/headphones/2.0.24/helm-values.md b/stable/headphones/2.0.25/helm-values.md similarity index 100% rename from stable/headphones/2.0.24/helm-values.md rename to stable/headphones/2.0.25/helm-values.md diff --git a/stable/headphones/2.0.24/ix_values.yaml b/stable/headphones/2.0.25/ix_values.yaml similarity index 100% rename from stable/headphones/2.0.24/ix_values.yaml rename to stable/headphones/2.0.25/ix_values.yaml diff --git a/stable/headphones/2.0.24/questions.yaml b/stable/headphones/2.0.25/questions.yaml similarity index 99% rename from stable/headphones/2.0.24/questions.yaml rename to stable/headphones/2.0.25/questions.yaml index 9451551d3f0..273a5bec62b 100644 --- a/stable/headphones/2.0.24/questions.yaml +++ b/stable/headphones/2.0.25/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10064 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/headphones/2.0.24/security.md b/stable/headphones/2.0.25/security.md similarity index 100% rename from stable/headphones/2.0.24/security.md rename to stable/headphones/2.0.25/security.md diff --git a/stable/headphones/2.0.24/templates/common.yaml b/stable/headphones/2.0.25/templates/common.yaml similarity index 100% rename from stable/headphones/2.0.24/templates/common.yaml rename to stable/headphones/2.0.25/templates/common.yaml diff --git a/stable/htpcmanager/0.0.5/values.yaml b/stable/headphones/2.0.25/values.yaml similarity index 100% rename from stable/htpcmanager/0.0.5/values.yaml rename to stable/headphones/2.0.25/values.yaml diff --git a/stable/healthchecks/5.0.5/Chart.lock b/stable/healthchecks/5.0.5/Chart.lock deleted file mode 100644 index b1499fb34eb..00000000000 --- a/stable/healthchecks/5.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:31:44.351581026Z" diff --git a/stable/healthchecks/5.0.5/CHANGELOG.md b/stable/healthchecks/5.0.6/CHANGELOG.md similarity index 90% rename from stable/healthchecks/5.0.5/CHANGELOG.md rename to stable/healthchecks/5.0.6/CHANGELOG.md index d33fd1e9672..8d3578a638f 100644 --- a/stable/healthchecks/5.0.5/CHANGELOG.md +++ b/stable/healthchecks/5.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [healthchecks-5.0.6](https://github.com/truecharts/apps/compare/healthchecks-5.0.5...healthchecks-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [healthchecks-5.0.5](https://github.com/truecharts/apps/compare/healthchecks-5.0.4...healthchecks-5.0.5) (2021-12-19) @@ -87,13 +97,3 @@ ### [healthchecks-4.0.17](https://github.com/truecharts/apps/compare/healthchecks-4.0.16...healthchecks-4.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [healthchecks-4.0.16](https://github.com/truecharts/apps/compare/healthchecks-4.0.15...healthchecks-4.0.16) (2021-12-04) - diff --git a/stable/hyperion-ng/4.0.27/CONFIG.md b/stable/healthchecks/5.0.6/CONFIG.md similarity index 100% rename from stable/hyperion-ng/4.0.27/CONFIG.md rename to stable/healthchecks/5.0.6/CONFIG.md diff --git a/stable/healthchecks/5.0.6/Chart.lock b/stable/healthchecks/5.0.6/Chart.lock new file mode 100644 index 00000000000..a21d9a581cf --- /dev/null +++ b/stable/healthchecks/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:18:21.773263731Z" diff --git a/stable/healthchecks/5.0.5/Chart.yaml b/stable/healthchecks/5.0.6/Chart.yaml similarity index 98% rename from stable/healthchecks/5.0.5/Chart.yaml rename to stable/healthchecks/5.0.6/Chart.yaml index 650b44a51d4..c1adfd10d9a 100644 --- a/stable/healthchecks/5.0.5/Chart.yaml +++ b/stable/healthchecks/5.0.6/Chart.yaml @@ -22,7 +22,7 @@ name: healthchecks sources: - https://github.com/healthchecks/healthchecks - https://hub.docker.com/r/linuxserver/healthchecks -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/healthchecks/5.0.5/README.md b/stable/healthchecks/5.0.6/README.md similarity index 100% rename from stable/healthchecks/5.0.5/README.md rename to stable/healthchecks/5.0.6/README.md diff --git a/stable/healthchecks/5.0.5/app-readme.md b/stable/healthchecks/5.0.6/app-readme.md similarity index 100% rename from stable/healthchecks/5.0.5/app-readme.md rename to stable/healthchecks/5.0.6/app-readme.md diff --git a/stable/hyperion-ng/4.0.27/charts/common-8.9.24.tgz b/stable/healthchecks/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/hyperion-ng/4.0.27/charts/common-8.9.24.tgz rename to stable/healthchecks/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/healthchecks/5.0.5/helm-values.md b/stable/healthchecks/5.0.6/helm-values.md similarity index 100% rename from stable/healthchecks/5.0.5/helm-values.md rename to stable/healthchecks/5.0.6/helm-values.md diff --git a/stable/healthchecks/5.0.5/ix_values.yaml b/stable/healthchecks/5.0.6/ix_values.yaml similarity index 100% rename from stable/healthchecks/5.0.5/ix_values.yaml rename to stable/healthchecks/5.0.6/ix_values.yaml diff --git a/stable/healthchecks/5.0.5/questions.yaml b/stable/healthchecks/5.0.6/questions.yaml similarity index 99% rename from stable/healthchecks/5.0.5/questions.yaml rename to stable/healthchecks/5.0.6/questions.yaml index ff62d9032ee..3b9d8196613 100644 --- a/stable/healthchecks/5.0.5/questions.yaml +++ b/stable/healthchecks/5.0.6/questions.yaml @@ -385,7 +385,6 @@ questions: schema: type: int default: 10074 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/healthchecks/5.0.5/security.md b/stable/healthchecks/5.0.6/security.md similarity index 100% rename from stable/healthchecks/5.0.5/security.md rename to stable/healthchecks/5.0.6/security.md diff --git a/stable/heimdall/9.0.29/templates/common.yaml b/stable/healthchecks/5.0.6/templates/common.yaml similarity index 100% rename from stable/heimdall/9.0.29/templates/common.yaml rename to stable/healthchecks/5.0.6/templates/common.yaml diff --git a/stable/hyperion-ng/4.0.27/values.yaml b/stable/healthchecks/5.0.6/values.yaml similarity index 100% rename from stable/hyperion-ng/4.0.27/values.yaml rename to stable/healthchecks/5.0.6/values.yaml diff --git a/stable/hedgedoc/0.0.5/Chart.lock b/stable/hedgedoc/0.0.5/Chart.lock deleted file mode 100644 index c2c7093b3b8..00000000000 --- a/stable/hedgedoc/0.0.5/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:31:53.524619441Z" diff --git a/stable/hedgedoc/0.0.5/CHANGELOG.md b/stable/hedgedoc/0.0.6/CHANGELOG.md similarity index 85% rename from stable/hedgedoc/0.0.5/CHANGELOG.md rename to stable/hedgedoc/0.0.6/CHANGELOG.md index a347ddeda3f..51b2bd8d527 100644 --- a/stable/hedgedoc/0.0.5/CHANGELOG.md +++ b/stable/hedgedoc/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [hedgedoc-0.0.6](https://github.com/truecharts/apps/compare/hedgedoc-0.0.5...hedgedoc-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [hedgedoc-0.0.5](https://github.com/truecharts/apps/compare/hedgedoc-0.0.4...hedgedoc-0.0.5) (2021-12-19) diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/CONFIG.md b/stable/hedgedoc/0.0.6/CONFIG.md similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/CONFIG.md rename to stable/hedgedoc/0.0.6/CONFIG.md diff --git a/stable/hedgedoc/0.0.6/Chart.lock b/stable/hedgedoc/0.0.6/Chart.lock new file mode 100644 index 00000000000..48e6e80ea66 --- /dev/null +++ b/stable/hedgedoc/0.0.6/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:18:30.503331735Z" diff --git a/stable/hedgedoc/0.0.5/Chart.yaml b/stable/hedgedoc/0.0.6/Chart.yaml similarity index 98% rename from stable/hedgedoc/0.0.5/Chart.yaml rename to stable/hedgedoc/0.0.6/Chart.yaml index b5fbbbb7e2a..99cabc03fdf 100644 --- a/stable/hedgedoc/0.0.5/Chart.yaml +++ b/stable/hedgedoc/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: hedgedoc -version: 0.0.5 +version: 0.0.6 appVersion: "1.9.2" description: HedgeDoc lets you create real-time collaborative markdown notes. type: application diff --git a/stable/hedgedoc/0.0.5/README.md b/stable/hedgedoc/0.0.6/README.md similarity index 100% rename from stable/hedgedoc/0.0.5/README.md rename to stable/hedgedoc/0.0.6/README.md diff --git a/stable/hedgedoc/0.0.5/app-readme.md b/stable/hedgedoc/0.0.6/app-readme.md similarity index 100% rename from stable/hedgedoc/0.0.5/app-readme.md rename to stable/hedgedoc/0.0.6/app-readme.md diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/charts/common-8.9.24.tgz b/stable/hedgedoc/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/charts/common-8.9.24.tgz rename to stable/hedgedoc/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/hedgedoc/0.0.5/charts/mariadb-1.0.37.tgz b/stable/hedgedoc/0.0.6/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/hedgedoc/0.0.5/charts/mariadb-1.0.37.tgz rename to stable/hedgedoc/0.0.6/charts/mariadb-1.0.37.tgz diff --git a/stable/hedgedoc/0.0.5/helm-values.md b/stable/hedgedoc/0.0.6/helm-values.md similarity index 100% rename from stable/hedgedoc/0.0.5/helm-values.md rename to stable/hedgedoc/0.0.6/helm-values.md diff --git a/stable/hedgedoc/0.0.5/ix_values.yaml b/stable/hedgedoc/0.0.6/ix_values.yaml similarity index 100% rename from stable/hedgedoc/0.0.5/ix_values.yaml rename to stable/hedgedoc/0.0.6/ix_values.yaml diff --git a/stable/hedgedoc/0.0.5/questions.yaml b/stable/hedgedoc/0.0.6/questions.yaml similarity index 100% rename from stable/hedgedoc/0.0.5/questions.yaml rename to stable/hedgedoc/0.0.6/questions.yaml diff --git a/stable/hedgedoc/0.0.5/security.md b/stable/hedgedoc/0.0.6/security.md similarity index 100% rename from stable/hedgedoc/0.0.5/security.md rename to stable/hedgedoc/0.0.6/security.md diff --git a/stable/htpcmanager/0.0.5/templates/common.yaml b/stable/hedgedoc/0.0.6/templates/common.yaml similarity index 100% rename from stable/htpcmanager/0.0.5/templates/common.yaml rename to stable/hedgedoc/0.0.6/templates/common.yaml diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/values.yaml b/stable/hedgedoc/0.0.6/values.yaml similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/values.yaml rename to stable/hedgedoc/0.0.6/values.yaml diff --git a/stable/heimdall/9.0.29/Chart.lock b/stable/heimdall/9.0.29/Chart.lock deleted file mode 100644 index 93fc516db49..00000000000 --- a/stable/heimdall/9.0.29/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:32:02.957391041Z" diff --git a/stable/heimdall/9.0.29/CHANGELOG.md b/stable/heimdall/9.0.30/CHANGELOG.md similarity index 90% rename from stable/heimdall/9.0.29/CHANGELOG.md rename to stable/heimdall/9.0.30/CHANGELOG.md index 33d272f221f..d2ab5c55137 100644 --- a/stable/heimdall/9.0.29/CHANGELOG.md +++ b/stable/heimdall/9.0.30/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [heimdall-9.0.30](https://github.com/truecharts/apps/compare/heimdall-9.0.29...heimdall-9.0.30) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [heimdall-9.0.29](https://github.com/truecharts/apps/compare/heimdall-9.0.28...heimdall-9.0.29) (2021-12-19) @@ -87,13 +97,3 @@ ### [heimdall-9.0.21](https://github.com/truecharts/apps/compare/heimdall-9.0.20...heimdall-9.0.21) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [heimdall-9.0.20](https://github.com/truecharts/apps/compare/heimdall-9.0.19...heimdall-9.0.20) (2021-12-04) - diff --git a/stable/icinga2/0.0.13/CONFIG.md b/stable/heimdall/9.0.30/CONFIG.md similarity index 100% rename from stable/icinga2/0.0.13/CONFIG.md rename to stable/heimdall/9.0.30/CONFIG.md diff --git a/stable/heimdall/9.0.30/Chart.lock b/stable/heimdall/9.0.30/Chart.lock new file mode 100644 index 00000000000..8dbd625b8e7 --- /dev/null +++ b/stable/heimdall/9.0.30/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:18:41.042124977Z" diff --git a/stable/heimdall/9.0.29/Chart.yaml b/stable/heimdall/9.0.30/Chart.yaml similarity index 97% rename from stable/heimdall/9.0.29/Chart.yaml rename to stable/heimdall/9.0.30/Chart.yaml index f7543670136..27cf7c2b980 100644 --- a/stable/heimdall/9.0.29/Chart.yaml +++ b/stable/heimdall/9.0.30/Chart.yaml @@ -19,7 +19,7 @@ name: heimdall sources: - https://github.com/linuxserver/Heimdall/ type: application -version: 9.0.29 +version: 9.0.30 annotations: truecharts.org/catagories: | - organizers diff --git a/stable/heimdall/9.0.29/README.md b/stable/heimdall/9.0.30/README.md similarity index 100% rename from stable/heimdall/9.0.29/README.md rename to stable/heimdall/9.0.30/README.md diff --git a/stable/heimdall/9.0.29/app-readme.md b/stable/heimdall/9.0.30/app-readme.md similarity index 100% rename from stable/heimdall/9.0.29/app-readme.md rename to stable/heimdall/9.0.30/app-readme.md diff --git a/stable/icinga2/0.0.13/charts/common-8.9.24.tgz b/stable/heimdall/9.0.30/charts/common-8.9.24.tgz similarity index 100% rename from stable/icinga2/0.0.13/charts/common-8.9.24.tgz rename to stable/heimdall/9.0.30/charts/common-8.9.24.tgz diff --git a/stable/heimdall/9.0.29/helm-values.md b/stable/heimdall/9.0.30/helm-values.md similarity index 100% rename from stable/heimdall/9.0.29/helm-values.md rename to stable/heimdall/9.0.30/helm-values.md diff --git a/stable/heimdall/9.0.29/ix_values.yaml b/stable/heimdall/9.0.30/ix_values.yaml similarity index 100% rename from stable/heimdall/9.0.29/ix_values.yaml rename to stable/heimdall/9.0.30/ix_values.yaml diff --git a/stable/heimdall/9.0.29/questions.yaml b/stable/heimdall/9.0.30/questions.yaml similarity index 99% rename from stable/heimdall/9.0.29/questions.yaml rename to stable/heimdall/9.0.30/questions.yaml index 7c3840d7c38..b33d225775f 100644 --- a/stable/heimdall/9.0.29/questions.yaml +++ b/stable/heimdall/9.0.30/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10014 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/heimdall/9.0.29/security.md b/stable/heimdall/9.0.30/security.md similarity index 100% rename from stable/heimdall/9.0.29/security.md rename to stable/heimdall/9.0.30/security.md diff --git a/stable/hyperion-ng/4.0.27/templates/common.yaml b/stable/heimdall/9.0.30/templates/common.yaml similarity index 100% rename from stable/hyperion-ng/4.0.27/templates/common.yaml rename to stable/heimdall/9.0.30/templates/common.yaml diff --git a/stable/icinga2/0.0.13/values.yaml b/stable/heimdall/9.0.30/values.yaml similarity index 100% rename from stable/icinga2/0.0.13/values.yaml rename to stable/heimdall/9.0.30/values.yaml diff --git a/stable/home-assistant/12.0.21/CHANGELOG.md b/stable/home-assistant/12.0.21/CHANGELOG.md new file mode 100644 index 00000000000..cb11a294f57 --- /dev/null +++ b/stable/home-assistant/12.0.21/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [home-assistant-12.0.21](https://github.com/truecharts/apps/compare/home-assistant-12.0.20...home-assistant-12.0.21) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [home-assistant-12.0.20](https://github.com/truecharts/apps/compare/home-assistant-12.0.19...home-assistant-12.0.20) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [home-assistant-12.0.19](https://github.com/truecharts/apps/compare/home-assistant-12.0.18...home-assistant-12.0.19) (2021-12-19) + +#### Chore + +* update docker general non-major ([#1567](https://github.com/truecharts/apps/issues/1567)) + + + + +### [home-assistant-12.0.18](https://github.com/truecharts/apps/compare/home-assistant-12.0.17...home-assistant-12.0.18) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) + + + + +### [home-assistant-12.0.17](https://github.com/truecharts/apps/compare/home-assistant-12.0.16...home-assistant-12.0.17) (2021-12-15) + +#### Chore + +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) +* update docker general non-major docker tags ([#1542](https://github.com/truecharts/apps/issues/1542)) +* update docker general non-major + + + + +### [home-assistant-12.0.16](https://github.com/truecharts/apps/compare/home-assistant-12.0.15...home-assistant-12.0.16) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [home-assistant-12.0.15](https://github.com/truecharts/apps/compare/home-assistant-12.0.14...home-assistant-12.0.15) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [home-assistant-12.0.14](https://github.com/truecharts/apps/compare/home-assistant-12.0.13...home-assistant-12.0.14) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + + +### [home-assistant-12.0.13](https://github.com/truecharts/apps/compare/home-assistant-12.0.12...home-assistant-12.0.13) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [home-assistant-12.0.12](https://github.com/truecharts/apps/compare/home-assistant-12.0.11...home-assistant-12.0.12) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [home-assistant-12.0.11](https://github.com/truecharts/apps/compare/home-assistant-12.0.10...home-assistant-12.0.11) (2021-12-07) diff --git a/stable/ipfs/0.0.6/CONFIG.md b/stable/home-assistant/12.0.21/CONFIG.md similarity index 100% rename from stable/ipfs/0.0.6/CONFIG.md rename to stable/home-assistant/12.0.21/CONFIG.md diff --git a/stable/home-assistant/12.0.21/Chart.lock b/stable/home-assistant/12.0.21/Chart.lock new file mode 100644 index 00000000000..cf085264184 --- /dev/null +++ b/stable/home-assistant/12.0.21/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:18:49.791263418Z" diff --git a/stable/home-assistant/12.0.21/Chart.yaml b/stable/home-assistant/12.0.21/Chart.yaml new file mode 100644 index 00000000000..91560c733f4 --- /dev/null +++ b/stable/home-assistant/12.0.21/Chart.yaml @@ -0,0 +1,34 @@ +apiVersion: v2 +appVersion: "2021.12.3" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +deprecated: false +description: home-assistant App for TrueNAS SCALE +home: https://github.com/truecharts/apps/tree/master/charts/stable/home-assistant +icon: https://truecharts.org/_static/img/appicons/home-assistant-icon.png +keywords: +- home-assistant +- hass +- homeassistant +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: home-assistant +sources: +- https://github.com/home-assistant/home-assistant +- https://github.com/cdr/code-server +type: application +version: 12.0.21 +annotations: + truecharts.org/catagories: | + - home-automation + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/home-assistant/12.0.21/README.md b/stable/home-assistant/12.0.21/README.md new file mode 100644 index 00000000000..faf10a89cd1 --- /dev/null +++ b/stable/home-assistant/12.0.21/README.md @@ -0,0 +1,39 @@ +# Introduction + +home-assistant App for TrueNAS SCALE + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.34 | +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.21/app-readme.md b/stable/home-assistant/12.0.21/app-readme.md new file mode 100644 index 00000000000..3f7d1730309 --- /dev/null +++ b/stable/home-assistant/12.0.21/app-readme.md @@ -0,0 +1,3 @@ +home-assistant App for TrueNAS SCALE + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/ipfs/0.0.6/charts/common-8.9.24.tgz b/stable/home-assistant/12.0.21/charts/common-8.9.24.tgz similarity index 100% rename from stable/ipfs/0.0.6/charts/common-8.9.24.tgz rename to stable/home-assistant/12.0.21/charts/common-8.9.24.tgz diff --git a/stable/kanboard/5.0.16/charts/postgresql-6.0.34.tgz b/stable/home-assistant/12.0.21/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/kanboard/5.0.16/charts/postgresql-6.0.34.tgz rename to stable/home-assistant/12.0.21/charts/postgresql-6.0.34.tgz diff --git a/stable/home-assistant/12.0.21/helm-values.md b/stable/home-assistant/12.0.21/helm-values.md new file mode 100644 index 00000000000..e4ef376173d --- /dev/null +++ b/stable/home-assistant/12.0.21/helm-values.md @@ -0,0 +1,42 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.PUID | int | `568` | | +| git.deployKey | string | `""` | | +| git.deployKeyBase64 | string | `""` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/home-assistant"` | | +| image.tag | string | `"v2021.12.3@sha256:aab517cd6a1e0d5fe86db447cfa032b4f9ede1567a60370d3ef4e564fd14576a"` | | +| influxdb.architecture | string | `"standalone"` | | +| influxdb.authEnabled | bool | `false` | | +| influxdb.database | string | `"home_assistant"` | | +| influxdb.enabled | bool | `false` | | +| influxdb.persistence.enabled | bool | `false` | | +| initContainers.init.command[0] | string | `"/config/init/init.sh"` | | +| initContainers.init.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | +| initContainers.init.volumeMounts[0].mountPath | string | `"/config/init"` | | +| initContainers.init.volumeMounts[0].name | string | `"init"` | | +| initContainers.init.volumeMounts[1].mountPath | string | `"/config"` | | +| initContainers.init.volumeMounts[1].name | string | `"config"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql | object | See values.yaml | Enable and configure postgresql database subchart under this key. For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) | +| prometheus.serviceMonitor.enabled | bool | `false` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `8123` | | +| service.main.ports.main.targetPort | int | `8123` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.21/ix_values.yaml b/stable/home-assistant/12.0.21/ix_values.yaml new file mode 100644 index 00000000000..3cdc311f2a8 --- /dev/null +++ b/stable/home-assistant/12.0.21/ix_values.yaml @@ -0,0 +1,79 @@ +image: + repository: tccr.io/truecharts/home-assistant + pullPolicy: IfNotPresent + tag: v2021.12.3@sha256:aab517cd6a1e0d5fe86db447cfa032b4f9ede1567a60370d3ef4e564fd14576a + +env: + PUID: 568 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 8123 + targetPort: 8123 + +initContainers: + init: + image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" + command: ["/config/init/init.sh"] + volumeMounts: + - name: init + mountPath: "/config/init" + - name: config + mountPath: "/config" + +# # Enable devices to be discoverable +# hostNetwork: true + +# # When hostNetwork is true set dnsPolicy to ClusterFirstWithHostNet +# dnsPolicy: ClusterFirstWithHostNet + +# Allow access a Git repository by passing in a private SSH key +git: + # Raw SSH private key + deployKey: "" + # Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence. + deployKeyBase64: "" + +# Enable a prometheus-operator servicemonitor +prometheus: + serviceMonitor: + enabled: false + # interval: 1m + # additionalLabels: {} + +persistence: + config: + enabled: true + mountPath: "/config" + + +# -- Enable and configure postgresql database subchart under this key. +# For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) +# @default -- See values.yaml +postgresql: + enabled: true + postgresqlUsername: home-assistant + postgresqlDatabase: home-assistant + existingSecret: "dbcreds" + +# Enable influxdb +# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/influxdb +influxdb: + enabled: false + architecture: standalone + database: home_assistant + authEnabled: false + persistence: + enabled: false + # storageClass: "" + # diff --git a/stable/home-assistant/12.0.21/questions.yaml b/stable/home-assistant/12.0.21/questions.yaml new file mode 100644 index 00000000000..7e1a4a39c6c --- /dev/null +++ b/stable/home-assistant/12.0.21/questions.yaml @@ -0,0 +1,1848 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: git + group: "Container Configuration" + label: "Home-Assistant Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + label: "Git deploy key" + schema: + type: string + default: "" + - variable: deployKeyBase64 + label: "Git KeyBase64 deploy key" + schema: + type: string + default: "" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var for LinuxServer.io (compatible) containers" + schema: + type: int + default: 568 + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8123 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8123 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/home-assistant/12.0.21/security.md b/stable/home-assistant/12.0.21/security.md new file mode 100644 index 00000000000..8aa428f013b --- /dev/null +++ b/stable/home-assistant/12.0.21/security.md @@ -0,0 +1,671 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: home-assistant/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-home-assistant' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + 'tccr.io/truecharts/home-assistant:v2021.12.3@sha256:aab517cd6a1e0d5fe86db447cfa032b4f9ede1567a60370d3ef4e564fd14576a' + tccr.io/truecharts/home-assistant:v2021.12.3@sha256:aab517cd6a1e0d5fe86db447cfa032b4f9ede1567a60370d3ef4e564fd14576a + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + + + +#### Container: tccr.io/truecharts/home-assistant:v2021.12.3@sha256:aab517cd6a1e0d5fe86db447cfa032b4f9ede1567a60370d3ef4e564fd14576a (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ffmpeg | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libblkid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmount | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libpq | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| nettle | CVE-2021-3580 | HIGH | 3.7.2-r0 | 3.7.3-r0 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
| +| openssh-client-common | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-client-default | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-keygen | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| postgresql-libs | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| postgresql-libs | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Pillow | CVE-2021-34552 | CRITICAL | 8.2.0 | 8.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552
https://github.com/advisories/GHSA-7534-mm45-c74v
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-34552
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
| +| Pillow | CVE-2021-23437 | HIGH | 8.2.0 | 8.3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
| +| Pillow | pyup.io-41277 | UNKNOWN | 8.2.0 | 8.3.2 |
Expand...
| +| aioftp | pyup.io-38045 | UNKNOWN | 0.12.0 | 0.15.0 |
Expand...
| +| bsblan | pyup.io-37697 | UNKNOWN | 0.4.0 | 0.27 |
Expand...
| +| pip | CVE-2021-28363 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://github.com/advisories/GHSA-5phf-pp7p-vc2r
https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml
https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15
https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0
https://github.com/urllib3/urllib3/commits/main
https://github.com/urllib3/urllib3/releases/tag/1.26.4
https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/
https://nvd.nist.gov/vuln/detail/CVE-2021-28363
https://pypi.org/project/urllib3/1.26.4/
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| pip | CVE-2021-3572 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://access.redhat.com/errata/RHSA-2021:3254
https://bugzilla.redhat.com/show_bug.cgi?id=1962856
https://github.com/advisories/GHSA-5xp3-jfq3-5q8x
https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
https://github.com/pypa/pip/pull/9827
https://linux.oracle.com/cve/CVE-2021-3572.html
https://linux.oracle.com/errata/ELSA-2021-4455.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3572
https://packetstormsecurity.com/files/162712/USN-4961-1.txt
| +| pip | pyup.io-42218 | UNKNOWN | 20.2.4 | 21.1 |
Expand...
| +| sendgrid | CVE-2021-43572 | CRITICAL | 6.8.2 | 6.9.1 |
Expand...https://github.com/advisories/GHSA-92vm-mxjf-jqf3
https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1
https://nvd.nist.gov/vuln/detail/CVE-2021-43572
https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/home-assistant/12.0.21/templates/_configmap.tpl b/stable/home-assistant/12.0.21/templates/_configmap.tpl new file mode 100644 index 00000000000..086c40af678 --- /dev/null +++ b/stable/home-assistant/12.0.21/templates/_configmap.tpl @@ -0,0 +1,90 @@ +{{/* Define the configmap */}} +{{- define "hass.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ include "common.names.fullname" . }}-init +data: + init.sh: |- + #!/bin/sh + if test -f "/config/configuration.yaml"; then + echo "configuration.yaml exists." + if grep -q recorder: "/config/configuration.yaml"; then + echo "configuration.yaml already contains recorder" + else + cat /config/init/recorder.default >> /config/configuration.yaml + fi + if grep -q http: "/config/configuration.yaml"; then + echo "configuration.yaml already contains http section" + else + cat /config/init/http.default >> /config/configuration.yaml + fi + else + echo "configuration.yaml does NOT exist." + cp /config/init/configuration.yaml.default /config/configuration.yaml + cat /config/init/recorder.default >> /config/configuration.yaml + cat /config/init/http.default >> /config/configuration.yaml + fi + + echo "Creating include files..." + for include_file in groups.yaml automations.yaml scripts.yaml scenes.yaml; do + if test -f "/config/$include_file"; then + echo "$include_file exists." + else + echo "$include_file does NOT exist." + touch "/config/$include_file" + fi + done + + cd "/config" || echo "Could not change path to /config" + echo "Creating custom_components directory..." + mkdir "/config/custom_components" || echo "custom_components directory already exists" + + echo "Changing to the custom_components directory..." + cd "/config/custom_components" || echo "Could not change path to /config/custom_components" + + echo "Downloading HACS" + wget "https://github.com/hacs/integration/releases/latest/download/hacs.zip" || exit 0 + + if [ -d "/config/custom_components/hacs" ]; then + echo "HACS directory already exist, cleaning up..." + rm -R "/config/custom_components/hacs" + fi + + echo "Creating HACS directory..." + mkdir "/config/custom_components/hacs" + + echo "Unpacking HACS..." + unzip "/config/custom_components/hacs.zip" -d "/config/custom_components/hacs" >/dev/null 2>&1 + + echo "Removing HACS zip file..." + rm "/config/custom_components/hacs.zip" + echo "Installation complete." + + configuration.yaml.default: |- + # Configure a default setup of Home Assistant (frontend, api, etc) + default_config: + + # Text to speech + tts: + - platform: google_translate + + group: !include groups.yaml + automation: !include automations.yaml + script: !include scripts.yaml + scene: !include scenes.yaml + recorder.default: |- + + recorder: + purge_keep_days: 30 + commit_interval: 3 + db_url: {{ ( printf "%s?client_encoding=utf8" ( .Values.postgresql.url.complete | trimAll "\"" ) ) | quote }} + http.default: |- + + http: + use_x_forwarded_for: true + trusted_proxies: + - 172.16.0.0/16 + +{{- end -}} diff --git a/stable/home-assistant/12.0.21/templates/common.yaml b/stable/home-assistant/12.0.21/templates/common.yaml new file mode 100644 index 00000000000..0cc42ff47ee --- /dev/null +++ b/stable/home-assistant/12.0.21/templates/common.yaml @@ -0,0 +1,22 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render configmap for hass */}} +{{- include "hass.configmap" . }} + +{{/* Append the general secret volumes to the volumes */}} +{{- define "hass.initvolume" -}} +enabled: "true" +mountPath: "/config/init" +readOnly: true +type: "custom" +volumeSpec: + configMap: + name: {{ include "common.names.fullname" . }}-init + defaultMode: 0777 +{{- end -}} + +{{- $_ := set .Values.persistence "init" (include "hass.initvolume" . | fromYaml) -}} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/home-assistant/12.0.21/templates/secret.yaml b/stable/home-assistant/12.0.21/templates/secret.yaml new file mode 100644 index 00000000000..19f769cf59b --- /dev/null +++ b/stable/home-assistant/12.0.21/templates/secret.yaml @@ -0,0 +1,15 @@ +{{- if or .Values.git.deployKey .Values.git.deployKeyBase64 }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "common.names.fullname" . }}-deploykey + labels: + {{- include "common.labels" . | nindent 4 }} +type: Opaque +data: + {{- if .Values.git.deployKey }} + id_rsa: {{ .Values.git.deployKey | b64enc | quote }} + {{- else }} + id_rsa: {{ .Values.git.deployKeyBase64 | quote }} + {{- end }} +{{- end }} diff --git a/stable/ipfs/0.0.6/values.yaml b/stable/home-assistant/12.0.21/values.yaml similarity index 100% rename from stable/ipfs/0.0.6/values.yaml rename to stable/home-assistant/12.0.21/values.yaml diff --git a/stable/htpcmanager/0.0.5/Chart.lock b/stable/htpcmanager/0.0.5/Chart.lock deleted file mode 100644 index d28fcdf840a..00000000000 --- a/stable/htpcmanager/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:32:17.531447117Z" diff --git a/stable/htpcmanager/0.0.5/CHANGELOG.md b/stable/htpcmanager/0.0.6/CHANGELOG.md similarity index 86% rename from stable/htpcmanager/0.0.5/CHANGELOG.md rename to stable/htpcmanager/0.0.6/CHANGELOG.md index 79bc5c06632..2e981c3f000 100644 --- a/stable/htpcmanager/0.0.5/CHANGELOG.md +++ b/stable/htpcmanager/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [htpcmanager-0.0.6](https://github.com/truecharts/apps/compare/htpcmanager-0.0.5...htpcmanager-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [htpcmanager-0.0.5](https://github.com/truecharts/apps/compare/htpcmanager-0.0.4...htpcmanager-0.0.5) (2021-12-19) diff --git a/stable/jackett/9.0.51/CONFIG.md b/stable/htpcmanager/0.0.6/CONFIG.md similarity index 100% rename from stable/jackett/9.0.51/CONFIG.md rename to stable/htpcmanager/0.0.6/CONFIG.md diff --git a/stable/htpcmanager/0.0.6/Chart.lock b/stable/htpcmanager/0.0.6/Chart.lock new file mode 100644 index 00000000000..a17081235d4 --- /dev/null +++ b/stable/htpcmanager/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:18:54.529537582Z" diff --git a/stable/htpcmanager/0.0.5/Chart.yaml b/stable/htpcmanager/0.0.6/Chart.yaml similarity index 98% rename from stable/htpcmanager/0.0.5/Chart.yaml rename to stable/htpcmanager/0.0.6/Chart.yaml index 50e421c0846..9b35934b35f 100644 --- a/stable/htpcmanager/0.0.5/Chart.yaml +++ b/stable/htpcmanager/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: htpcmanager -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.17" description: Htpcmanager is a front end for many htpc related applications. type: application diff --git a/stable/htpcmanager/0.0.5/README.md b/stable/htpcmanager/0.0.6/README.md similarity index 100% rename from stable/htpcmanager/0.0.5/README.md rename to stable/htpcmanager/0.0.6/README.md diff --git a/stable/htpcmanager/0.0.5/app-readme.md b/stable/htpcmanager/0.0.6/app-readme.md similarity index 100% rename from stable/htpcmanager/0.0.5/app-readme.md rename to stable/htpcmanager/0.0.6/app-readme.md diff --git a/stable/jackett/9.0.51/charts/common-8.9.24.tgz b/stable/htpcmanager/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/jackett/9.0.51/charts/common-8.9.24.tgz rename to stable/htpcmanager/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/htpcmanager/0.0.5/helm-values.md b/stable/htpcmanager/0.0.6/helm-values.md similarity index 100% rename from stable/htpcmanager/0.0.5/helm-values.md rename to stable/htpcmanager/0.0.6/helm-values.md diff --git a/stable/htpcmanager/0.0.5/ix_values.yaml b/stable/htpcmanager/0.0.6/ix_values.yaml similarity index 100% rename from stable/htpcmanager/0.0.5/ix_values.yaml rename to stable/htpcmanager/0.0.6/ix_values.yaml diff --git a/stable/htpcmanager/0.0.5/questions.yaml b/stable/htpcmanager/0.0.6/questions.yaml similarity index 100% rename from stable/htpcmanager/0.0.5/questions.yaml rename to stable/htpcmanager/0.0.6/questions.yaml diff --git a/stable/htpcmanager/0.0.5/security.md b/stable/htpcmanager/0.0.6/security.md similarity index 100% rename from stable/htpcmanager/0.0.5/security.md rename to stable/htpcmanager/0.0.6/security.md diff --git a/stable/icinga2/0.0.13/templates/common.yaml b/stable/htpcmanager/0.0.6/templates/common.yaml similarity index 100% rename from stable/icinga2/0.0.13/templates/common.yaml rename to stable/htpcmanager/0.0.6/templates/common.yaml diff --git a/stable/jackett/9.0.51/values.yaml b/stable/htpcmanager/0.0.6/values.yaml similarity index 100% rename from stable/jackett/9.0.51/values.yaml rename to stable/htpcmanager/0.0.6/values.yaml diff --git a/stable/hyperion-ng/4.0.27/Chart.lock b/stable/hyperion-ng/4.0.27/Chart.lock deleted file mode 100644 index 0d2c2ed0fc9..00000000000 --- a/stable/hyperion-ng/4.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:32:43.840001355Z" diff --git a/stable/hyperion-ng/4.0.27/CHANGELOG.md b/stable/hyperion-ng/4.0.28/CHANGELOG.md similarity index 90% rename from stable/hyperion-ng/4.0.27/CHANGELOG.md rename to stable/hyperion-ng/4.0.28/CHANGELOG.md index 8f1106fb805..da1a44cb706 100644 --- a/stable/hyperion-ng/4.0.27/CHANGELOG.md +++ b/stable/hyperion-ng/4.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [hyperion-ng-4.0.28](https://github.com/truecharts/apps/compare/hyperion-ng-4.0.27...hyperion-ng-4.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [hyperion-ng-4.0.27](https://github.com/truecharts/apps/compare/hyperion-ng-4.0.26...hyperion-ng-4.0.27) (2021-12-19) @@ -87,13 +97,3 @@ - -### [hyperion-ng-4.0.19](https://github.com/truecharts/apps/compare/hyperion-ng-4.0.18...hyperion-ng-4.0.19) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - diff --git a/stable/jdownloader2/5.0.5/CONFIG.md b/stable/hyperion-ng/4.0.28/CONFIG.md similarity index 100% rename from stable/jdownloader2/5.0.5/CONFIG.md rename to stable/hyperion-ng/4.0.28/CONFIG.md diff --git a/stable/hyperion-ng/4.0.28/Chart.lock b/stable/hyperion-ng/4.0.28/Chart.lock new file mode 100644 index 00000000000..29e1926db3e --- /dev/null +++ b/stable/hyperion-ng/4.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:19:20.557137308Z" diff --git a/stable/hyperion-ng/4.0.27/Chart.yaml b/stable/hyperion-ng/4.0.28/Chart.yaml similarity index 97% rename from stable/hyperion-ng/4.0.27/Chart.yaml rename to stable/hyperion-ng/4.0.28/Chart.yaml index 15f4549c36c..f8acb6994a8 100644 --- a/stable/hyperion-ng/4.0.27/Chart.yaml +++ b/stable/hyperion-ng/4.0.28/Chart.yaml @@ -19,7 +19,7 @@ name: hyperion-ng sources: - https://github.com/hyperion-project/hyperion.ng - https://hub.docker.com/r/sirfragalot/hyperion.ng -version: 4.0.27 +version: 4.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/hyperion-ng/4.0.27/README.md b/stable/hyperion-ng/4.0.28/README.md similarity index 100% rename from stable/hyperion-ng/4.0.27/README.md rename to stable/hyperion-ng/4.0.28/README.md diff --git a/stable/hyperion-ng/4.0.27/app-readme.md b/stable/hyperion-ng/4.0.28/app-readme.md similarity index 100% rename from stable/hyperion-ng/4.0.27/app-readme.md rename to stable/hyperion-ng/4.0.28/app-readme.md diff --git a/stable/jdownloader2/5.0.5/charts/common-8.9.24.tgz b/stable/hyperion-ng/4.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/jdownloader2/5.0.5/charts/common-8.9.24.tgz rename to stable/hyperion-ng/4.0.28/charts/common-8.9.24.tgz diff --git a/stable/hyperion-ng/4.0.27/helm-values.md b/stable/hyperion-ng/4.0.28/helm-values.md similarity index 100% rename from stable/hyperion-ng/4.0.27/helm-values.md rename to stable/hyperion-ng/4.0.28/helm-values.md diff --git a/stable/hyperion-ng/4.0.27/ix_values.yaml b/stable/hyperion-ng/4.0.28/ix_values.yaml similarity index 100% rename from stable/hyperion-ng/4.0.27/ix_values.yaml rename to stable/hyperion-ng/4.0.28/ix_values.yaml diff --git a/stable/hyperion-ng/4.0.27/questions.yaml b/stable/hyperion-ng/4.0.28/questions.yaml similarity index 99% rename from stable/hyperion-ng/4.0.27/questions.yaml rename to stable/hyperion-ng/4.0.28/questions.yaml index 06b5f7b8514..147337522ba 100644 --- a/stable/hyperion-ng/4.0.27/questions.yaml +++ b/stable/hyperion-ng/4.0.28/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10065 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -451,7 +450,6 @@ questions: schema: type: int default: 19444 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -551,7 +549,6 @@ questions: schema: type: int default: 19445 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -651,7 +648,6 @@ questions: schema: type: int default: 19333 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/hyperion-ng/4.0.27/security.md b/stable/hyperion-ng/4.0.28/security.md similarity index 100% rename from stable/hyperion-ng/4.0.27/security.md rename to stable/hyperion-ng/4.0.28/security.md diff --git a/stable/ipfs/0.0.6/templates/common.yaml b/stable/hyperion-ng/4.0.28/templates/common.yaml similarity index 100% rename from stable/ipfs/0.0.6/templates/common.yaml rename to stable/hyperion-ng/4.0.28/templates/common.yaml diff --git a/stable/jdownloader2/5.0.5/values.yaml b/stable/hyperion-ng/4.0.28/values.yaml similarity index 100% rename from stable/jdownloader2/5.0.5/values.yaml rename to stable/hyperion-ng/4.0.28/values.yaml diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/Chart.lock b/stable/icantbelieveitsnotvaletudo/2.0.24/Chart.lock deleted file mode 100644 index 5b873fcc8f0..00000000000 --- a/stable/icantbelieveitsnotvaletudo/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:32:49.861999603Z" diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/CHANGELOG.md b/stable/icantbelieveitsnotvaletudo/2.0.25/CHANGELOG.md similarity index 89% rename from stable/icantbelieveitsnotvaletudo/2.0.24/CHANGELOG.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/CHANGELOG.md index 69155a47d20..cf9ba0a2908 100644 --- a/stable/icantbelieveitsnotvaletudo/2.0.24/CHANGELOG.md +++ b/stable/icantbelieveitsnotvaletudo/2.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [icantbelieveitsnotvaletudo-2.0.25](https://github.com/truecharts/apps/compare/icantbelieveitsnotvaletudo-2.0.24...icantbelieveitsnotvaletudo-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [icantbelieveitsnotvaletudo-2.0.24](https://github.com/truecharts/apps/compare/icantbelieveitsnotvaletudo-2.0.23...icantbelieveitsnotvaletudo-2.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [icantbelieveitsnotvaletudo-2.0.16](https://github.com/truecharts/apps/compare/icantbelieveitsnotvaletudo-2.0.15...icantbelieveitsnotvaletudo-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [icantbelieveitsnotvaletudo-2.0.15](https://github.com/truecharts/apps/compare/icantbelieveitsnotvaletudo-2.0.14...icantbelieveitsnotvaletudo-2.0.15) (2021-12-04) diff --git a/stable/jellyfin/9.0.25/CONFIG.md b/stable/icantbelieveitsnotvaletudo/2.0.25/CONFIG.md similarity index 100% rename from stable/jellyfin/9.0.25/CONFIG.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/CONFIG.md diff --git a/stable/icantbelieveitsnotvaletudo/2.0.25/Chart.lock b/stable/icantbelieveitsnotvaletudo/2.0.25/Chart.lock new file mode 100644 index 00000000000..141f5722335 --- /dev/null +++ b/stable/icantbelieveitsnotvaletudo/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:19:22.766866156Z" diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/Chart.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/Chart.yaml similarity index 98% rename from stable/icantbelieveitsnotvaletudo/2.0.24/Chart.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/Chart.yaml index f95e4deec0d..5d778007ff4 100644 --- a/stable/icantbelieveitsnotvaletudo/2.0.24/Chart.yaml +++ b/stable/icantbelieveitsnotvaletudo/2.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: icantbelieveitsnotvaletudo sources: - https://github.com/Hypfer/ICantBelieveItsNotValetudo - https://github.com/truecharts/apps/tree/master/charts/icantbelieveitsnotvaletudo -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/README.md b/stable/icantbelieveitsnotvaletudo/2.0.25/README.md similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/README.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/README.md diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/app-readme.md b/stable/icantbelieveitsnotvaletudo/2.0.25/app-readme.md similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/app-readme.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/app-readme.md diff --git a/stable/jellyfin/9.0.25/charts/common-8.9.24.tgz b/stable/icantbelieveitsnotvaletudo/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/jellyfin/9.0.25/charts/common-8.9.24.tgz rename to stable/icantbelieveitsnotvaletudo/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/helm-values.md b/stable/icantbelieveitsnotvaletudo/2.0.25/helm-values.md similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/helm-values.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/helm-values.md diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/ix_values.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/ix_values.yaml similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/ix_values.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/ix_values.yaml diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/questions.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/questions.yaml similarity index 99% rename from stable/icantbelieveitsnotvaletudo/2.0.24/questions.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/questions.yaml index d1d0510b323..5b4b12fde2b 100644 --- a/stable/icantbelieveitsnotvaletudo/2.0.24/questions.yaml +++ b/stable/icantbelieveitsnotvaletudo/2.0.25/questions.yaml @@ -427,7 +427,6 @@ questions: schema: type: int default: 10039 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/security.md b/stable/icantbelieveitsnotvaletudo/2.0.25/security.md similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/security.md rename to stable/icantbelieveitsnotvaletudo/2.0.25/security.md diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/templates/common.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/templates/common.yaml similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/templates/common.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/templates/common.yaml diff --git a/stable/icantbelieveitsnotvaletudo/2.0.24/templates/configmap.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/templates/configmap.yaml similarity index 100% rename from stable/icantbelieveitsnotvaletudo/2.0.24/templates/configmap.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/templates/configmap.yaml diff --git a/stable/jellyfin/9.0.25/values.yaml b/stable/icantbelieveitsnotvaletudo/2.0.25/values.yaml similarity index 100% rename from stable/jellyfin/9.0.25/values.yaml rename to stable/icantbelieveitsnotvaletudo/2.0.25/values.yaml diff --git a/stable/icinga2/0.0.13/Chart.lock b/stable/icinga2/0.0.13/Chart.lock deleted file mode 100644 index 93cfd9ef2cf..00000000000 --- a/stable/icinga2/0.0.13/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:32:59.040075416Z" diff --git a/stable/icinga2/0.0.13/CHANGELOG.md b/stable/icinga2/0.0.14/CHANGELOG.md similarity index 94% rename from stable/icinga2/0.0.13/CHANGELOG.md rename to stable/icinga2/0.0.14/CHANGELOG.md index b63ab978c3f..edbba7f6444 100644 --- a/stable/icinga2/0.0.13/CHANGELOG.md +++ b/stable/icinga2/0.0.14/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [icinga2-0.0.14](https://github.com/truecharts/apps/compare/icinga2-0.0.13...icinga2-0.0.14) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [icinga2-0.0.13](https://github.com/truecharts/apps/compare/icinga2-0.0.12...icinga2-0.0.13) (2021-12-19) @@ -88,12 +97,3 @@ ### [icinga2-0.0.5](https://github.com/truecharts/apps/compare/icinga2-0.0.4...icinga2-0.0.5) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [icinga2-0.0.4](https://github.com/truecharts/apps/compare/icinga2-0.0.3...icinga2-0.0.4) (2021-12-04) diff --git a/stable/joplin-server/5.0.15/CONFIG.md b/stable/icinga2/0.0.14/CONFIG.md similarity index 100% rename from stable/joplin-server/5.0.15/CONFIG.md rename to stable/icinga2/0.0.14/CONFIG.md diff --git a/stable/icinga2/0.0.14/Chart.lock b/stable/icinga2/0.0.14/Chart.lock new file mode 100644 index 00000000000..52331bd6be5 --- /dev/null +++ b/stable/icinga2/0.0.14/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:19:35.521671603Z" diff --git a/stable/icinga2/0.0.13/Chart.yaml b/stable/icinga2/0.0.14/Chart.yaml similarity index 98% rename from stable/icinga2/0.0.13/Chart.yaml rename to stable/icinga2/0.0.14/Chart.yaml index a8f0124f1fc..fd5b0e9d106 100644 --- a/stable/icinga2/0.0.13/Chart.yaml +++ b/stable/icinga2/0.0.14/Chart.yaml @@ -23,7 +23,7 @@ name: icinga2 sources: - https://github.com/jjethwa/icinga2 - https://icinga.com/ -version: 0.0.13 +version: 0.0.14 annotations: truecharts.org/catagories: | - monitoring diff --git a/stable/icinga2/0.0.13/README.md b/stable/icinga2/0.0.14/README.md similarity index 100% rename from stable/icinga2/0.0.13/README.md rename to stable/icinga2/0.0.14/README.md diff --git a/stable/icinga2/0.0.13/app-readme.md b/stable/icinga2/0.0.14/app-readme.md similarity index 100% rename from stable/icinga2/0.0.13/app-readme.md rename to stable/icinga2/0.0.14/app-readme.md diff --git a/stable/joplin-server/5.0.15/charts/common-8.9.24.tgz b/stable/icinga2/0.0.14/charts/common-8.9.24.tgz similarity index 100% rename from stable/joplin-server/5.0.15/charts/common-8.9.24.tgz rename to stable/icinga2/0.0.14/charts/common-8.9.24.tgz diff --git a/stable/icinga2/0.0.13/charts/mariadb-1.0.37.tgz b/stable/icinga2/0.0.14/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/icinga2/0.0.13/charts/mariadb-1.0.37.tgz rename to stable/icinga2/0.0.14/charts/mariadb-1.0.37.tgz diff --git a/stable/icinga2/0.0.13/helm-values.md b/stable/icinga2/0.0.14/helm-values.md similarity index 100% rename from stable/icinga2/0.0.13/helm-values.md rename to stable/icinga2/0.0.14/helm-values.md diff --git a/stable/icinga2/0.0.13/ix_values.yaml b/stable/icinga2/0.0.14/ix_values.yaml similarity index 100% rename from stable/icinga2/0.0.13/ix_values.yaml rename to stable/icinga2/0.0.14/ix_values.yaml diff --git a/stable/icinga2/0.0.13/questions.yaml b/stable/icinga2/0.0.14/questions.yaml similarity index 100% rename from stable/icinga2/0.0.13/questions.yaml rename to stable/icinga2/0.0.14/questions.yaml diff --git a/stable/icinga2/0.0.13/security.md b/stable/icinga2/0.0.14/security.md similarity index 100% rename from stable/icinga2/0.0.13/security.md rename to stable/icinga2/0.0.14/security.md diff --git a/stable/jackett/9.0.51/templates/common.yaml b/stable/icinga2/0.0.14/templates/common.yaml similarity index 100% rename from stable/jackett/9.0.51/templates/common.yaml rename to stable/icinga2/0.0.14/templates/common.yaml diff --git a/stable/joplin-server/5.0.15/values.yaml b/stable/icinga2/0.0.14/values.yaml similarity index 100% rename from stable/joplin-server/5.0.15/values.yaml rename to stable/icinga2/0.0.14/values.yaml diff --git a/stable/ipfs/0.0.6/Chart.lock b/stable/ipfs/0.0.6/Chart.lock deleted file mode 100644 index 970c2abbc3c..00000000000 --- a/stable/ipfs/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:33:09.173620053Z" diff --git a/stable/ipfs/0.0.6/CHANGELOG.md b/stable/ipfs/0.0.7/CHANGELOG.md similarity index 88% rename from stable/ipfs/0.0.6/CHANGELOG.md rename to stable/ipfs/0.0.7/CHANGELOG.md index 949e264ec1a..079b4421368 100644 --- a/stable/ipfs/0.0.6/CHANGELOG.md +++ b/stable/ipfs/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ipfs-0.0.7](https://github.com/truecharts/apps/compare/ipfs-0.0.6...ipfs-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [ipfs-0.0.6](https://github.com/truecharts/apps/compare/ipfs-0.0.5...ipfs-0.0.6) (2021-12-19) diff --git a/stable/kanboard/5.0.16/CONFIG.md b/stable/ipfs/0.0.7/CONFIG.md similarity index 100% rename from stable/kanboard/5.0.16/CONFIG.md rename to stable/ipfs/0.0.7/CONFIG.md diff --git a/stable/ipfs/0.0.7/Chart.lock b/stable/ipfs/0.0.7/Chart.lock new file mode 100644 index 00000000000..18598fa6a14 --- /dev/null +++ b/stable/ipfs/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:20:06.627180849Z" diff --git a/stable/ipfs/0.0.6/Chart.yaml b/stable/ipfs/0.0.7/Chart.yaml similarity index 98% rename from stable/ipfs/0.0.6/Chart.yaml rename to stable/ipfs/0.0.7/Chart.yaml index 8051ecd908e..7c2e2acaeb8 100644 --- a/stable/ipfs/0.0.6/Chart.yaml +++ b/stable/ipfs/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: ipfs -version: 0.0.6 +version: 0.0.7 appVersion: "2.13.0" description: Ipfs - A peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open type: application diff --git a/stable/ipfs/0.0.6/README.md b/stable/ipfs/0.0.7/README.md similarity index 100% rename from stable/ipfs/0.0.6/README.md rename to stable/ipfs/0.0.7/README.md diff --git a/stable/ipfs/0.0.6/app-readme.md b/stable/ipfs/0.0.7/app-readme.md similarity index 100% rename from stable/ipfs/0.0.6/app-readme.md rename to stable/ipfs/0.0.7/app-readme.md diff --git a/stable/kanboard/5.0.16/charts/common-8.9.24.tgz b/stable/ipfs/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/kanboard/5.0.16/charts/common-8.9.24.tgz rename to stable/ipfs/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/ipfs/0.0.6/helm-values.md b/stable/ipfs/0.0.7/helm-values.md similarity index 100% rename from stable/ipfs/0.0.6/helm-values.md rename to stable/ipfs/0.0.7/helm-values.md diff --git a/stable/ipfs/0.0.6/ix_values.yaml b/stable/ipfs/0.0.7/ix_values.yaml similarity index 100% rename from stable/ipfs/0.0.6/ix_values.yaml rename to stable/ipfs/0.0.7/ix_values.yaml diff --git a/stable/ipfs/0.0.6/questions.yaml b/stable/ipfs/0.0.7/questions.yaml similarity index 100% rename from stable/ipfs/0.0.6/questions.yaml rename to stable/ipfs/0.0.7/questions.yaml diff --git a/stable/ipfs/0.0.6/security.md b/stable/ipfs/0.0.7/security.md similarity index 100% rename from stable/ipfs/0.0.6/security.md rename to stable/ipfs/0.0.7/security.md diff --git a/stable/jdownloader2/5.0.5/templates/common.yaml b/stable/ipfs/0.0.7/templates/common.yaml similarity index 100% rename from stable/jdownloader2/5.0.5/templates/common.yaml rename to stable/ipfs/0.0.7/templates/common.yaml diff --git a/stable/kanboard/5.0.16/values.yaml b/stable/ipfs/0.0.7/values.yaml similarity index 100% rename from stable/kanboard/5.0.16/values.yaml rename to stable/ipfs/0.0.7/values.yaml diff --git a/stable/jackett/9.0.51/Chart.lock b/stable/jackett/9.0.51/Chart.lock deleted file mode 100644 index 55488d1b4b1..00000000000 --- a/stable/jackett/9.0.51/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:33:41.659347957Z" diff --git a/stable/jackett/9.0.51/CHANGELOG.md b/stable/jackett/9.0.52/CHANGELOG.md similarity index 92% rename from stable/jackett/9.0.51/CHANGELOG.md rename to stable/jackett/9.0.52/CHANGELOG.md index 7be3777f699..e16f6f29653 100644 --- a/stable/jackett/9.0.51/CHANGELOG.md +++ b/stable/jackett/9.0.52/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [jackett-9.0.52](https://github.com/truecharts/apps/compare/jackett-9.0.51...jackett-9.0.52) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [jackett-9.0.51](https://github.com/truecharts/apps/compare/jackett-9.0.50...jackett-9.0.51) (2021-12-19) @@ -88,12 +97,3 @@ ### [jackett-9.0.42](https://github.com/truecharts/apps/compare/jackett-9.0.41...jackett-9.0.42) (2021-12-08) - -#### Chore - -* update non-major ([#1488](https://github.com/truecharts/apps/issues/1488)) - - - - -### [jackett-9.0.41](https://github.com/truecharts/apps/compare/jackett-9.0.40...jackett-9.0.41) (2021-12-07) diff --git a/stable/kms/9.0.29/CONFIG.md b/stable/jackett/9.0.52/CONFIG.md similarity index 100% rename from stable/kms/9.0.29/CONFIG.md rename to stable/jackett/9.0.52/CONFIG.md diff --git a/stable/jackett/9.0.52/Chart.lock b/stable/jackett/9.0.52/Chart.lock new file mode 100644 index 00000000000..f7a5b87fb70 --- /dev/null +++ b/stable/jackett/9.0.52/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:20:11.530925389Z" diff --git a/stable/jackett/9.0.51/Chart.yaml b/stable/jackett/9.0.52/Chart.yaml similarity index 97% rename from stable/jackett/9.0.51/Chart.yaml rename to stable/jackett/9.0.52/Chart.yaml index 60988b522ff..f9bbfd8713c 100644 --- a/stable/jackett/9.0.51/Chart.yaml +++ b/stable/jackett/9.0.52/Chart.yaml @@ -21,7 +21,7 @@ name: jackett sources: - https://github.com/Jackett/Jackett type: application -version: 9.0.51 +version: 9.0.52 annotations: truecharts.org/catagories: | - media diff --git a/stable/jackett/9.0.51/README.md b/stable/jackett/9.0.52/README.md similarity index 100% rename from stable/jackett/9.0.51/README.md rename to stable/jackett/9.0.52/README.md diff --git a/stable/jackett/9.0.51/app-readme.md b/stable/jackett/9.0.52/app-readme.md similarity index 100% rename from stable/jackett/9.0.51/app-readme.md rename to stable/jackett/9.0.52/app-readme.md diff --git a/stable/kms/9.0.29/charts/common-8.9.24.tgz b/stable/jackett/9.0.52/charts/common-8.9.24.tgz similarity index 100% rename from stable/kms/9.0.29/charts/common-8.9.24.tgz rename to stable/jackett/9.0.52/charts/common-8.9.24.tgz diff --git a/stable/jackett/9.0.51/helm-values.md b/stable/jackett/9.0.52/helm-values.md similarity index 100% rename from stable/jackett/9.0.51/helm-values.md rename to stable/jackett/9.0.52/helm-values.md diff --git a/stable/jackett/9.0.51/ix_values.yaml b/stable/jackett/9.0.52/ix_values.yaml similarity index 100% rename from stable/jackett/9.0.51/ix_values.yaml rename to stable/jackett/9.0.52/ix_values.yaml diff --git a/stable/jackett/9.0.51/questions.yaml b/stable/jackett/9.0.52/questions.yaml similarity index 100% rename from stable/jackett/9.0.51/questions.yaml rename to stable/jackett/9.0.52/questions.yaml diff --git a/stable/jackett/9.0.51/security.md b/stable/jackett/9.0.52/security.md similarity index 100% rename from stable/jackett/9.0.51/security.md rename to stable/jackett/9.0.52/security.md diff --git a/stable/jellyfin/9.0.25/templates/common.yaml b/stable/jackett/9.0.52/templates/common.yaml similarity index 100% rename from stable/jellyfin/9.0.25/templates/common.yaml rename to stable/jackett/9.0.52/templates/common.yaml diff --git a/stable/kms/9.0.29/values.yaml b/stable/jackett/9.0.52/values.yaml similarity index 100% rename from stable/kms/9.0.29/values.yaml rename to stable/jackett/9.0.52/values.yaml diff --git a/stable/jdownloader2/5.0.5/CHANGELOG.md b/stable/jdownloader2/5.0.6/CHANGELOG.md similarity index 88% rename from stable/jdownloader2/5.0.5/CHANGELOG.md rename to stable/jdownloader2/5.0.6/CHANGELOG.md index eb68c14c8e4..4e2dcd06f67 100644 --- a/stable/jdownloader2/5.0.5/CHANGELOG.md +++ b/stable/jdownloader2/5.0.6/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [jdownloader2-5.0.6](https://github.com/truecharts/apps/compare/jdownloader2-5.0.5...jdownloader2-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [jdownloader2-5.0.5](https://github.com/truecharts/apps/compare/jdownloader2-5.0.4...jdownloader2-5.0.5) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [jdownloader2-4.0.18](https://github.com/truecharts/apps/compare/jdownloader2-4.0.17...jdownloader2-4.0.18) (2021-12-05) - diff --git a/stable/kodi-headless/0.0.6/CONFIG.md b/stable/jdownloader2/5.0.6/CONFIG.md similarity index 100% rename from stable/kodi-headless/0.0.6/CONFIG.md rename to stable/jdownloader2/5.0.6/CONFIG.md diff --git a/stable/jdownloader2/5.0.6/Chart.lock b/stable/jdownloader2/5.0.6/Chart.lock new file mode 100644 index 00000000000..7f0a2d601ef --- /dev/null +++ b/stable/jdownloader2/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:20:18.537381763Z" diff --git a/stable/jdownloader2/5.0.5/Chart.yaml b/stable/jdownloader2/5.0.6/Chart.yaml similarity index 98% rename from stable/jdownloader2/5.0.5/Chart.yaml rename to stable/jdownloader2/5.0.6/Chart.yaml index 99e318ec73b..db0982d0dfa 100644 --- a/stable/jdownloader2/5.0.5/Chart.yaml +++ b/stable/jdownloader2/5.0.6/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://hub.docker.com/r/jlesage/jdownloader-2 - https://jdownloader.org/ type: application -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - downloads diff --git a/stable/jdownloader2/5.0.5/README.md b/stable/jdownloader2/5.0.6/README.md similarity index 100% rename from stable/jdownloader2/5.0.5/README.md rename to stable/jdownloader2/5.0.6/README.md diff --git a/stable/jdownloader2/5.0.5/app-readme.md b/stable/jdownloader2/5.0.6/app-readme.md similarity index 100% rename from stable/jdownloader2/5.0.5/app-readme.md rename to stable/jdownloader2/5.0.6/app-readme.md diff --git a/stable/kodi-headless/0.0.6/charts/common-8.9.24.tgz b/stable/jdownloader2/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/kodi-headless/0.0.6/charts/common-8.9.24.tgz rename to stable/jdownloader2/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/jdownloader2/5.0.5/helm-values.md b/stable/jdownloader2/5.0.6/helm-values.md similarity index 97% rename from stable/jdownloader2/5.0.5/helm-values.md rename to stable/jdownloader2/5.0.6/helm-values.md index 12d3167f3c9..f3fe8e1dede 100644 --- a/stable/jdownloader2/5.0.5/helm-values.md +++ b/stable/jdownloader2/5.0.6/helm-values.md @@ -17,7 +17,7 @@ You will, however, be able to use all values referenced in the common chart here | env.KEEP_APP_RUNNING | int | `0` | | | env.PUID | int | `568` | | | env.SECURE_CONNECTION | int | `0` | | -| envTpl.USER_ID | string | `"{{ .Values.env.PUID }}"` | | +| env.USER_ID | string | `"{{ .Values.env.PUID }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/jdownloader-2"` | | | image.tag | string | `"v1.7.1@sha256:ba37e3a795f6e64466de3e81152af78c5fe8f6c3beeeee5a2bc948c41a631b16"` | | diff --git a/stable/jdownloader2/5.0.5/ix_values.yaml b/stable/jdownloader2/5.0.6/ix_values.yaml similarity index 91% rename from stable/jdownloader2/5.0.5/ix_values.yaml rename to stable/jdownloader2/5.0.6/ix_values.yaml index 6a62e02bd4e..1aa5e959267 100644 --- a/stable/jdownloader2/5.0.5/ix_values.yaml +++ b/stable/jdownloader2/5.0.6/ix_values.yaml @@ -32,15 +32,12 @@ service: port: 10056 targetPort: 5900 -# All values here are set as the docker defaults. -envTpl: - # Permissions Settings - USER_ID: "{{ .Values.env.PUID }}" secret: VNC_PASSWORD: "" env: # Permissions Settings PUID: 568 + USER_ID: "{{ .Values.env.PUID }}" # General Settings KEEP_APP_RUNNING: 0 CLEAN_TMP_DIR: 1 diff --git a/stable/jdownloader2/5.0.5/questions.yaml b/stable/jdownloader2/5.0.6/questions.yaml similarity index 99% rename from stable/jdownloader2/5.0.5/questions.yaml rename to stable/jdownloader2/5.0.6/questions.yaml index 11cd98dcc9a..048b86045d3 100644 --- a/stable/jdownloader2/5.0.5/questions.yaml +++ b/stable/jdownloader2/5.0.6/questions.yaml @@ -398,7 +398,6 @@ questions: schema: type: int default: 10054 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -498,7 +497,6 @@ questions: schema: type: int default: 3129 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -597,7 +595,6 @@ questions: schema: type: int default: 10056 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/jdownloader2/5.0.5/security.md b/stable/jdownloader2/5.0.6/security.md similarity index 100% rename from stable/jdownloader2/5.0.5/security.md rename to stable/jdownloader2/5.0.6/security.md diff --git a/stable/joplin-server/5.0.15/templates/common.yaml b/stable/jdownloader2/5.0.6/templates/common.yaml similarity index 100% rename from stable/joplin-server/5.0.15/templates/common.yaml rename to stable/jdownloader2/5.0.6/templates/common.yaml diff --git a/stable/kodi-headless/0.0.6/values.yaml b/stable/jdownloader2/5.0.6/values.yaml similarity index 100% rename from stable/kodi-headless/0.0.6/values.yaml rename to stable/jdownloader2/5.0.6/values.yaml diff --git a/stable/jellyfin/9.0.25/Chart.lock b/stable/jellyfin/9.0.25/Chart.lock deleted file mode 100644 index ab084092648..00000000000 --- a/stable/jellyfin/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:33:56.633796341Z" diff --git a/stable/jellyfin/9.0.25/CHANGELOG.md b/stable/jellyfin/9.0.26/CHANGELOG.md similarity index 90% rename from stable/jellyfin/9.0.25/CHANGELOG.md rename to stable/jellyfin/9.0.26/CHANGELOG.md index d708d69cc15..f4efc8cfe58 100644 --- a/stable/jellyfin/9.0.25/CHANGELOG.md +++ b/stable/jellyfin/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [jellyfin-9.0.26](https://github.com/truecharts/apps/compare/jellyfin-9.0.25...jellyfin-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [jellyfin-9.0.25](https://github.com/truecharts/apps/compare/jellyfin-9.0.24...jellyfin-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [jellyfin-9.0.17](https://github.com/truecharts/apps/compare/jellyfin-9.0.16...jellyfin-9.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [jellyfin-9.0.16](https://github.com/truecharts/apps/compare/jellyfin-9.0.15...jellyfin-9.0.16) (2021-12-04) - diff --git a/stable/komga/4.0.32/CONFIG.md b/stable/jellyfin/9.0.26/CONFIG.md similarity index 100% rename from stable/komga/4.0.32/CONFIG.md rename to stable/jellyfin/9.0.26/CONFIG.md diff --git a/stable/jellyfin/9.0.26/Chart.lock b/stable/jellyfin/9.0.26/Chart.lock new file mode 100644 index 00000000000..216bdfc6fdd --- /dev/null +++ b/stable/jellyfin/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:20:36.553875128Z" diff --git a/stable/jellyfin/9.0.25/Chart.yaml b/stable/jellyfin/9.0.26/Chart.yaml similarity index 97% rename from stable/jellyfin/9.0.25/Chart.yaml rename to stable/jellyfin/9.0.26/Chart.yaml index afc2fc2f599..6d6041cec0b 100644 --- a/stable/jellyfin/9.0.25/Chart.yaml +++ b/stable/jellyfin/9.0.26/Chart.yaml @@ -21,7 +21,7 @@ name: jellyfin sources: - https://github.com/jellyfin/jellyfin type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/jellyfin/9.0.25/README.md b/stable/jellyfin/9.0.26/README.md similarity index 100% rename from stable/jellyfin/9.0.25/README.md rename to stable/jellyfin/9.0.26/README.md diff --git a/stable/jellyfin/9.0.25/app-readme.md b/stable/jellyfin/9.0.26/app-readme.md similarity index 100% rename from stable/jellyfin/9.0.25/app-readme.md rename to stable/jellyfin/9.0.26/app-readme.md diff --git a/stable/komga/4.0.32/charts/common-8.9.24.tgz b/stable/jellyfin/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/komga/4.0.32/charts/common-8.9.24.tgz rename to stable/jellyfin/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/jellyfin/9.0.25/helm-values.md b/stable/jellyfin/9.0.26/helm-values.md similarity index 100% rename from stable/jellyfin/9.0.25/helm-values.md rename to stable/jellyfin/9.0.26/helm-values.md diff --git a/stable/jellyfin/9.0.25/ix_values.yaml b/stable/jellyfin/9.0.26/ix_values.yaml similarity index 100% rename from stable/jellyfin/9.0.25/ix_values.yaml rename to stable/jellyfin/9.0.26/ix_values.yaml diff --git a/stable/jellyfin/9.0.25/questions.yaml b/stable/jellyfin/9.0.26/questions.yaml similarity index 99% rename from stable/jellyfin/9.0.25/questions.yaml rename to stable/jellyfin/9.0.26/questions.yaml index fda70b433ad..e90d6cfd1f9 100644 --- a/stable/jellyfin/9.0.25/questions.yaml +++ b/stable/jellyfin/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8096 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/jellyfin/9.0.25/security.md b/stable/jellyfin/9.0.26/security.md similarity index 100% rename from stable/jellyfin/9.0.25/security.md rename to stable/jellyfin/9.0.26/security.md diff --git a/stable/kanboard/5.0.16/templates/common.yaml b/stable/jellyfin/9.0.26/templates/common.yaml similarity index 100% rename from stable/kanboard/5.0.16/templates/common.yaml rename to stable/jellyfin/9.0.26/templates/common.yaml diff --git a/stable/komga/4.0.32/values.yaml b/stable/jellyfin/9.0.26/values.yaml similarity index 100% rename from stable/komga/4.0.32/values.yaml rename to stable/jellyfin/9.0.26/values.yaml diff --git a/stable/joplin-server/5.0.15/Chart.lock b/stable/joplin-server/5.0.15/Chart.lock deleted file mode 100644 index 01a4393efed..00000000000 --- a/stable/joplin-server/5.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:34:16.630831286Z" diff --git a/stable/joplin-server/5.0.15/CHANGELOG.md b/stable/joplin-server/5.0.16/CHANGELOG.md similarity index 84% rename from stable/joplin-server/5.0.15/CHANGELOG.md rename to stable/joplin-server/5.0.16/CHANGELOG.md index db5b892024c..34cdefd04ab 100644 --- a/stable/joplin-server/5.0.15/CHANGELOG.md +++ b/stable/joplin-server/5.0.16/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [joplin-server-5.0.16](https://github.com/truecharts/apps/compare/joplin-server-5.0.15...joplin-server-5.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [joplin-server-5.0.15](https://github.com/truecharts/apps/compare/joplin-server-5.0.14...joplin-server-5.0.15) (2021-12-19) @@ -85,15 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - -### [joplin-server-5.0.7](https://github.com/truecharts/apps/compare/joplin-server-5.0.6...joplin-server-5.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - diff --git a/stable/lazylibrarian/9.0.32/CONFIG.md b/stable/joplin-server/5.0.16/CONFIG.md similarity index 100% rename from stable/lazylibrarian/9.0.32/CONFIG.md rename to stable/joplin-server/5.0.16/CONFIG.md diff --git a/stable/joplin-server/5.0.16/Chart.lock b/stable/joplin-server/5.0.16/Chart.lock new file mode 100644 index 00000000000..a9ea9109dde --- /dev/null +++ b/stable/joplin-server/5.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:20:40.492310128Z" diff --git a/stable/joplin-server/5.0.15/Chart.yaml b/stable/joplin-server/5.0.16/Chart.yaml similarity index 98% rename from stable/joplin-server/5.0.15/Chart.yaml rename to stable/joplin-server/5.0.16/Chart.yaml index cd576219f5d..ac488298dfb 100644 --- a/stable/joplin-server/5.0.15/Chart.yaml +++ b/stable/joplin-server/5.0.16/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "2.5.1" description: This server allows you to sync any Joplin client name: joplin-server -version: 5.0.15 +version: 5.0.16 kubeVersion: '>=1.16.0-0' keywords: - joplin diff --git a/stable/joplin-server/5.0.15/README.md b/stable/joplin-server/5.0.16/README.md similarity index 100% rename from stable/joplin-server/5.0.15/README.md rename to stable/joplin-server/5.0.16/README.md diff --git a/stable/joplin-server/5.0.15/app-readme.md b/stable/joplin-server/5.0.16/app-readme.md similarity index 100% rename from stable/joplin-server/5.0.15/app-readme.md rename to stable/joplin-server/5.0.16/app-readme.md diff --git a/stable/lazylibrarian/9.0.32/charts/common-8.9.24.tgz b/stable/joplin-server/5.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/lazylibrarian/9.0.32/charts/common-8.9.24.tgz rename to stable/joplin-server/5.0.16/charts/common-8.9.24.tgz diff --git a/stable/mealie/5.0.6/charts/postgresql-6.0.34.tgz b/stable/joplin-server/5.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/mealie/5.0.6/charts/postgresql-6.0.34.tgz rename to stable/joplin-server/5.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/joplin-server/5.0.15/helm-values.md b/stable/joplin-server/5.0.16/helm-values.md similarity index 89% rename from stable/joplin-server/5.0.15/helm-values.md rename to stable/joplin-server/5.0.16/helm-values.md index 07573e27b86..2745ecac8f1 100644 --- a/stable/joplin-server/5.0.15/helm-values.md +++ b/stable/joplin-server/5.0.16/helm-values.md @@ -15,10 +15,6 @@ You will, however, be able to use all values referenced in the common chart here | env.APP_BASE_URL | string | `"https://joplin.domain"` | joplin-server base URL | | env.APP_PORT | int | `22300` | joplin-server listening port (same as Service port) | | env.TZ | string | `"UTC"` | Set the container timezone | -| envTpl.DB_CLIENT | string | `"pg"` | | -| envTpl.POSTGRES_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.POSTGRES_PORT | string | `"5432"` | | -| envTpl.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.POSTGRES_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.POSTGRES_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/joplin-server/5.0.15/ix_values.yaml b/stable/joplin-server/5.0.16/ix_values.yaml similarity index 99% rename from stable/joplin-server/5.0.15/ix_values.yaml rename to stable/joplin-server/5.0.16/ix_values.yaml index 9fc0f1919d1..338e72c32dc 100644 --- a/stable/joplin-server/5.0.15/ix_values.yaml +++ b/stable/joplin-server/5.0.16/ix_values.yaml @@ -23,8 +23,6 @@ env: APP_BASE_URL: https://joplin.domain # -- joplin-server listening port (same as Service port) APP_PORT: 22300 - -envTpl: DB_CLIENT: "pg" POSTGRES_DATABASE: "{{ .Values.postgresql.postgresqlDatabase }}" POSTGRES_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/joplin-server/5.0.15/questions.yaml b/stable/joplin-server/5.0.16/questions.yaml similarity index 99% rename from stable/joplin-server/5.0.15/questions.yaml rename to stable/joplin-server/5.0.16/questions.yaml index a4b34c7a4cc..cb80d8abb55 100644 --- a/stable/joplin-server/5.0.15/questions.yaml +++ b/stable/joplin-server/5.0.16/questions.yaml @@ -200,14 +200,6 @@ questions: schema: type: string default: "" - - variable: APP_PORT - label: "APP_PORT" - description: "Sets the APP_BASE_URL env var" - schema: - type: int - required: true - hidden: true - default: 22300 - variable: envList label: "Image environment" @@ -359,7 +351,6 @@ questions: schema: type: int default: 22300 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/joplin-server/5.0.15/security.md b/stable/joplin-server/5.0.16/security.md similarity index 100% rename from stable/joplin-server/5.0.15/security.md rename to stable/joplin-server/5.0.16/security.md diff --git a/stable/kms/9.0.29/templates/common.yaml b/stable/joplin-server/5.0.16/templates/common.yaml similarity index 100% rename from stable/kms/9.0.29/templates/common.yaml rename to stable/joplin-server/5.0.16/templates/common.yaml diff --git a/stable/lazylibrarian/9.0.32/values.yaml b/stable/joplin-server/5.0.16/values.yaml similarity index 100% rename from stable/lazylibrarian/9.0.32/values.yaml rename to stable/joplin-server/5.0.16/values.yaml diff --git a/stable/kanboard/5.0.16/Chart.lock b/stable/kanboard/5.0.16/Chart.lock deleted file mode 100644 index 3f77fb084c1..00000000000 --- a/stable/kanboard/5.0.16/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:34:17.683473247Z" diff --git a/stable/kanboard/5.0.16/CHANGELOG.md b/stable/kanboard/5.0.17/CHANGELOG.md similarity index 88% rename from stable/kanboard/5.0.16/CHANGELOG.md rename to stable/kanboard/5.0.17/CHANGELOG.md index baa2e43bf99..c3f82bd2088 100644 --- a/stable/kanboard/5.0.16/CHANGELOG.md +++ b/stable/kanboard/5.0.17/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [kanboard-5.0.17](https://github.com/truecharts/apps/compare/kanboard-5.0.16...kanboard-5.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [kanboard-5.0.16](https://github.com/truecharts/apps/compare/kanboard-5.0.15...kanboard-5.0.16) (2021-12-19) @@ -86,14 +97,3 @@ - -### [kanboard-5.0.8](https://github.com/truecharts/apps/compare/kanboard-5.0.7...kanboard-5.0.8) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [kanboard-5.0.7](https://github.com/truecharts/apps/compare/kanboard-5.0.6...kanboard-5.0.7) (2021-12-04) diff --git a/stable/leaf2mqtt/2.0.24/CONFIG.md b/stable/kanboard/5.0.17/CONFIG.md similarity index 100% rename from stable/leaf2mqtt/2.0.24/CONFIG.md rename to stable/kanboard/5.0.17/CONFIG.md diff --git a/stable/gotify/5.0.16/Chart.lock b/stable/kanboard/5.0.17/Chart.lock similarity index 84% rename from stable/gotify/5.0.16/Chart.lock rename to stable/kanboard/5.0.17/Chart.lock index 0b837e0fd32..b674901a95a 100644 --- a/stable/gotify/5.0.16/Chart.lock +++ b/stable/kanboard/5.0.17/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:30:40.81222668Z" +generated: "2021-12-19T23:20:48.64298082Z" diff --git a/stable/kanboard/5.0.16/Chart.yaml b/stable/kanboard/5.0.17/Chart.yaml similarity index 98% rename from stable/kanboard/5.0.16/Chart.yaml rename to stable/kanboard/5.0.17/Chart.yaml index 85d3c605719..fd3946d3aa0 100644 --- a/stable/kanboard/5.0.16/Chart.yaml +++ b/stable/kanboard/5.0.17/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "1.2.21" description: Kanboard is a free and open source Kanban project management software. name: kanboard -version: 5.0.16 +version: 5.0.17 kubeVersion: ">=1.16.0-0" keywords: - kanboard diff --git a/stable/kanboard/5.0.16/README.md b/stable/kanboard/5.0.17/README.md similarity index 100% rename from stable/kanboard/5.0.16/README.md rename to stable/kanboard/5.0.17/README.md diff --git a/stable/kanboard/5.0.16/app-readme.md b/stable/kanboard/5.0.17/app-readme.md similarity index 100% rename from stable/kanboard/5.0.16/app-readme.md rename to stable/kanboard/5.0.17/app-readme.md diff --git a/stable/leaf2mqtt/2.0.24/charts/common-8.9.24.tgz b/stable/kanboard/5.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/leaf2mqtt/2.0.24/charts/common-8.9.24.tgz rename to stable/kanboard/5.0.17/charts/common-8.9.24.tgz diff --git a/stable/miniflux/4.0.16/charts/postgresql-6.0.34.tgz b/stable/kanboard/5.0.17/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/miniflux/4.0.16/charts/postgresql-6.0.34.tgz rename to stable/kanboard/5.0.17/charts/postgresql-6.0.34.tgz diff --git a/stable/kanboard/5.0.16/helm-values.md b/stable/kanboard/5.0.17/helm-values.md similarity index 90% rename from stable/kanboard/5.0.16/helm-values.md rename to stable/kanboard/5.0.17/helm-values.md index 8e7a6c74fbd..289dada4be1 100644 --- a/stable/kanboard/5.0.16/helm-values.md +++ b/stable/kanboard/5.0.17/helm-values.md @@ -15,10 +15,6 @@ You will, however, be able to use all values referenced in the common chart here | env.LOG_DRIVER | string | `"stdout"` | log driver: syslog, stderr, stdout or file | | env.MAIL_CONFIGURATION | bool | `false` | Enable/disable email configuration from the user interface | | env.TZ | string | `"UTC"` | Set the container timezone | -| envTpl.DB_DRIVER | string | `"postgres"` | | -| envTpl.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DB_PORT | string | `"5432"` | | -| envTpl.DB_USERNAME | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DB_HOSTNAME.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DB_HOSTNAME.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/kanboard/5.0.16/ix_values.yaml b/stable/kanboard/5.0.17/ix_values.yaml similarity index 99% rename from stable/kanboard/5.0.16/ix_values.yaml rename to stable/kanboard/5.0.17/ix_values.yaml index 0fdcc017e2b..ac6f19a69ea 100644 --- a/stable/kanboard/5.0.16/ix_values.yaml +++ b/stable/kanboard/5.0.17/ix_values.yaml @@ -24,8 +24,6 @@ env: MAIL_CONFIGURATION: false # -- log driver: syslog, stderr, stdout or file LOG_DRIVER: stdout - -envTpl: DB_DRIVER: "postgres" DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" DB_USERNAME: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/kanboard/5.0.16/questions.yaml b/stable/kanboard/5.0.17/questions.yaml similarity index 99% rename from stable/kanboard/5.0.16/questions.yaml rename to stable/kanboard/5.0.17/questions.yaml index 71bdc8d6d08..d41cb2cd97f 100644 --- a/stable/kanboard/5.0.16/questions.yaml +++ b/stable/kanboard/5.0.17/questions.yaml @@ -356,7 +356,6 @@ questions: schema: type: int default: 10015 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/kanboard/5.0.16/security.md b/stable/kanboard/5.0.17/security.md similarity index 100% rename from stable/kanboard/5.0.16/security.md rename to stable/kanboard/5.0.17/security.md diff --git a/stable/kodi-headless/0.0.6/templates/common.yaml b/stable/kanboard/5.0.17/templates/common.yaml similarity index 100% rename from stable/kodi-headless/0.0.6/templates/common.yaml rename to stable/kanboard/5.0.17/templates/common.yaml diff --git a/stable/leaf2mqtt/2.0.24/values.yaml b/stable/kanboard/5.0.17/values.yaml similarity index 100% rename from stable/leaf2mqtt/2.0.24/values.yaml rename to stable/kanboard/5.0.17/values.yaml diff --git a/stable/kms/9.0.29/Chart.lock b/stable/kms/9.0.29/Chart.lock deleted file mode 100644 index 8e9148ebb62..00000000000 --- a/stable/kms/9.0.29/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:34:30.493823918Z" diff --git a/stable/kms/9.0.29/CHANGELOG.md b/stable/kms/9.0.30/CHANGELOG.md similarity index 89% rename from stable/kms/9.0.29/CHANGELOG.md rename to stable/kms/9.0.30/CHANGELOG.md index c1b06562f7f..fb93bac44d7 100644 --- a/stable/kms/9.0.29/CHANGELOG.md +++ b/stable/kms/9.0.30/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [kms-9.0.30](https://github.com/truecharts/apps/compare/kms-9.0.29...kms-9.0.30) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [kms-9.0.29](https://github.com/truecharts/apps/compare/kms-9.0.28...kms-9.0.29) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [kms-9.0.20](https://github.com/truecharts/apps/compare/kms-9.0.19...kms-9.0.20) (2021-12-05) diff --git a/stable/leantime/1.0.1/CONFIG.md b/stable/kms/9.0.30/CONFIG.md similarity index 100% rename from stable/leantime/1.0.1/CONFIG.md rename to stable/kms/9.0.30/CONFIG.md diff --git a/stable/kms/9.0.30/Chart.lock b/stable/kms/9.0.30/Chart.lock new file mode 100644 index 00000000000..188ac2d47c7 --- /dev/null +++ b/stable/kms/9.0.30/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:20:49.786006869Z" diff --git a/stable/kms/9.0.29/Chart.yaml b/stable/kms/9.0.30/Chart.yaml similarity index 97% rename from stable/kms/9.0.29/Chart.yaml rename to stable/kms/9.0.30/Chart.yaml index 4bab17f52f4..eaa3a26bc9b 100644 --- a/stable/kms/9.0.29/Chart.yaml +++ b/stable/kms/9.0.30/Chart.yaml @@ -19,7 +19,7 @@ name: kms sources: - https://github.com/SystemRage/py-kms type: application -version: 9.0.29 +version: 9.0.30 annotations: truecharts.org/catagories: | - graywares diff --git a/stable/kms/9.0.29/README.md b/stable/kms/9.0.30/README.md similarity index 100% rename from stable/kms/9.0.29/README.md rename to stable/kms/9.0.30/README.md diff --git a/stable/kms/9.0.29/app-readme.md b/stable/kms/9.0.30/app-readme.md similarity index 100% rename from stable/kms/9.0.29/app-readme.md rename to stable/kms/9.0.30/app-readme.md diff --git a/stable/leantime/1.0.1/charts/common-8.9.24.tgz b/stable/kms/9.0.30/charts/common-8.9.24.tgz similarity index 100% rename from stable/leantime/1.0.1/charts/common-8.9.24.tgz rename to stable/kms/9.0.30/charts/common-8.9.24.tgz diff --git a/stable/kms/9.0.29/helm-values.md b/stable/kms/9.0.30/helm-values.md similarity index 100% rename from stable/kms/9.0.29/helm-values.md rename to stable/kms/9.0.30/helm-values.md diff --git a/stable/kms/9.0.29/ix_values.yaml b/stable/kms/9.0.30/ix_values.yaml similarity index 100% rename from stable/kms/9.0.29/ix_values.yaml rename to stable/kms/9.0.30/ix_values.yaml diff --git a/stable/kms/9.0.29/questions.yaml b/stable/kms/9.0.30/questions.yaml similarity index 99% rename from stable/kms/9.0.29/questions.yaml rename to stable/kms/9.0.30/questions.yaml index a4b5ae02e23..5772cfe2e1c 100644 --- a/stable/kms/9.0.29/questions.yaml +++ b/stable/kms/9.0.30/questions.yaml @@ -343,7 +343,6 @@ questions: schema: type: int default: 1688 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/kms/9.0.29/security.md b/stable/kms/9.0.30/security.md similarity index 100% rename from stable/kms/9.0.29/security.md rename to stable/kms/9.0.30/security.md diff --git a/stable/komga/4.0.32/templates/common.yaml b/stable/kms/9.0.30/templates/common.yaml similarity index 100% rename from stable/komga/4.0.32/templates/common.yaml rename to stable/kms/9.0.30/templates/common.yaml diff --git a/stable/leantime/1.0.1/values.yaml b/stable/kms/9.0.30/values.yaml similarity index 100% rename from stable/leantime/1.0.1/values.yaml rename to stable/kms/9.0.30/values.yaml diff --git a/stable/kodi-headless/0.0.6/Chart.lock b/stable/kodi-headless/0.0.6/Chart.lock deleted file mode 100644 index 4ffccb51959..00000000000 --- a/stable/kodi-headless/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:34:35.581615212Z" diff --git a/stable/kodi-headless/0.0.6/CHANGELOG.md b/stable/kodi-headless/0.0.7/CHANGELOG.md similarity index 88% rename from stable/kodi-headless/0.0.6/CHANGELOG.md rename to stable/kodi-headless/0.0.7/CHANGELOG.md index abe0f2775d7..616da5783c8 100644 --- a/stable/kodi-headless/0.0.6/CHANGELOG.md +++ b/stable/kodi-headless/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [kodi-headless-0.0.7](https://github.com/truecharts/apps/compare/kodi-headless-0.0.6...kodi-headless-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [kodi-headless-0.0.6](https://github.com/truecharts/apps/compare/kodi-headless-0.0.5...kodi-headless-0.0.6) (2021-12-19) diff --git a/stable/libreoffice/0.0.5/CONFIG.md b/stable/kodi-headless/0.0.7/CONFIG.md similarity index 100% rename from stable/libreoffice/0.0.5/CONFIG.md rename to stable/kodi-headless/0.0.7/CONFIG.md diff --git a/stable/kodi-headless/0.0.7/Chart.lock b/stable/kodi-headless/0.0.7/Chart.lock new file mode 100644 index 00000000000..84e76794660 --- /dev/null +++ b/stable/kodi-headless/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:21:05.20758583Z" diff --git a/stable/kodi-headless/0.0.6/Chart.yaml b/stable/kodi-headless/0.0.7/Chart.yaml similarity index 98% rename from stable/kodi-headless/0.0.6/Chart.yaml rename to stable/kodi-headless/0.0.7/Chart.yaml index 93bb9a622e3..c4e70367e81 100644 --- a/stable/kodi-headless/0.0.6/Chart.yaml +++ b/stable/kodi-headless/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: kodi-headless -version: 0.0.6 +version: 0.0.7 appVersion: "190" description: A headless install of kodi in a docker container. type: application diff --git a/stable/kodi-headless/0.0.6/README.md b/stable/kodi-headless/0.0.7/README.md similarity index 100% rename from stable/kodi-headless/0.0.6/README.md rename to stable/kodi-headless/0.0.7/README.md diff --git a/stable/kodi-headless/0.0.6/app-readme.md b/stable/kodi-headless/0.0.7/app-readme.md similarity index 100% rename from stable/kodi-headless/0.0.6/app-readme.md rename to stable/kodi-headless/0.0.7/app-readme.md diff --git a/stable/libreoffice/0.0.5/charts/common-8.9.24.tgz b/stable/kodi-headless/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/libreoffice/0.0.5/charts/common-8.9.24.tgz rename to stable/kodi-headless/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/kodi-headless/0.0.6/helm-values.md b/stable/kodi-headless/0.0.7/helm-values.md similarity index 100% rename from stable/kodi-headless/0.0.6/helm-values.md rename to stable/kodi-headless/0.0.7/helm-values.md diff --git a/stable/kodi-headless/0.0.6/ix_values.yaml b/stable/kodi-headless/0.0.7/ix_values.yaml similarity index 100% rename from stable/kodi-headless/0.0.6/ix_values.yaml rename to stable/kodi-headless/0.0.7/ix_values.yaml diff --git a/stable/kodi-headless/0.0.6/questions.yaml b/stable/kodi-headless/0.0.7/questions.yaml similarity index 100% rename from stable/kodi-headless/0.0.6/questions.yaml rename to stable/kodi-headless/0.0.7/questions.yaml diff --git a/stable/kodi-headless/0.0.6/security.md b/stable/kodi-headless/0.0.7/security.md similarity index 100% rename from stable/kodi-headless/0.0.6/security.md rename to stable/kodi-headless/0.0.7/security.md diff --git a/stable/lazylibrarian/9.0.32/templates/common.yaml b/stable/kodi-headless/0.0.7/templates/common.yaml similarity index 100% rename from stable/lazylibrarian/9.0.32/templates/common.yaml rename to stable/kodi-headless/0.0.7/templates/common.yaml diff --git a/stable/libreoffice/0.0.5/values.yaml b/stable/kodi-headless/0.0.7/values.yaml similarity index 100% rename from stable/libreoffice/0.0.5/values.yaml rename to stable/kodi-headless/0.0.7/values.yaml diff --git a/stable/komga/4.0.32/Chart.lock b/stable/komga/4.0.32/Chart.lock deleted file mode 100644 index 8bf39bdcac9..00000000000 --- a/stable/komga/4.0.32/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:12.241062182Z" diff --git a/stable/komga/4.0.32/CHANGELOG.md b/stable/komga/4.0.33/CHANGELOG.md similarity index 77% rename from stable/komga/4.0.32/CHANGELOG.md rename to stable/komga/4.0.33/CHANGELOG.md index f56a8faf45e..de26e887cc2 100644 --- a/stable/komga/4.0.32/CHANGELOG.md +++ b/stable/komga/4.0.33/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [komga-4.0.33](https://github.com/truecharts/apps/compare/komga-4.0.32...komga-4.0.33) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [komga-4.0.32](https://github.com/truecharts/apps/compare/komga-4.0.31...komga-4.0.32) (2021-12-19) @@ -87,13 +97,3 @@ ### komga-4.0.23 (2021-12-05) -#### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) -* update non-major docker tags ([#1429](https://github.com/truecharts/apps/issues/1429)) diff --git a/stable/librespeed/4.0.28/CONFIG.md b/stable/komga/4.0.33/CONFIG.md similarity index 100% rename from stable/librespeed/4.0.28/CONFIG.md rename to stable/komga/4.0.33/CONFIG.md diff --git a/stable/komga/4.0.33/Chart.lock b/stable/komga/4.0.33/Chart.lock new file mode 100644 index 00000000000..e0c5dad7dae --- /dev/null +++ b/stable/komga/4.0.33/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:21:16.729505662Z" diff --git a/stable/komga/4.0.32/Chart.yaml b/stable/komga/4.0.33/Chart.yaml similarity index 97% rename from stable/komga/4.0.32/Chart.yaml rename to stable/komga/4.0.33/Chart.yaml index bfddf2edf48..b26b512e34b 100644 --- a/stable/komga/4.0.32/Chart.yaml +++ b/stable/komga/4.0.33/Chart.yaml @@ -21,7 +21,7 @@ name: komga sources: - https://komga.org/ - https://github.com/gotson/komga -version: 4.0.32 +version: 4.0.33 annotations: truecharts.org/catagories: | - media diff --git a/stable/komga/4.0.32/README.md b/stable/komga/4.0.33/README.md similarity index 100% rename from stable/komga/4.0.32/README.md rename to stable/komga/4.0.33/README.md diff --git a/stable/komga/4.0.32/app-readme.md b/stable/komga/4.0.33/app-readme.md similarity index 100% rename from stable/komga/4.0.32/app-readme.md rename to stable/komga/4.0.33/app-readme.md diff --git a/stable/librespeed/4.0.28/charts/common-8.9.24.tgz b/stable/komga/4.0.33/charts/common-8.9.24.tgz similarity index 100% rename from stable/librespeed/4.0.28/charts/common-8.9.24.tgz rename to stable/komga/4.0.33/charts/common-8.9.24.tgz diff --git a/stable/komga/4.0.32/helm-values.md b/stable/komga/4.0.33/helm-values.md similarity index 100% rename from stable/komga/4.0.32/helm-values.md rename to stable/komga/4.0.33/helm-values.md diff --git a/stable/komga/4.0.32/ix_values.yaml b/stable/komga/4.0.33/ix_values.yaml similarity index 100% rename from stable/komga/4.0.32/ix_values.yaml rename to stable/komga/4.0.33/ix_values.yaml diff --git a/stable/komga/4.0.32/questions.yaml b/stable/komga/4.0.33/questions.yaml similarity index 99% rename from stable/komga/4.0.32/questions.yaml rename to stable/komga/4.0.33/questions.yaml index 206c86bb599..92ddb202a77 100644 --- a/stable/komga/4.0.32/questions.yaml +++ b/stable/komga/4.0.33/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10085 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/komga/4.0.32/security.md b/stable/komga/4.0.33/security.md similarity index 99% rename from stable/komga/4.0.32/security.md rename to stable/komga/4.0.33/security.md index 6e2b1113eb0..899bb5142df 100644 --- a/stable/komga/4.0.32/security.md +++ b/stable/komga/4.0.33/security.md @@ -280,7 +280,7 @@ hide: | org.apache.commons:commons-compress | CVE-2021-35517 | HIGH | 1.20 | 1.21 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/13/3
http://www.openwall.com/lists/oss-security/2021/07/13/5
https://commons.apache.org/proper/commons-compress/security-reports.html
https://github.com/advisories/GHSA-xqfj-vm6h-2x34
https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E
https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E
https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-35517
https://security.netapp.com/advisory/ntap-20211022-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.commons:commons-compress | CVE-2021-36090 | HIGH | 1.20 | 1.21 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/13/4
http://www.openwall.com/lists/oss-security/2021/07/13/6
https://commons.apache.org/proper/commons-compress/security-reports.html
https://github.com/advisories/GHSA-mc84-pj99-q6hh
https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E
https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E
https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E
https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E
https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-36090
https://security.netapp.com/advisory/ntap-20211022-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.14.1 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
http://www.openwall.com/lists/oss-security/2021/12/13/1
http://www.openwall.com/lists/oss-security/2021/12/13/2
http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://issues.apache.org/jira/browse/LOG4J2-3214
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://twitter.com/kurtseifried/status/1469345530182455296
https://ubuntu.com/security/notices/USN-5192-1
https://ubuntu.com/security/notices/USN-5192-2
https://ubuntu.com/security/notices/USN-5197-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell
https://www.debian.org/security/2021/dsa-5020
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.14.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.14.1 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.logging.log4j:log4j-api | CVE-2021-45046 | LOW | 2.14.1 | 2.16.0 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/14/4
http://www.openwall.com/lists/oss-security/2021/12/15/3
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://access.redhat.com/security/cve/CVE-2021-44228
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://github.com/advisories/GHSA-7rjr-3q55-vv33
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://issues.apache.org/jira/browse/LOG4J2-3221
https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5197-1
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.cve.org/CVERecord?id=CVE-2021-45046
https://www.debian.org/security/2021/dsa-5022
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://www.kb.cert.org/vuls/id/930724
https://www.openwall.com/lists/oss-security/2021/12/14/4
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
| | org.apache.pdfbox:pdfbox | CVE-2021-31811 | MEDIUM | 2.0.23 | 2.0.24 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/12/2
https://github.com/advisories/GHSA-fg3j-q579-v8x4
https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E
https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E
https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/
https://nvd.nist.gov/vuln/detail/CVE-2021-31811
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.pdfbox:pdfbox | CVE-2021-31812 | MEDIUM | 2.0.23 | 2.0.24 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/12/1
https://github.com/advisories/GHSA-7grw-6pjh-jpc9
https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E
https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E
https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/
https://nvd.nist.gov/vuln/detail/CVE-2021-31812
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/libreoffice/0.0.5/templates/common.yaml b/stable/komga/4.0.33/templates/common.yaml similarity index 100% rename from stable/libreoffice/0.0.5/templates/common.yaml rename to stable/komga/4.0.33/templates/common.yaml diff --git a/stable/librespeed/4.0.28/values.yaml b/stable/komga/4.0.33/values.yaml similarity index 100% rename from stable/librespeed/4.0.28/values.yaml rename to stable/komga/4.0.33/values.yaml diff --git a/stable/lazylibrarian/9.0.32/Chart.lock b/stable/lazylibrarian/9.0.32/Chart.lock deleted file mode 100644 index 98d0754c6cb..00000000000 --- a/stable/lazylibrarian/9.0.32/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:13.107193886Z" diff --git a/stable/lazylibrarian/9.0.32/CHANGELOG.md b/stable/lazylibrarian/9.0.33/CHANGELOG.md similarity index 82% rename from stable/lazylibrarian/9.0.32/CHANGELOG.md rename to stable/lazylibrarian/9.0.33/CHANGELOG.md index 9be07dcf60c..4bd8f4eda5a 100644 --- a/stable/lazylibrarian/9.0.32/CHANGELOG.md +++ b/stable/lazylibrarian/9.0.33/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [lazylibrarian-9.0.33](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.32...lazylibrarian-9.0.33) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [lazylibrarian-9.0.32](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.31...lazylibrarian-9.0.32) (2021-12-19) @@ -87,13 +97,3 @@ ### lazylibrarian-9.0.23 (2021-12-05) -#### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - diff --git a/stable/lidarr/9.0.26/CONFIG.md b/stable/lazylibrarian/9.0.33/CONFIG.md similarity index 100% rename from stable/lidarr/9.0.26/CONFIG.md rename to stable/lazylibrarian/9.0.33/CONFIG.md diff --git a/stable/lazylibrarian/9.0.33/Chart.lock b/stable/lazylibrarian/9.0.33/Chart.lock new file mode 100644 index 00000000000..cd6ed6998c5 --- /dev/null +++ b/stable/lazylibrarian/9.0.33/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:21:48.274801432Z" diff --git a/stable/lazylibrarian/9.0.32/Chart.yaml b/stable/lazylibrarian/9.0.33/Chart.yaml similarity index 97% rename from stable/lazylibrarian/9.0.32/Chart.yaml rename to stable/lazylibrarian/9.0.33/Chart.yaml index f465738eae4..c1618631ed2 100644 --- a/stable/lazylibrarian/9.0.32/Chart.yaml +++ b/stable/lazylibrarian/9.0.33/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://gitlab.com/LazyLibrarian/LazyLibrarian.git - https://lazylibrarian.gitlab.io type: application -version: 9.0.32 +version: 9.0.33 annotations: truecharts.org/catagories: | - media diff --git a/stable/lazylibrarian/9.0.32/README.md b/stable/lazylibrarian/9.0.33/README.md similarity index 100% rename from stable/lazylibrarian/9.0.32/README.md rename to stable/lazylibrarian/9.0.33/README.md diff --git a/stable/lazylibrarian/9.0.32/app-readme.md b/stable/lazylibrarian/9.0.33/app-readme.md similarity index 100% rename from stable/lazylibrarian/9.0.32/app-readme.md rename to stable/lazylibrarian/9.0.33/app-readme.md diff --git a/stable/lidarr/9.0.26/charts/common-8.9.24.tgz b/stable/lazylibrarian/9.0.33/charts/common-8.9.24.tgz similarity index 100% rename from stable/lidarr/9.0.26/charts/common-8.9.24.tgz rename to stable/lazylibrarian/9.0.33/charts/common-8.9.24.tgz diff --git a/stable/lazylibrarian/9.0.32/helm-values.md b/stable/lazylibrarian/9.0.33/helm-values.md similarity index 100% rename from stable/lazylibrarian/9.0.32/helm-values.md rename to stable/lazylibrarian/9.0.33/helm-values.md diff --git a/stable/lazylibrarian/9.0.32/ix_values.yaml b/stable/lazylibrarian/9.0.33/ix_values.yaml similarity index 100% rename from stable/lazylibrarian/9.0.32/ix_values.yaml rename to stable/lazylibrarian/9.0.33/ix_values.yaml diff --git a/stable/lazylibrarian/9.0.32/questions.yaml b/stable/lazylibrarian/9.0.33/questions.yaml similarity index 99% rename from stable/lazylibrarian/9.0.32/questions.yaml rename to stable/lazylibrarian/9.0.33/questions.yaml index e4cc7955c97..2d3e9e9ff01 100644 --- a/stable/lazylibrarian/9.0.32/questions.yaml +++ b/stable/lazylibrarian/9.0.33/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 5299 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/lazylibrarian/9.0.32/security.md b/stable/lazylibrarian/9.0.33/security.md similarity index 100% rename from stable/lazylibrarian/9.0.32/security.md rename to stable/lazylibrarian/9.0.33/security.md diff --git a/stable/librespeed/4.0.28/templates/common.yaml b/stable/lazylibrarian/9.0.33/templates/common.yaml similarity index 100% rename from stable/librespeed/4.0.28/templates/common.yaml rename to stable/lazylibrarian/9.0.33/templates/common.yaml diff --git a/stable/lidarr/9.0.26/values.yaml b/stable/lazylibrarian/9.0.33/values.yaml similarity index 100% rename from stable/lidarr/9.0.26/values.yaml rename to stable/lazylibrarian/9.0.33/values.yaml diff --git a/stable/leaf2mqtt/2.0.24/Chart.lock b/stable/leaf2mqtt/2.0.24/Chart.lock deleted file mode 100644 index de9e46cc216..00000000000 --- a/stable/leaf2mqtt/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:23.128343116Z" diff --git a/stable/leaf2mqtt/2.0.24/CHANGELOG.md b/stable/leaf2mqtt/2.0.25/CHANGELOG.md similarity index 93% rename from stable/leaf2mqtt/2.0.24/CHANGELOG.md rename to stable/leaf2mqtt/2.0.25/CHANGELOG.md index ea586b50bd9..b093afe90be 100644 --- a/stable/leaf2mqtt/2.0.24/CHANGELOG.md +++ b/stable/leaf2mqtt/2.0.25/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [leaf2mqtt-2.0.25](https://github.com/truecharts/apps/compare/leaf2mqtt-2.0.24...leaf2mqtt-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [leaf2mqtt-2.0.24](https://github.com/truecharts/apps/compare/leaf2mqtt-2.0.23...leaf2mqtt-2.0.24) (2021-12-19) @@ -88,12 +97,3 @@ - -### [leaf2mqtt-2.0.16](https://github.com/truecharts/apps/compare/leaf2mqtt-2.0.15...leaf2mqtt-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - diff --git a/stable/littlelink/4.0.38/CONFIG.md b/stable/leaf2mqtt/2.0.25/CONFIG.md similarity index 100% rename from stable/littlelink/4.0.38/CONFIG.md rename to stable/leaf2mqtt/2.0.25/CONFIG.md diff --git a/stable/leaf2mqtt/2.0.25/Chart.lock b/stable/leaf2mqtt/2.0.25/Chart.lock new file mode 100644 index 00000000000..d12eb31629c --- /dev/null +++ b/stable/leaf2mqtt/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:21:50.760587864Z" diff --git a/stable/leaf2mqtt/2.0.24/Chart.yaml b/stable/leaf2mqtt/2.0.25/Chart.yaml similarity index 97% rename from stable/leaf2mqtt/2.0.24/Chart.yaml rename to stable/leaf2mqtt/2.0.25/Chart.yaml index afe60360776..6b409fce5f5 100644 --- a/stable/leaf2mqtt/2.0.24/Chart.yaml +++ b/stable/leaf2mqtt/2.0.25/Chart.yaml @@ -22,7 +22,7 @@ name: leaf2mqtt sources: - https://github.com/mitsumaui/leaf2mqtt - https://github.com/k8s-at-home/container-images -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/leaf2mqtt/2.0.24/README.md b/stable/leaf2mqtt/2.0.25/README.md similarity index 100% rename from stable/leaf2mqtt/2.0.24/README.md rename to stable/leaf2mqtt/2.0.25/README.md diff --git a/stable/leaf2mqtt/2.0.24/app-readme.md b/stable/leaf2mqtt/2.0.25/app-readme.md similarity index 100% rename from stable/leaf2mqtt/2.0.24/app-readme.md rename to stable/leaf2mqtt/2.0.25/app-readme.md diff --git a/stable/littlelink/4.0.38/charts/common-8.9.24.tgz b/stable/leaf2mqtt/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/littlelink/4.0.38/charts/common-8.9.24.tgz rename to stable/leaf2mqtt/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/leaf2mqtt/2.0.24/helm-values.md b/stable/leaf2mqtt/2.0.25/helm-values.md similarity index 100% rename from stable/leaf2mqtt/2.0.24/helm-values.md rename to stable/leaf2mqtt/2.0.25/helm-values.md diff --git a/stable/leaf2mqtt/2.0.24/ix_values.yaml b/stable/leaf2mqtt/2.0.25/ix_values.yaml similarity index 100% rename from stable/leaf2mqtt/2.0.24/ix_values.yaml rename to stable/leaf2mqtt/2.0.25/ix_values.yaml diff --git a/stable/leaf2mqtt/2.0.24/questions.yaml b/stable/leaf2mqtt/2.0.25/questions.yaml similarity index 100% rename from stable/leaf2mqtt/2.0.24/questions.yaml rename to stable/leaf2mqtt/2.0.25/questions.yaml diff --git a/stable/leaf2mqtt/2.0.24/security.md b/stable/leaf2mqtt/2.0.25/security.md similarity index 100% rename from stable/leaf2mqtt/2.0.24/security.md rename to stable/leaf2mqtt/2.0.25/security.md diff --git a/stable/leaf2mqtt/2.0.24/templates/common.yaml b/stable/leaf2mqtt/2.0.25/templates/common.yaml similarity index 100% rename from stable/leaf2mqtt/2.0.24/templates/common.yaml rename to stable/leaf2mqtt/2.0.25/templates/common.yaml diff --git a/stable/littlelink/4.0.38/values.yaml b/stable/leaf2mqtt/2.0.25/values.yaml similarity index 100% rename from stable/littlelink/4.0.38/values.yaml rename to stable/leaf2mqtt/2.0.25/values.yaml diff --git a/stable/leantime/1.0.1/Chart.lock b/stable/leantime/1.0.1/Chart.lock deleted file mode 100644 index 2586466d02b..00000000000 --- a/stable/leantime/1.0.1/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:35:29.495263747Z" diff --git a/stable/leantime/1.0.1/CHANGELOG.md b/stable/leantime/1.0.2/CHANGELOG.md similarity index 92% rename from stable/leantime/1.0.1/CHANGELOG.md rename to stable/leantime/1.0.2/CHANGELOG.md index 2e9b6aa87e3..8c00db0a381 100644 --- a/stable/leantime/1.0.1/CHANGELOG.md +++ b/stable/leantime/1.0.2/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [leantime-1.0.2](https://github.com/truecharts/apps/compare/leantime-1.0.1...leantime-1.0.2) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [leantime-1.0.1](https://github.com/truecharts/apps/compare/leantime-1.0.0...leantime-1.0.1) (2021-12-19) @@ -88,12 +97,3 @@ ### [leantime-0.0.6](https://github.com/truecharts/apps/compare/leantime-0.0.5...leantime-0.0.6) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [leantime-0.0.5](https://github.com/truecharts/apps/compare/leantime-0.0.4...leantime-0.0.5) (2021-12-04) - diff --git a/stable/logitech-media-server/2.0.35/CONFIG.md b/stable/leantime/1.0.2/CONFIG.md similarity index 100% rename from stable/logitech-media-server/2.0.35/CONFIG.md rename to stable/leantime/1.0.2/CONFIG.md diff --git a/stable/leantime/1.0.2/Chart.lock b/stable/leantime/1.0.2/Chart.lock new file mode 100644 index 00000000000..0add37d1735 --- /dev/null +++ b/stable/leantime/1.0.2/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:22:03.161132428Z" diff --git a/stable/leantime/1.0.1/Chart.yaml b/stable/leantime/1.0.2/Chart.yaml similarity index 98% rename from stable/leantime/1.0.1/Chart.yaml rename to stable/leantime/1.0.2/Chart.yaml index 39c7d81e581..e9950514621 100644 --- a/stable/leantime/1.0.1/Chart.yaml +++ b/stable/leantime/1.0.2/Chart.yaml @@ -24,7 +24,7 @@ name: leantime sources: - https://leantime.io/ - https://hub.docker.com/r/nicholaswilde/leantime -version: 1.0.1 +version: 1.0.2 annotations: truecharts.org/catagories: | - management diff --git a/stable/leantime/1.0.1/README.md b/stable/leantime/1.0.2/README.md similarity index 100% rename from stable/leantime/1.0.1/README.md rename to stable/leantime/1.0.2/README.md diff --git a/stable/leantime/1.0.1/app-readme.md b/stable/leantime/1.0.2/app-readme.md similarity index 100% rename from stable/leantime/1.0.1/app-readme.md rename to stable/leantime/1.0.2/app-readme.md diff --git a/stable/logitech-media-server/2.0.35/charts/common-8.9.24.tgz b/stable/leantime/1.0.2/charts/common-8.9.24.tgz similarity index 100% rename from stable/logitech-media-server/2.0.35/charts/common-8.9.24.tgz rename to stable/leantime/1.0.2/charts/common-8.9.24.tgz diff --git a/stable/leantime/1.0.1/charts/mariadb-1.0.37.tgz b/stable/leantime/1.0.2/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/leantime/1.0.1/charts/mariadb-1.0.37.tgz rename to stable/leantime/1.0.2/charts/mariadb-1.0.37.tgz diff --git a/stable/leantime/1.0.1/helm-values.md b/stable/leantime/1.0.2/helm-values.md similarity index 100% rename from stable/leantime/1.0.1/helm-values.md rename to stable/leantime/1.0.2/helm-values.md diff --git a/stable/leantime/1.0.1/ix_values.yaml b/stable/leantime/1.0.2/ix_values.yaml similarity index 100% rename from stable/leantime/1.0.1/ix_values.yaml rename to stable/leantime/1.0.2/ix_values.yaml diff --git a/stable/leantime/1.0.1/questions.yaml b/stable/leantime/1.0.2/questions.yaml similarity index 100% rename from stable/leantime/1.0.1/questions.yaml rename to stable/leantime/1.0.2/questions.yaml diff --git a/stable/leantime/1.0.1/security.md b/stable/leantime/1.0.2/security.md similarity index 100% rename from stable/leantime/1.0.1/security.md rename to stable/leantime/1.0.2/security.md diff --git a/stable/leantime/1.0.1/templates/_secrets.tpl b/stable/leantime/1.0.2/templates/_secrets.tpl similarity index 100% rename from stable/leantime/1.0.1/templates/_secrets.tpl rename to stable/leantime/1.0.2/templates/_secrets.tpl diff --git a/stable/leantime/1.0.1/templates/common.yaml b/stable/leantime/1.0.2/templates/common.yaml similarity index 100% rename from stable/leantime/1.0.1/templates/common.yaml rename to stable/leantime/1.0.2/templates/common.yaml diff --git a/stable/logitech-media-server/2.0.35/values.yaml b/stable/leantime/1.0.2/values.yaml similarity index 100% rename from stable/logitech-media-server/2.0.35/values.yaml rename to stable/leantime/1.0.2/values.yaml diff --git a/stable/libreoffice/0.0.5/Chart.lock b/stable/libreoffice/0.0.5/Chart.lock deleted file mode 100644 index a135f2b6ae8..00000000000 --- a/stable/libreoffice/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:38.712772075Z" diff --git a/stable/libreoffice/0.0.5/CHANGELOG.md b/stable/libreoffice/0.0.6/CHANGELOG.md similarity index 86% rename from stable/libreoffice/0.0.5/CHANGELOG.md rename to stable/libreoffice/0.0.6/CHANGELOG.md index 842f24be14b..99589d86675 100644 --- a/stable/libreoffice/0.0.5/CHANGELOG.md +++ b/stable/libreoffice/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [libreoffice-0.0.6](https://github.com/truecharts/apps/compare/libreoffice-0.0.5...libreoffice-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [libreoffice-0.0.5](https://github.com/truecharts/apps/compare/libreoffice-0.0.4...libreoffice-0.0.5) (2021-12-19) diff --git a/stable/loki/2.0.12/CONFIG.md b/stable/libreoffice/0.0.6/CONFIG.md similarity index 100% rename from stable/loki/2.0.12/CONFIG.md rename to stable/libreoffice/0.0.6/CONFIG.md diff --git a/stable/libreoffice/0.0.6/Chart.lock b/stable/libreoffice/0.0.6/Chart.lock new file mode 100644 index 00000000000..e3834c79aae --- /dev/null +++ b/stable/libreoffice/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:22:11.537587285Z" diff --git a/stable/libreoffice/0.0.5/Chart.yaml b/stable/libreoffice/0.0.6/Chart.yaml similarity index 98% rename from stable/libreoffice/0.0.5/Chart.yaml rename to stable/libreoffice/0.0.6/Chart.yaml index e366c7eca69..bd38b0500ec 100644 --- a/stable/libreoffice/0.0.5/Chart.yaml +++ b/stable/libreoffice/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: libreoffice -version: 0.0.5 +version: 0.0.6 appVersion: "6.4.6" description: LibreOffice is a free and powerful office suite, and a successor to OpenOffice.org. type: application diff --git a/stable/libreoffice/0.0.5/README.md b/stable/libreoffice/0.0.6/README.md similarity index 100% rename from stable/libreoffice/0.0.5/README.md rename to stable/libreoffice/0.0.6/README.md diff --git a/stable/libreoffice/0.0.5/app-readme.md b/stable/libreoffice/0.0.6/app-readme.md similarity index 100% rename from stable/libreoffice/0.0.5/app-readme.md rename to stable/libreoffice/0.0.6/app-readme.md diff --git a/stable/loki/2.0.12/charts/common-8.9.24.tgz b/stable/libreoffice/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/loki/2.0.12/charts/common-8.9.24.tgz rename to stable/libreoffice/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/libreoffice/0.0.5/helm-values.md b/stable/libreoffice/0.0.6/helm-values.md similarity index 100% rename from stable/libreoffice/0.0.5/helm-values.md rename to stable/libreoffice/0.0.6/helm-values.md diff --git a/stable/libreoffice/0.0.5/ix_values.yaml b/stable/libreoffice/0.0.6/ix_values.yaml similarity index 100% rename from stable/libreoffice/0.0.5/ix_values.yaml rename to stable/libreoffice/0.0.6/ix_values.yaml diff --git a/stable/libreoffice/0.0.5/questions.yaml b/stable/libreoffice/0.0.6/questions.yaml similarity index 100% rename from stable/libreoffice/0.0.5/questions.yaml rename to stable/libreoffice/0.0.6/questions.yaml diff --git a/stable/libreoffice/0.0.5/security.md b/stable/libreoffice/0.0.6/security.md similarity index 100% rename from stable/libreoffice/0.0.5/security.md rename to stable/libreoffice/0.0.6/security.md diff --git a/stable/lidarr/9.0.26/templates/common.yaml b/stable/libreoffice/0.0.6/templates/common.yaml similarity index 100% rename from stable/lidarr/9.0.26/templates/common.yaml rename to stable/libreoffice/0.0.6/templates/common.yaml diff --git a/stable/loki/2.0.12/values.yaml b/stable/libreoffice/0.0.6/values.yaml similarity index 100% rename from stable/loki/2.0.12/values.yaml rename to stable/libreoffice/0.0.6/values.yaml diff --git a/stable/librespeed/4.0.28/Chart.lock b/stable/librespeed/4.0.28/Chart.lock deleted file mode 100644 index 9e83183e6c9..00000000000 --- a/stable/librespeed/4.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:45.941916955Z" diff --git a/stable/librespeed/4.0.28/CHANGELOG.md b/stable/librespeed/4.0.29/CHANGELOG.md similarity index 90% rename from stable/librespeed/4.0.28/CHANGELOG.md rename to stable/librespeed/4.0.29/CHANGELOG.md index 8b8c7a00a91..8bba6acdaf5 100644 --- a/stable/librespeed/4.0.28/CHANGELOG.md +++ b/stable/librespeed/4.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [librespeed-4.0.29](https://github.com/truecharts/apps/compare/librespeed-4.0.28...librespeed-4.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [librespeed-4.0.28](https://github.com/truecharts/apps/compare/librespeed-4.0.27...librespeed-4.0.28) (2021-12-19) @@ -87,13 +97,3 @@ - -### [librespeed-4.0.20](https://github.com/truecharts/apps/compare/librespeed-4.0.19...librespeed-4.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - diff --git a/stable/lychee/9.0.25/CONFIG.md b/stable/librespeed/4.0.29/CONFIG.md similarity index 100% rename from stable/lychee/9.0.25/CONFIG.md rename to stable/librespeed/4.0.29/CONFIG.md diff --git a/stable/librespeed/4.0.29/Chart.lock b/stable/librespeed/4.0.29/Chart.lock new file mode 100644 index 00000000000..e57aa1dadf4 --- /dev/null +++ b/stable/librespeed/4.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:22:17.83062605Z" diff --git a/stable/librespeed/4.0.28/Chart.yaml b/stable/librespeed/4.0.29/Chart.yaml similarity index 98% rename from stable/librespeed/4.0.28/Chart.yaml rename to stable/librespeed/4.0.29/Chart.yaml index afa7ff44f4b..fe686ffce90 100644 --- a/stable/librespeed/4.0.28/Chart.yaml +++ b/stable/librespeed/4.0.29/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/librespeed/speedtest - https://hub.docker.com/r/linuxserver/librespeed - https://github.com/truechartsapps/tree/master/charts/librespeed -version: 4.0.28 +version: 4.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/librespeed/4.0.28/README.md b/stable/librespeed/4.0.29/README.md similarity index 100% rename from stable/librespeed/4.0.28/README.md rename to stable/librespeed/4.0.29/README.md diff --git a/stable/librespeed/4.0.28/app-readme.md b/stable/librespeed/4.0.29/app-readme.md similarity index 100% rename from stable/librespeed/4.0.28/app-readme.md rename to stable/librespeed/4.0.29/app-readme.md diff --git a/stable/lychee/9.0.25/charts/common-8.9.24.tgz b/stable/librespeed/4.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/lychee/9.0.25/charts/common-8.9.24.tgz rename to stable/librespeed/4.0.29/charts/common-8.9.24.tgz diff --git a/stable/librespeed/4.0.28/ci/ct-values.yaml b/stable/librespeed/4.0.29/ci/ct-values.yaml similarity index 100% rename from stable/librespeed/4.0.28/ci/ct-values.yaml rename to stable/librespeed/4.0.29/ci/ct-values.yaml diff --git a/stable/librespeed/4.0.28/helm-values.md b/stable/librespeed/4.0.29/helm-values.md similarity index 100% rename from stable/librespeed/4.0.28/helm-values.md rename to stable/librespeed/4.0.29/helm-values.md diff --git a/stable/librespeed/4.0.28/ix_values.yaml b/stable/librespeed/4.0.29/ix_values.yaml similarity index 100% rename from stable/librespeed/4.0.28/ix_values.yaml rename to stable/librespeed/4.0.29/ix_values.yaml diff --git a/stable/librespeed/4.0.28/questions.yaml b/stable/librespeed/4.0.29/questions.yaml similarity index 99% rename from stable/librespeed/4.0.28/questions.yaml rename to stable/librespeed/4.0.29/questions.yaml index cd40509dc07..26b71729264 100644 --- a/stable/librespeed/4.0.28/questions.yaml +++ b/stable/librespeed/4.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10016 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/librespeed/4.0.28/security.md b/stable/librespeed/4.0.29/security.md similarity index 100% rename from stable/librespeed/4.0.28/security.md rename to stable/librespeed/4.0.29/security.md diff --git a/stable/logitech-media-server/2.0.35/templates/common.yaml b/stable/librespeed/4.0.29/templates/common.yaml similarity index 100% rename from stable/logitech-media-server/2.0.35/templates/common.yaml rename to stable/librespeed/4.0.29/templates/common.yaml diff --git a/stable/lychee/9.0.25/values.yaml b/stable/librespeed/4.0.29/values.yaml similarity index 100% rename from stable/lychee/9.0.25/values.yaml rename to stable/librespeed/4.0.29/values.yaml diff --git a/stable/lidarr/9.0.26/Chart.lock b/stable/lidarr/9.0.26/Chart.lock deleted file mode 100644 index 552c623dc81..00000000000 --- a/stable/lidarr/9.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:35:56.951286368Z" diff --git a/stable/lidarr/9.0.26/CHANGELOG.md b/stable/lidarr/9.0.27/CHANGELOG.md similarity index 89% rename from stable/lidarr/9.0.26/CHANGELOG.md rename to stable/lidarr/9.0.27/CHANGELOG.md index 6037bc5dd6d..ebaeb08bfbd 100644 --- a/stable/lidarr/9.0.26/CHANGELOG.md +++ b/stable/lidarr/9.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [lidarr-9.0.27](https://github.com/truecharts/apps/compare/lidarr-9.0.26...lidarr-9.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [lidarr-9.0.26](https://github.com/truecharts/apps/compare/lidarr-9.0.25...lidarr-9.0.26) (2021-12-19) @@ -87,13 +97,3 @@ -### [lidarr-9.0.18](https://github.com/truecharts/apps/compare/lidarr-9.0.17...lidarr-9.0.18) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [lidarr-9.0.17](https://github.com/truecharts/apps/compare/lidarr-9.0.16...lidarr-9.0.17) (2021-12-05) diff --git a/stable/mealie/5.0.6/CONFIG.md b/stable/lidarr/9.0.27/CONFIG.md similarity index 100% rename from stable/mealie/5.0.6/CONFIG.md rename to stable/lidarr/9.0.27/CONFIG.md diff --git a/stable/lidarr/9.0.27/Chart.lock b/stable/lidarr/9.0.27/Chart.lock new file mode 100644 index 00000000000..649bb915bfb --- /dev/null +++ b/stable/lidarr/9.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:22:27.570675347Z" diff --git a/stable/lidarr/9.0.26/Chart.yaml b/stable/lidarr/9.0.27/Chart.yaml similarity index 97% rename from stable/lidarr/9.0.26/Chart.yaml rename to stable/lidarr/9.0.27/Chart.yaml index c36002e49b9..3b78cdcddc2 100644 --- a/stable/lidarr/9.0.26/Chart.yaml +++ b/stable/lidarr/9.0.27/Chart.yaml @@ -21,7 +21,7 @@ name: lidarr sources: - https://github.com/Lidarr/Lidarr type: application -version: 9.0.26 +version: 9.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/lidarr/9.0.26/README.md b/stable/lidarr/9.0.27/README.md similarity index 100% rename from stable/lidarr/9.0.26/README.md rename to stable/lidarr/9.0.27/README.md diff --git a/stable/lidarr/9.0.26/app-readme.md b/stable/lidarr/9.0.27/app-readme.md similarity index 100% rename from stable/lidarr/9.0.26/app-readme.md rename to stable/lidarr/9.0.27/app-readme.md diff --git a/stable/mealie/5.0.6/charts/common-8.9.24.tgz b/stable/lidarr/9.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/mealie/5.0.6/charts/common-8.9.24.tgz rename to stable/lidarr/9.0.27/charts/common-8.9.24.tgz diff --git a/stable/lidarr/9.0.26/helm-values.md b/stable/lidarr/9.0.27/helm-values.md similarity index 100% rename from stable/lidarr/9.0.26/helm-values.md rename to stable/lidarr/9.0.27/helm-values.md diff --git a/stable/lidarr/9.0.26/ix_values.yaml b/stable/lidarr/9.0.27/ix_values.yaml similarity index 100% rename from stable/lidarr/9.0.26/ix_values.yaml rename to stable/lidarr/9.0.27/ix_values.yaml diff --git a/stable/lidarr/9.0.26/questions.yaml b/stable/lidarr/9.0.27/questions.yaml similarity index 99% rename from stable/lidarr/9.0.26/questions.yaml rename to stable/lidarr/9.0.27/questions.yaml index c1c4fb6ac1b..8d704fefc1f 100644 --- a/stable/lidarr/9.0.26/questions.yaml +++ b/stable/lidarr/9.0.27/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8686 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/lidarr/9.0.26/security.md b/stable/lidarr/9.0.27/security.md similarity index 100% rename from stable/lidarr/9.0.26/security.md rename to stable/lidarr/9.0.27/security.md diff --git a/stable/loki/2.0.12/templates/common.yaml b/stable/lidarr/9.0.27/templates/common.yaml similarity index 100% rename from stable/loki/2.0.12/templates/common.yaml rename to stable/lidarr/9.0.27/templates/common.yaml diff --git a/stable/mealie/5.0.6/values.yaml b/stable/lidarr/9.0.27/values.yaml similarity index 100% rename from stable/mealie/5.0.6/values.yaml rename to stable/lidarr/9.0.27/values.yaml diff --git a/stable/littlelink/4.0.38/Chart.lock b/stable/littlelink/4.0.38/Chart.lock deleted file mode 100644 index a18dd005aa2..00000000000 --- a/stable/littlelink/4.0.38/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:36:05.222303541Z" diff --git a/stable/littlelink/4.0.38/CHANGELOG.md b/stable/littlelink/4.0.39/CHANGELOG.md similarity index 89% rename from stable/littlelink/4.0.38/CHANGELOG.md rename to stable/littlelink/4.0.39/CHANGELOG.md index c482ed83670..5af239687c7 100644 --- a/stable/littlelink/4.0.38/CHANGELOG.md +++ b/stable/littlelink/4.0.39/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [littlelink-4.0.39](https://github.com/truecharts/apps/compare/littlelink-4.0.38...littlelink-4.0.39) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [littlelink-4.0.38](https://github.com/truecharts/apps/compare/littlelink-4.0.37...littlelink-4.0.38) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) - - -### [littlelink-4.0.29](https://github.com/truecharts/apps/compare/littlelink-4.0.28...littlelink-4.0.29) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - diff --git a/stable/medusa/1.0.28/CONFIG.md b/stable/littlelink/4.0.39/CONFIG.md similarity index 100% rename from stable/medusa/1.0.28/CONFIG.md rename to stable/littlelink/4.0.39/CONFIG.md diff --git a/stable/littlelink/4.0.39/Chart.lock b/stable/littlelink/4.0.39/Chart.lock new file mode 100644 index 00000000000..a52af0822a3 --- /dev/null +++ b/stable/littlelink/4.0.39/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:22:42.298546161Z" diff --git a/stable/littlelink/4.0.38/Chart.yaml b/stable/littlelink/4.0.39/Chart.yaml similarity index 97% rename from stable/littlelink/4.0.38/Chart.yaml rename to stable/littlelink/4.0.39/Chart.yaml index 012d64c9947..e902a507343 100644 --- a/stable/littlelink/4.0.38/Chart.yaml +++ b/stable/littlelink/4.0.39/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/techno-tim/littlelink-server - https://github.com/sethcottle/littlelink type: application -version: 4.0.38 +version: 4.0.39 annotations: truecharts.org/catagories: | - social diff --git a/stable/littlelink/4.0.38/README.md b/stable/littlelink/4.0.39/README.md similarity index 100% rename from stable/littlelink/4.0.38/README.md rename to stable/littlelink/4.0.39/README.md diff --git a/stable/littlelink/4.0.38/app-readme.md b/stable/littlelink/4.0.39/app-readme.md similarity index 100% rename from stable/littlelink/4.0.38/app-readme.md rename to stable/littlelink/4.0.39/app-readme.md diff --git a/stable/medusa/1.0.28/charts/common-8.9.24.tgz b/stable/littlelink/4.0.39/charts/common-8.9.24.tgz similarity index 100% rename from stable/medusa/1.0.28/charts/common-8.9.24.tgz rename to stable/littlelink/4.0.39/charts/common-8.9.24.tgz diff --git a/stable/littlelink/4.0.38/helm-values.md b/stable/littlelink/4.0.39/helm-values.md similarity index 100% rename from stable/littlelink/4.0.38/helm-values.md rename to stable/littlelink/4.0.39/helm-values.md diff --git a/stable/littlelink/4.0.38/ix_values.yaml b/stable/littlelink/4.0.39/ix_values.yaml similarity index 100% rename from stable/littlelink/4.0.38/ix_values.yaml rename to stable/littlelink/4.0.39/ix_values.yaml diff --git a/stable/littlelink/4.0.38/questions.yaml b/stable/littlelink/4.0.39/questions.yaml similarity index 99% rename from stable/littlelink/4.0.38/questions.yaml rename to stable/littlelink/4.0.39/questions.yaml index bb3f9c30ec1..9572f86f019 100644 --- a/stable/littlelink/4.0.38/questions.yaml +++ b/stable/littlelink/4.0.39/questions.yaml @@ -666,7 +666,6 @@ questions: schema: type: int default: 10040 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/littlelink/4.0.38/security.md b/stable/littlelink/4.0.39/security.md similarity index 100% rename from stable/littlelink/4.0.38/security.md rename to stable/littlelink/4.0.39/security.md diff --git a/stable/littlelink/4.0.38/templates/_configmap.tpl b/stable/littlelink/4.0.39/templates/_configmap.tpl similarity index 100% rename from stable/littlelink/4.0.38/templates/_configmap.tpl rename to stable/littlelink/4.0.39/templates/_configmap.tpl diff --git a/stable/littlelink/4.0.38/templates/common.yaml b/stable/littlelink/4.0.39/templates/common.yaml similarity index 100% rename from stable/littlelink/4.0.38/templates/common.yaml rename to stable/littlelink/4.0.39/templates/common.yaml diff --git a/stable/medusa/1.0.28/values.yaml b/stable/littlelink/4.0.39/values.yaml similarity index 100% rename from stable/medusa/1.0.28/values.yaml rename to stable/littlelink/4.0.39/values.yaml diff --git a/stable/logitech-media-server/2.0.35/Chart.lock b/stable/logitech-media-server/2.0.35/Chart.lock deleted file mode 100644 index 5b7fc772f16..00000000000 --- a/stable/logitech-media-server/2.0.35/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:36:28.040344425Z" diff --git a/stable/logitech-media-server/2.0.35/CHANGELOG.md b/stable/logitech-media-server/2.0.36/CHANGELOG.md similarity index 83% rename from stable/logitech-media-server/2.0.35/CHANGELOG.md rename to stable/logitech-media-server/2.0.36/CHANGELOG.md index 826038b00a3..f8856cb0af7 100644 --- a/stable/logitech-media-server/2.0.35/CHANGELOG.md +++ b/stable/logitech-media-server/2.0.36/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [logitech-media-server-2.0.36](https://github.com/truecharts/apps/compare/logitech-media-server-2.0.35...logitech-media-server-2.0.36) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [logitech-media-server-2.0.35](https://github.com/truecharts/apps/compare/logitech-media-server-2.0.34...logitech-media-server-2.0.35) (2021-12-19) @@ -85,15 +97,3 @@ * ensure container references are prefixed with v * move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) * update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - diff --git a/stable/minetest/0.0.5/CONFIG.md b/stable/logitech-media-server/2.0.36/CONFIG.md similarity index 100% rename from stable/minetest/0.0.5/CONFIG.md rename to stable/logitech-media-server/2.0.36/CONFIG.md diff --git a/stable/logitech-media-server/2.0.36/Chart.lock b/stable/logitech-media-server/2.0.36/Chart.lock new file mode 100644 index 00000000000..ed2be57176a --- /dev/null +++ b/stable/logitech-media-server/2.0.36/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:22:55.266334793Z" diff --git a/stable/logitech-media-server/2.0.35/Chart.yaml b/stable/logitech-media-server/2.0.36/Chart.yaml similarity index 98% rename from stable/logitech-media-server/2.0.35/Chart.yaml rename to stable/logitech-media-server/2.0.36/Chart.yaml index fc46e319570..d96e568e000 100644 --- a/stable/logitech-media-server/2.0.35/Chart.yaml +++ b/stable/logitech-media-server/2.0.36/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/Logitech/slimserver - https://hub.docker.com/r/lmscommunity/logitechmediaserver type: application -version: 2.0.35 +version: 2.0.36 annotations: truecharts.org/catagories: | - media diff --git a/stable/logitech-media-server/2.0.35/README.md b/stable/logitech-media-server/2.0.36/README.md similarity index 100% rename from stable/logitech-media-server/2.0.35/README.md rename to stable/logitech-media-server/2.0.36/README.md diff --git a/stable/logitech-media-server/2.0.35/app-readme.md b/stable/logitech-media-server/2.0.36/app-readme.md similarity index 100% rename from stable/logitech-media-server/2.0.35/app-readme.md rename to stable/logitech-media-server/2.0.36/app-readme.md diff --git a/stable/minetest/0.0.5/charts/common-8.9.24.tgz b/stable/logitech-media-server/2.0.36/charts/common-8.9.24.tgz similarity index 100% rename from stable/minetest/0.0.5/charts/common-8.9.24.tgz rename to stable/logitech-media-server/2.0.36/charts/common-8.9.24.tgz diff --git a/stable/logitech-media-server/2.0.35/helm-values.md b/stable/logitech-media-server/2.0.36/helm-values.md similarity index 96% rename from stable/logitech-media-server/2.0.35/helm-values.md rename to stable/logitech-media-server/2.0.36/helm-values.md index a4c55712d18..de06c4cf508 100644 --- a/stable/logitech-media-server/2.0.35/helm-values.md +++ b/stable/logitech-media-server/2.0.36/helm-values.md @@ -11,8 +11,8 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| +| env.HTTP_PORT | string | `"{{ .Values.service.main.ports.main.port }}"` | | | env.PUID | int | `568` | | -| envTpl.HTTP_PORT | string | `"{{ .Values.service.main.ports.main.port }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/logitechmediaserver"` | | | image.tag | string | `"v8.3.0@sha256:85e5f84e99eb4db408361425c76e36f9d9b5f07b91d3c451be43cc3e0cb6d783"` | | diff --git a/stable/logitech-media-server/2.0.35/ix_values.yaml b/stable/logitech-media-server/2.0.36/ix_values.yaml similarity index 99% rename from stable/logitech-media-server/2.0.35/ix_values.yaml rename to stable/logitech-media-server/2.0.36/ix_values.yaml index c5040567fa8..f42f1f9622f 100644 --- a/stable/logitech-media-server/2.0.35/ix_values.yaml +++ b/stable/logitech-media-server/2.0.36/ix_values.yaml @@ -5,13 +5,11 @@ image: env: # Permissions Settings PUID: 568 - -envTpl: + HTTP_PORT: "{{ .Values.service.main.ports.main.port }}" # Port to host the web service on. This will be the internal container port exposed and needs to be the same as the public service port. # The main http port always has to be a 1:1 mapping between external and internal port. # You can't just map it like -p 9002:9000, as Logitech Media Server is telling players on which port to connect. # Therefore if you have to use a different http port for LMS (other than 9000) you'll have to set the HTTP_PORT environment variable - HTTP_PORT: "{{ .Values.service.main.ports.main.port }}" securityContext: readOnlyRootFilesystem: false diff --git a/stable/logitech-media-server/2.0.35/questions.yaml b/stable/logitech-media-server/2.0.36/questions.yaml similarity index 98% rename from stable/logitech-media-server/2.0.35/questions.yaml rename to stable/logitech-media-server/2.0.36/questions.yaml index 51cbc33be18..9dad17ffc10 100644 --- a/stable/logitech-media-server/2.0.35/questions.yaml +++ b/stable/logitech-media-server/2.0.36/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 7000 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -443,12 +442,6 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: protocol label: "Port Type" schema: @@ -469,7 +462,6 @@ questions: schema: type: int default: 10059 - editable: true required: true - variable: playertcp @@ -528,12 +520,6 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: protocol label: "Port Type" schema: @@ -554,7 +540,6 @@ questions: schema: type: int default: 3483 - editable: true required: true - variable: playerudp @@ -613,12 +598,6 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: protocol label: "Port Type" schema: @@ -639,7 +618,6 @@ questions: schema: type: int default: 3483 - editable: true required: true diff --git a/stable/logitech-media-server/2.0.35/security.md b/stable/logitech-media-server/2.0.36/security.md similarity index 100% rename from stable/logitech-media-server/2.0.35/security.md rename to stable/logitech-media-server/2.0.36/security.md diff --git a/stable/lychee/9.0.25/templates/common.yaml b/stable/logitech-media-server/2.0.36/templates/common.yaml similarity index 100% rename from stable/lychee/9.0.25/templates/common.yaml rename to stable/logitech-media-server/2.0.36/templates/common.yaml diff --git a/stable/minetest/0.0.5/values.yaml b/stable/logitech-media-server/2.0.36/values.yaml similarity index 100% rename from stable/minetest/0.0.5/values.yaml rename to stable/logitech-media-server/2.0.36/values.yaml diff --git a/stable/loki/2.0.12/CHANGELOG.md b/stable/loki/2.0.13/CHANGELOG.md similarity index 94% rename from stable/loki/2.0.12/CHANGELOG.md rename to stable/loki/2.0.13/CHANGELOG.md index 8394940fc49..3b510eafbbf 100644 --- a/stable/loki/2.0.12/CHANGELOG.md +++ b/stable/loki/2.0.13/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [loki-2.0.13](https://github.com/truecharts/apps/compare/loki-2.0.12...loki-2.0.13) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [loki-2.0.12](https://github.com/truecharts/apps/compare/loki-2.0.11...loki-2.0.12) (2021-12-19) @@ -88,12 +97,3 @@ -### [loki-2.0.4](https://github.com/truecharts/apps/compare/loki-2.0.3...loki-2.0.4) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - diff --git a/stable/miniflux/4.0.16/CONFIG.md b/stable/loki/2.0.13/CONFIG.md similarity index 100% rename from stable/miniflux/4.0.16/CONFIG.md rename to stable/loki/2.0.13/CONFIG.md diff --git a/stable/loki/2.0.12/Chart.lock b/stable/loki/2.0.13/Chart.lock similarity index 84% rename from stable/loki/2.0.12/Chart.lock rename to stable/loki/2.0.13/Chart.lock index ba591ae5567..126131f474f 100644 --- a/stable/loki/2.0.12/Chart.lock +++ b/stable/loki/2.0.13/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org version: 1.0.15 digest: sha256:7ebdef71e1d8778c749a2ef1a290f9310301021bc9fd9dbee023d957e2eb14fd -generated: "2021-12-19T18:36:30.382597862Z" +generated: "2021-12-19T23:23:06.288097663Z" diff --git a/stable/loki/2.0.12/Chart.yaml b/stable/loki/2.0.13/Chart.yaml similarity index 97% rename from stable/loki/2.0.12/Chart.yaml rename to stable/loki/2.0.13/Chart.yaml index 9ac586be082..0b8d49cb98c 100644 --- a/stable/loki/2.0.12/Chart.yaml +++ b/stable/loki/2.0.13/Chart.yaml @@ -23,7 +23,7 @@ name: loki sources: - https://github.com/grafana/loki type: application -version: 2.0.12 +version: 2.0.13 annotations: truecharts.org/catagories: | - logs diff --git a/stable/loki/2.0.12/README.md b/stable/loki/2.0.13/README.md similarity index 100% rename from stable/loki/2.0.12/README.md rename to stable/loki/2.0.13/README.md diff --git a/stable/loki/2.0.12/app-readme.md b/stable/loki/2.0.13/app-readme.md similarity index 100% rename from stable/loki/2.0.12/app-readme.md rename to stable/loki/2.0.13/app-readme.md diff --git a/stable/miniflux/4.0.16/charts/common-8.9.24.tgz b/stable/loki/2.0.13/charts/common-8.9.24.tgz similarity index 100% rename from stable/miniflux/4.0.16/charts/common-8.9.24.tgz rename to stable/loki/2.0.13/charts/common-8.9.24.tgz diff --git a/stable/loki/2.0.12/charts/promtail-1.0.15.tgz b/stable/loki/2.0.13/charts/promtail-1.0.15.tgz similarity index 100% rename from stable/loki/2.0.12/charts/promtail-1.0.15.tgz rename to stable/loki/2.0.13/charts/promtail-1.0.15.tgz diff --git a/stable/loki/2.0.12/helm-values.md b/stable/loki/2.0.13/helm-values.md similarity index 100% rename from stable/loki/2.0.12/helm-values.md rename to stable/loki/2.0.13/helm-values.md diff --git a/stable/loki/2.0.12/ix_values.yaml b/stable/loki/2.0.13/ix_values.yaml similarity index 100% rename from stable/loki/2.0.12/ix_values.yaml rename to stable/loki/2.0.13/ix_values.yaml diff --git a/stable/loki/2.0.12/questions.yaml b/stable/loki/2.0.13/questions.yaml similarity index 100% rename from stable/loki/2.0.12/questions.yaml rename to stable/loki/2.0.13/questions.yaml diff --git a/stable/loki/2.0.12/security.md b/stable/loki/2.0.13/security.md similarity index 100% rename from stable/loki/2.0.12/security.md rename to stable/loki/2.0.13/security.md diff --git a/stable/loki/2.0.12/templates/_helpers.tpl b/stable/loki/2.0.13/templates/_helpers.tpl similarity index 100% rename from stable/loki/2.0.12/templates/_helpers.tpl rename to stable/loki/2.0.13/templates/_helpers.tpl diff --git a/stable/mealie/5.0.6/templates/common.yaml b/stable/loki/2.0.13/templates/common.yaml similarity index 100% rename from stable/mealie/5.0.6/templates/common.yaml rename to stable/loki/2.0.13/templates/common.yaml diff --git a/stable/loki/2.0.12/templates/configmap-alert.yaml b/stable/loki/2.0.13/templates/configmap-alert.yaml similarity index 100% rename from stable/loki/2.0.12/templates/configmap-alert.yaml rename to stable/loki/2.0.13/templates/configmap-alert.yaml diff --git a/stable/loki/2.0.12/templates/secret.yaml b/stable/loki/2.0.13/templates/secret.yaml similarity index 100% rename from stable/loki/2.0.12/templates/secret.yaml rename to stable/loki/2.0.13/templates/secret.yaml diff --git a/stable/miniflux/4.0.16/values.yaml b/stable/loki/2.0.13/values.yaml similarity index 100% rename from stable/miniflux/4.0.16/values.yaml rename to stable/loki/2.0.13/values.yaml diff --git a/stable/lychee/9.0.25/Chart.lock b/stable/lychee/9.0.25/Chart.lock deleted file mode 100644 index 3ee62cba99d..00000000000 --- a/stable/lychee/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:36:36.690912552Z" diff --git a/stable/lychee/9.0.25/CHANGELOG.md b/stable/lychee/9.0.26/CHANGELOG.md similarity index 90% rename from stable/lychee/9.0.25/CHANGELOG.md rename to stable/lychee/9.0.26/CHANGELOG.md index 629cb5f8ceb..aaf697249f2 100644 --- a/stable/lychee/9.0.25/CHANGELOG.md +++ b/stable/lychee/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [lychee-9.0.26](https://github.com/truecharts/apps/compare/lychee-9.0.25...lychee-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [lychee-9.0.25](https://github.com/truecharts/apps/compare/lychee-9.0.24...lychee-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [lychee-9.0.17](https://github.com/truecharts/apps/compare/lychee-9.0.16...lychee-9.0.17) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [lychee-9.0.16](https://github.com/truecharts/apps/compare/lychee-9.0.15...lychee-9.0.16) (2021-12-04) - -#### Chore diff --git a/stable/minio-console/1.0.29/CONFIG.md b/stable/lychee/9.0.26/CONFIG.md similarity index 100% rename from stable/minio-console/1.0.29/CONFIG.md rename to stable/lychee/9.0.26/CONFIG.md diff --git a/stable/lychee/9.0.26/Chart.lock b/stable/lychee/9.0.26/Chart.lock new file mode 100644 index 00000000000..734c396b093 --- /dev/null +++ b/stable/lychee/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:23:08.952754412Z" diff --git a/stable/lychee/9.0.25/Chart.yaml b/stable/lychee/9.0.26/Chart.yaml similarity index 97% rename from stable/lychee/9.0.25/Chart.yaml rename to stable/lychee/9.0.26/Chart.yaml index 74b84bb35f9..d8ac2ebb0c7 100644 --- a/stable/lychee/9.0.25/Chart.yaml +++ b/stable/lychee/9.0.26/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/LycheeOrg/Lychee - https://hub.docker.com/r/lycheeorg/lychee type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/lychee/9.0.25/README.md b/stable/lychee/9.0.26/README.md similarity index 100% rename from stable/lychee/9.0.25/README.md rename to stable/lychee/9.0.26/README.md diff --git a/stable/lychee/9.0.25/app-readme.md b/stable/lychee/9.0.26/app-readme.md similarity index 100% rename from stable/lychee/9.0.25/app-readme.md rename to stable/lychee/9.0.26/app-readme.md diff --git a/stable/minio-console/1.0.29/charts/common-8.9.24.tgz b/stable/lychee/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/minio-console/1.0.29/charts/common-8.9.24.tgz rename to stable/lychee/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/lychee/9.0.25/helm-values.md b/stable/lychee/9.0.26/helm-values.md similarity index 100% rename from stable/lychee/9.0.25/helm-values.md rename to stable/lychee/9.0.26/helm-values.md diff --git a/stable/lychee/9.0.25/ix_values.yaml b/stable/lychee/9.0.26/ix_values.yaml similarity index 100% rename from stable/lychee/9.0.25/ix_values.yaml rename to stable/lychee/9.0.26/ix_values.yaml diff --git a/stable/lychee/9.0.25/questions.yaml b/stable/lychee/9.0.26/questions.yaml similarity index 99% rename from stable/lychee/9.0.25/questions.yaml rename to stable/lychee/9.0.26/questions.yaml index 25d76806fb1..9c3fa562c1f 100644 --- a/stable/lychee/9.0.25/questions.yaml +++ b/stable/lychee/9.0.26/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10017 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/lychee/9.0.25/security.md b/stable/lychee/9.0.26/security.md similarity index 100% rename from stable/lychee/9.0.25/security.md rename to stable/lychee/9.0.26/security.md diff --git a/stable/minetest/0.0.5/templates/common.yaml b/stable/lychee/9.0.26/templates/common.yaml similarity index 100% rename from stable/minetest/0.0.5/templates/common.yaml rename to stable/lychee/9.0.26/templates/common.yaml diff --git a/stable/minio-console/1.0.29/values.yaml b/stable/lychee/9.0.26/values.yaml similarity index 100% rename from stable/minio-console/1.0.29/values.yaml rename to stable/lychee/9.0.26/values.yaml diff --git a/stable/mealie/5.0.6/Chart.lock b/stable/mealie/5.0.6/Chart.lock deleted file mode 100644 index 211a8a0f1f8..00000000000 --- a/stable/mealie/5.0.6/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:36:44.908706394Z" diff --git a/stable/mealie/5.0.6/CHANGELOG.md b/stable/mealie/5.0.7/CHANGELOG.md similarity index 87% rename from stable/mealie/5.0.6/CHANGELOG.md rename to stable/mealie/5.0.7/CHANGELOG.md index 2401d0cdf05..48c2d697fe7 100644 --- a/stable/mealie/5.0.6/CHANGELOG.md +++ b/stable/mealie/5.0.7/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [mealie-5.0.7](https://github.com/truecharts/apps/compare/mealie-5.0.6...mealie-5.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [mealie-5.0.6](https://github.com/truecharts/apps/compare/mealie-5.0.5...mealie-5.0.6) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [mealie-4.0.18](https://github.com/truecharts/apps/compare/mealie-4.0.17...mealie-4.0.18) (2021-12-05) - diff --git a/stable/minio/1.0.12/CONFIG.md b/stable/mealie/5.0.7/CONFIG.md similarity index 100% rename from stable/minio/1.0.12/CONFIG.md rename to stable/mealie/5.0.7/CONFIG.md diff --git a/stable/mealie/5.0.7/Chart.lock b/stable/mealie/5.0.7/Chart.lock new file mode 100644 index 00000000000..38fdd8dc79d --- /dev/null +++ b/stable/mealie/5.0.7/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:23:11.895949477Z" diff --git a/stable/mealie/5.0.6/Chart.yaml b/stable/mealie/5.0.7/Chart.yaml similarity index 98% rename from stable/mealie/5.0.6/Chart.yaml rename to stable/mealie/5.0.7/Chart.yaml index 6af995d4a75..2312c80aadc 100644 --- a/stable/mealie/5.0.6/Chart.yaml +++ b/stable/mealie/5.0.7/Chart.yaml @@ -21,7 +21,7 @@ maintainers: name: mealie sources: - https://github.com/hay-kot/mealie -version: 5.0.6 +version: 5.0.7 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/mealie/5.0.6/README.md b/stable/mealie/5.0.7/README.md similarity index 100% rename from stable/mealie/5.0.6/README.md rename to stable/mealie/5.0.7/README.md diff --git a/stable/mealie/5.0.6/app-readme.md b/stable/mealie/5.0.7/app-readme.md similarity index 100% rename from stable/mealie/5.0.6/app-readme.md rename to stable/mealie/5.0.7/app-readme.md diff --git a/stable/minio/1.0.12/charts/common-8.9.24.tgz b/stable/mealie/5.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/minio/1.0.12/charts/common-8.9.24.tgz rename to stable/mealie/5.0.7/charts/common-8.9.24.tgz diff --git a/stable/odoo/4.0.15/charts/postgresql-6.0.34.tgz b/stable/mealie/5.0.7/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/odoo/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/mealie/5.0.7/charts/postgresql-6.0.34.tgz diff --git a/stable/mealie/5.0.6/helm-values.md b/stable/mealie/5.0.7/helm-values.md similarity index 91% rename from stable/mealie/5.0.6/helm-values.md rename to stable/mealie/5.0.7/helm-values.md index e0d112d3e00..500673d46bc 100644 --- a/stable/mealie/5.0.6/helm-values.md +++ b/stable/mealie/5.0.7/helm-values.md @@ -13,9 +13,6 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | env | object | See below | environment variables. See [image docs](https://hay-kot.github.io/mealie/getting-started/install/#env-variables) for more details. | | env.TZ | string | `"UTC"` | Set the container timezone | -| envTpl.DB_TYPE | string | `"postgres"` | | -| envTpl.POSTGRES_DB | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | | envValueFrom.POSTGRES_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.POSTGRES_SERVER.secretKeyRef.key | string | `"plainporthost"` | | diff --git a/stable/mealie/5.0.6/ix_values.yaml b/stable/mealie/5.0.7/ix_values.yaml similarity index 99% rename from stable/mealie/5.0.6/ix_values.yaml rename to stable/mealie/5.0.7/ix_values.yaml index 92c16bf096b..7d58c10a963 100644 --- a/stable/mealie/5.0.6/ix_values.yaml +++ b/stable/mealie/5.0.7/ix_values.yaml @@ -19,8 +19,6 @@ podSecurityContext: env: # -- Set the container timezone TZ: UTC - -envTpl: DB_TYPE: postgres POSTGRES_DB: "{{ .Values.postgresql.postgresqlDatabase }}" POSTGRES_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/mealie/5.0.6/questions.yaml b/stable/mealie/5.0.7/questions.yaml similarity index 99% rename from stable/mealie/5.0.6/questions.yaml rename to stable/mealie/5.0.7/questions.yaml index 6de38f13e6e..0e3c44947c4 100644 --- a/stable/mealie/5.0.6/questions.yaml +++ b/stable/mealie/5.0.7/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10018 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/mealie/5.0.6/security.md b/stable/mealie/5.0.7/security.md similarity index 100% rename from stable/mealie/5.0.6/security.md rename to stable/mealie/5.0.7/security.md diff --git a/stable/miniflux/4.0.16/templates/common.yaml b/stable/mealie/5.0.7/templates/common.yaml similarity index 100% rename from stable/miniflux/4.0.16/templates/common.yaml rename to stable/mealie/5.0.7/templates/common.yaml diff --git a/stable/minio/1.0.12/values.yaml b/stable/mealie/5.0.7/values.yaml similarity index 100% rename from stable/minio/1.0.12/values.yaml rename to stable/mealie/5.0.7/values.yaml diff --git a/stable/medusa/1.0.28/Chart.lock b/stable/medusa/1.0.28/Chart.lock deleted file mode 100644 index 9c64760b7a1..00000000000 --- a/stable/medusa/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:36:50.5762301Z" diff --git a/stable/medusa/1.0.28/CHANGELOG.md b/stable/medusa/1.0.29/CHANGELOG.md similarity index 90% rename from stable/medusa/1.0.28/CHANGELOG.md rename to stable/medusa/1.0.29/CHANGELOG.md index 0b2fee7fca7..b1b780fd014 100644 --- a/stable/medusa/1.0.28/CHANGELOG.md +++ b/stable/medusa/1.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [medusa-1.0.29](https://github.com/truecharts/apps/compare/medusa-1.0.28...medusa-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [medusa-1.0.28](https://github.com/truecharts/apps/compare/medusa-1.0.27...medusa-1.0.28) (2021-12-19) @@ -87,13 +97,3 @@ - -### [medusa-1.0.20](https://github.com/truecharts/apps/compare/medusa-1.0.19...medusa-1.0.20) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - diff --git a/stable/minisatip/0.0.6/CONFIG.md b/stable/medusa/1.0.29/CONFIG.md similarity index 100% rename from stable/minisatip/0.0.6/CONFIG.md rename to stable/medusa/1.0.29/CONFIG.md diff --git a/stable/medusa/1.0.29/Chart.lock b/stable/medusa/1.0.29/Chart.lock new file mode 100644 index 00000000000..93a0ca28137 --- /dev/null +++ b/stable/medusa/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:23:20.651046505Z" diff --git a/stable/medusa/1.0.28/Chart.yaml b/stable/medusa/1.0.29/Chart.yaml similarity index 97% rename from stable/medusa/1.0.28/Chart.yaml rename to stable/medusa/1.0.29/Chart.yaml index fc298dca1d0..3617e4cc14a 100644 --- a/stable/medusa/1.0.28/Chart.yaml +++ b/stable/medusa/1.0.29/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/linuxserver/docker-medusa - https://pymedusa.com/ type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/medusa/1.0.28/README.md b/stable/medusa/1.0.29/README.md similarity index 100% rename from stable/medusa/1.0.28/README.md rename to stable/medusa/1.0.29/README.md diff --git a/stable/medusa/1.0.28/app-readme.md b/stable/medusa/1.0.29/app-readme.md similarity index 100% rename from stable/medusa/1.0.28/app-readme.md rename to stable/medusa/1.0.29/app-readme.md diff --git a/stable/minisatip/0.0.6/charts/common-8.9.24.tgz b/stable/medusa/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/minisatip/0.0.6/charts/common-8.9.24.tgz rename to stable/medusa/1.0.29/charts/common-8.9.24.tgz diff --git a/stable/medusa/1.0.28/helm-values.md b/stable/medusa/1.0.29/helm-values.md similarity index 100% rename from stable/medusa/1.0.28/helm-values.md rename to stable/medusa/1.0.29/helm-values.md diff --git a/stable/medusa/1.0.28/ix_values.yaml b/stable/medusa/1.0.29/ix_values.yaml similarity index 100% rename from stable/medusa/1.0.28/ix_values.yaml rename to stable/medusa/1.0.29/ix_values.yaml diff --git a/stable/medusa/1.0.28/questions.yaml b/stable/medusa/1.0.29/questions.yaml similarity index 99% rename from stable/medusa/1.0.28/questions.yaml rename to stable/medusa/1.0.29/questions.yaml index ef6a65ce563..a002f82b85e 100644 --- a/stable/medusa/1.0.28/questions.yaml +++ b/stable/medusa/1.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10068 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/medusa/1.0.28/security.md b/stable/medusa/1.0.29/security.md similarity index 100% rename from stable/medusa/1.0.28/security.md rename to stable/medusa/1.0.29/security.md diff --git a/stable/medusa/1.0.28/templates/common.yaml b/stable/medusa/1.0.29/templates/common.yaml similarity index 100% rename from stable/medusa/1.0.28/templates/common.yaml rename to stable/medusa/1.0.29/templates/common.yaml diff --git a/stable/minisatip/0.0.6/values.yaml b/stable/medusa/1.0.29/values.yaml similarity index 100% rename from stable/minisatip/0.0.6/values.yaml rename to stable/medusa/1.0.29/values.yaml diff --git a/stable/minetest/0.0.5/Chart.lock b/stable/minetest/0.0.5/Chart.lock deleted file mode 100644 index 56d48bc76b4..00000000000 --- a/stable/minetest/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:37:09.686991124Z" diff --git a/stable/minetest/0.0.5/CHANGELOG.md b/stable/minetest/0.0.6/CHANGELOG.md similarity index 86% rename from stable/minetest/0.0.5/CHANGELOG.md rename to stable/minetest/0.0.6/CHANGELOG.md index 0251bede634..d4702d0d3a0 100644 --- a/stable/minetest/0.0.5/CHANGELOG.md +++ b/stable/minetest/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [minetest-0.0.6](https://github.com/truecharts/apps/compare/minetest-0.0.5...minetest-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [minetest-0.0.5](https://github.com/truecharts/apps/compare/minetest-0.0.4...minetest-0.0.5) (2021-12-19) diff --git a/stable/monica/0.0.16/CONFIG.md b/stable/minetest/0.0.6/CONFIG.md similarity index 100% rename from stable/monica/0.0.16/CONFIG.md rename to stable/minetest/0.0.6/CONFIG.md diff --git a/stable/minetest/0.0.6/Chart.lock b/stable/minetest/0.0.6/Chart.lock new file mode 100644 index 00000000000..249d6ec763a --- /dev/null +++ b/stable/minetest/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:23:43.845238321Z" diff --git a/stable/minetest/0.0.5/Chart.yaml b/stable/minetest/0.0.6/Chart.yaml similarity index 98% rename from stable/minetest/0.0.5/Chart.yaml rename to stable/minetest/0.0.6/Chart.yaml index b58f024fa7b..4129333771a 100644 --- a/stable/minetest/0.0.5/Chart.yaml +++ b/stable/minetest/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: minetest -version: 0.0.5 +version: 0.0.6 appVersion: "5.4.1" description: Minetest (server) is a near-infinite-world block sandbox game and a game engine. type: application diff --git a/stable/minetest/0.0.5/README.md b/stable/minetest/0.0.6/README.md similarity index 100% rename from stable/minetest/0.0.5/README.md rename to stable/minetest/0.0.6/README.md diff --git a/stable/minetest/0.0.5/app-readme.md b/stable/minetest/0.0.6/app-readme.md similarity index 100% rename from stable/minetest/0.0.5/app-readme.md rename to stable/minetest/0.0.6/app-readme.md diff --git a/stable/monica/0.0.16/charts/common-8.9.24.tgz b/stable/minetest/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/monica/0.0.16/charts/common-8.9.24.tgz rename to stable/minetest/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/minetest/0.0.5/helm-values.md b/stable/minetest/0.0.6/helm-values.md similarity index 100% rename from stable/minetest/0.0.5/helm-values.md rename to stable/minetest/0.0.6/helm-values.md diff --git a/stable/minetest/0.0.5/ix_values.yaml b/stable/minetest/0.0.6/ix_values.yaml similarity index 100% rename from stable/minetest/0.0.5/ix_values.yaml rename to stable/minetest/0.0.6/ix_values.yaml diff --git a/stable/minetest/0.0.5/questions.yaml b/stable/minetest/0.0.6/questions.yaml similarity index 100% rename from stable/minetest/0.0.5/questions.yaml rename to stable/minetest/0.0.6/questions.yaml diff --git a/stable/minetest/0.0.5/security.md b/stable/minetest/0.0.6/security.md similarity index 100% rename from stable/minetest/0.0.5/security.md rename to stable/minetest/0.0.6/security.md diff --git a/stable/minio-console/1.0.29/templates/common.yaml b/stable/minetest/0.0.6/templates/common.yaml similarity index 100% rename from stable/minio-console/1.0.29/templates/common.yaml rename to stable/minetest/0.0.6/templates/common.yaml diff --git a/stable/monica/0.0.16/values.yaml b/stable/minetest/0.0.6/values.yaml similarity index 100% rename from stable/monica/0.0.16/values.yaml rename to stable/minetest/0.0.6/values.yaml diff --git a/stable/miniflux/4.0.16/Chart.lock b/stable/miniflux/4.0.16/Chart.lock deleted file mode 100644 index 967014e8e1f..00000000000 --- a/stable/miniflux/4.0.16/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:37:14.865088978Z" diff --git a/stable/miniflux/4.0.16/CHANGELOG.md b/stable/miniflux/4.0.17/CHANGELOG.md similarity index 89% rename from stable/miniflux/4.0.16/CHANGELOG.md rename to stable/miniflux/4.0.17/CHANGELOG.md index 4dd8aa612b1..0b139f907e0 100644 --- a/stable/miniflux/4.0.16/CHANGELOG.md +++ b/stable/miniflux/4.0.17/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [miniflux-4.0.17](https://github.com/truecharts/apps/compare/miniflux-4.0.16...miniflux-4.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [miniflux-4.0.16](https://github.com/truecharts/apps/compare/miniflux-4.0.15...miniflux-4.0.16) (2021-12-19) @@ -87,13 +97,3 @@ -### [miniflux-4.0.8](https://github.com/truecharts/apps/compare/miniflux-4.0.7...miniflux-4.0.8) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [miniflux-4.0.7](https://github.com/truecharts/apps/compare/miniflux-4.0.6...miniflux-4.0.7) (2021-12-04) diff --git a/stable/mosquitto/4.0.26/CONFIG.md b/stable/miniflux/4.0.17/CONFIG.md similarity index 100% rename from stable/mosquitto/4.0.26/CONFIG.md rename to stable/miniflux/4.0.17/CONFIG.md diff --git a/stable/miniflux/4.0.17/Chart.lock b/stable/miniflux/4.0.17/Chart.lock new file mode 100644 index 00000000000..07bfdfcaf95 --- /dev/null +++ b/stable/miniflux/4.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:23:46.216792627Z" diff --git a/stable/miniflux/4.0.16/Chart.yaml b/stable/miniflux/4.0.17/Chart.yaml similarity index 97% rename from stable/miniflux/4.0.16/Chart.yaml rename to stable/miniflux/4.0.17/Chart.yaml index 884962aad33..5a8353485fb 100644 --- a/stable/miniflux/4.0.16/Chart.yaml +++ b/stable/miniflux/4.0.17/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "2.0.34" description: Miniflux is a minimalist and opinionated feed reader. name: miniflux -version: 4.0.16 +version: 4.0.17 kubeVersion: ">=1.16.0-0" keywords: - miniflux diff --git a/stable/miniflux/4.0.16/README.md b/stable/miniflux/4.0.17/README.md similarity index 100% rename from stable/miniflux/4.0.16/README.md rename to stable/miniflux/4.0.17/README.md diff --git a/stable/miniflux/4.0.16/app-readme.md b/stable/miniflux/4.0.17/app-readme.md similarity index 100% rename from stable/miniflux/4.0.16/app-readme.md rename to stable/miniflux/4.0.17/app-readme.md diff --git a/stable/mosquitto/4.0.26/charts/common-8.9.24.tgz b/stable/miniflux/4.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/mosquitto/4.0.26/charts/common-8.9.24.tgz rename to stable/miniflux/4.0.17/charts/common-8.9.24.tgz diff --git a/stable/openkm/4.0.15/charts/postgresql-6.0.34.tgz b/stable/miniflux/4.0.17/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/openkm/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/miniflux/4.0.17/charts/postgresql-6.0.34.tgz diff --git a/stable/miniflux/4.0.16/helm-values.md b/stable/miniflux/4.0.17/helm-values.md similarity index 100% rename from stable/miniflux/4.0.16/helm-values.md rename to stable/miniflux/4.0.17/helm-values.md diff --git a/stable/miniflux/4.0.16/ix_values.yaml b/stable/miniflux/4.0.17/ix_values.yaml similarity index 100% rename from stable/miniflux/4.0.16/ix_values.yaml rename to stable/miniflux/4.0.17/ix_values.yaml diff --git a/stable/miniflux/4.0.16/questions.yaml b/stable/miniflux/4.0.17/questions.yaml similarity index 99% rename from stable/miniflux/4.0.16/questions.yaml rename to stable/miniflux/4.0.17/questions.yaml index d1d156a6329..c4305c7b42e 100644 --- a/stable/miniflux/4.0.16/questions.yaml +++ b/stable/miniflux/4.0.17/questions.yaml @@ -374,7 +374,6 @@ questions: schema: type: int default: 10091 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/miniflux/4.0.16/security.md b/stable/miniflux/4.0.17/security.md similarity index 100% rename from stable/miniflux/4.0.16/security.md rename to stable/miniflux/4.0.17/security.md diff --git a/stable/minio/1.0.12/templates/common.yaml b/stable/miniflux/4.0.17/templates/common.yaml similarity index 100% rename from stable/minio/1.0.12/templates/common.yaml rename to stable/miniflux/4.0.17/templates/common.yaml diff --git a/stable/mosquitto/4.0.26/values.yaml b/stable/miniflux/4.0.17/values.yaml similarity index 100% rename from stable/mosquitto/4.0.26/values.yaml rename to stable/miniflux/4.0.17/values.yaml diff --git a/stable/minio-console/1.0.29/Chart.lock b/stable/minio-console/1.0.29/Chart.lock deleted file mode 100644 index 6f4f2d5bc40..00000000000 --- a/stable/minio-console/1.0.29/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:37:27.787032419Z" diff --git a/stable/minio-console/1.0.29/CHANGELOG.md b/stable/minio-console/1.0.30/CHANGELOG.md similarity index 90% rename from stable/minio-console/1.0.29/CHANGELOG.md rename to stable/minio-console/1.0.30/CHANGELOG.md index a012fb9a09b..8c5ec2f26aa 100644 --- a/stable/minio-console/1.0.29/CHANGELOG.md +++ b/stable/minio-console/1.0.30/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [minio-console-1.0.30](https://github.com/truecharts/apps/compare/minio-console-1.0.29...minio-console-1.0.30) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [minio-console-1.0.29](https://github.com/truecharts/apps/compare/minio-console-1.0.28...minio-console-1.0.29) (2021-12-19) @@ -87,13 +97,3 @@ ### [minio-console-1.0.21](https://github.com/truecharts/apps/compare/minio-console-1.0.20...minio-console-1.0.21) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [minio-console-1.0.20](https://github.com/truecharts/apps/compare/minio-console-1.0.19...minio-console-1.0.20) (2021-12-05) - diff --git a/stable/mstream/1.0.24/CONFIG.md b/stable/minio-console/1.0.30/CONFIG.md similarity index 100% rename from stable/mstream/1.0.24/CONFIG.md rename to stable/minio-console/1.0.30/CONFIG.md diff --git a/stable/minio-console/1.0.30/Chart.lock b/stable/minio-console/1.0.30/Chart.lock new file mode 100644 index 00000000000..beb1915b382 --- /dev/null +++ b/stable/minio-console/1.0.30/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:23:53.452922283Z" diff --git a/stable/minio-console/1.0.29/Chart.yaml b/stable/minio-console/1.0.30/Chart.yaml similarity index 97% rename from stable/minio-console/1.0.29/Chart.yaml rename to stable/minio-console/1.0.30/Chart.yaml index e00a601ee9a..2adfdedc42e 100644 --- a/stable/minio-console/1.0.29/Chart.yaml +++ b/stable/minio-console/1.0.30/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: minio-console sources: - https://github.com/minio/console -version: 1.0.29 +version: 1.0.30 annotations: truecharts.org/catagories: | - media diff --git a/stable/minio-console/1.0.29/README.md b/stable/minio-console/1.0.30/README.md similarity index 100% rename from stable/minio-console/1.0.29/README.md rename to stable/minio-console/1.0.30/README.md diff --git a/stable/minio-console/1.0.29/app-readme.md b/stable/minio-console/1.0.30/app-readme.md similarity index 100% rename from stable/minio-console/1.0.29/app-readme.md rename to stable/minio-console/1.0.30/app-readme.md diff --git a/stable/mstream/1.0.24/charts/common-8.9.24.tgz b/stable/minio-console/1.0.30/charts/common-8.9.24.tgz similarity index 100% rename from stable/mstream/1.0.24/charts/common-8.9.24.tgz rename to stable/minio-console/1.0.30/charts/common-8.9.24.tgz diff --git a/stable/minio-console/1.0.29/helm-values.md b/stable/minio-console/1.0.30/helm-values.md similarity index 100% rename from stable/minio-console/1.0.29/helm-values.md rename to stable/minio-console/1.0.30/helm-values.md diff --git a/stable/minio-console/1.0.29/ix_values.yaml b/stable/minio-console/1.0.30/ix_values.yaml similarity index 100% rename from stable/minio-console/1.0.29/ix_values.yaml rename to stable/minio-console/1.0.30/ix_values.yaml diff --git a/stable/minio-console/1.0.29/questions.yaml b/stable/minio-console/1.0.30/questions.yaml similarity index 99% rename from stable/minio-console/1.0.29/questions.yaml rename to stable/minio-console/1.0.30/questions.yaml index b7f888d6b46..dbf815e36ec 100644 --- a/stable/minio-console/1.0.29/questions.yaml +++ b/stable/minio-console/1.0.30/questions.yaml @@ -366,7 +366,6 @@ questions: schema: type: int default: 9090 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/minio-console/1.0.29/security.md b/stable/minio-console/1.0.30/security.md similarity index 100% rename from stable/minio-console/1.0.29/security.md rename to stable/minio-console/1.0.30/security.md diff --git a/stable/minisatip/0.0.6/templates/common.yaml b/stable/minio-console/1.0.30/templates/common.yaml similarity index 100% rename from stable/minisatip/0.0.6/templates/common.yaml rename to stable/minio-console/1.0.30/templates/common.yaml diff --git a/stable/mstream/1.0.24/values.yaml b/stable/minio-console/1.0.30/values.yaml similarity index 100% rename from stable/mstream/1.0.24/values.yaml rename to stable/minio-console/1.0.30/values.yaml diff --git a/stable/minio/1.0.12/Chart.lock b/stable/minio/1.0.12/Chart.lock deleted file mode 100644 index 734c0b67832..00000000000 --- a/stable/minio/1.0.12/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:37:31.133953318Z" diff --git a/stable/minio/1.0.12/CHANGELOG.md b/stable/minio/1.0.13/CHANGELOG.md similarity index 85% rename from stable/minio/1.0.12/CHANGELOG.md rename to stable/minio/1.0.13/CHANGELOG.md index 8771bdf4e35..d39cf56c1d4 100644 --- a/stable/minio/1.0.12/CHANGELOG.md +++ b/stable/minio/1.0.13/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [minio-1.0.13](https://github.com/truecharts/apps/compare/minio-1.0.12...minio-1.0.13) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [minio-1.0.12](https://github.com/truecharts/apps/compare/minio-1.0.11...minio-1.0.12) (2021-12-19) @@ -86,14 +97,3 @@ -### [minio-1.0.4](https://github.com/truecharts/apps/compare/minio-1.0.3...minio-1.0.4) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [minio-1.0.3](https://github.com/truecharts/apps/compare/minio-1.0.2...minio-1.0.3) (2021-12-04) - diff --git a/stable/muximux/1.0.28/CONFIG.md b/stable/minio/1.0.13/CONFIG.md similarity index 100% rename from stable/muximux/1.0.28/CONFIG.md rename to stable/minio/1.0.13/CONFIG.md diff --git a/stable/minio/1.0.13/Chart.lock b/stable/minio/1.0.13/Chart.lock new file mode 100644 index 00000000000..e00077a0799 --- /dev/null +++ b/stable/minio/1.0.13/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:01.586242266Z" diff --git a/stable/minio/1.0.12/Chart.yaml b/stable/minio/1.0.13/Chart.yaml similarity index 97% rename from stable/minio/1.0.12/Chart.yaml rename to stable/minio/1.0.13/Chart.yaml index a7bb477d4f3..990d86c2347 100644 --- a/stable/minio/1.0.12/Chart.yaml +++ b/stable/minio/1.0.13/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: minio sources: - https://github.com/minio/minio -version: 1.0.12 +version: 1.0.13 annotations: truecharts.org/catagories: | - media diff --git a/stable/minio/1.0.12/README.md b/stable/minio/1.0.13/README.md similarity index 100% rename from stable/minio/1.0.12/README.md rename to stable/minio/1.0.13/README.md diff --git a/stable/minio/1.0.12/app-readme.md b/stable/minio/1.0.13/app-readme.md similarity index 100% rename from stable/minio/1.0.12/app-readme.md rename to stable/minio/1.0.13/app-readme.md diff --git a/stable/muximux/1.0.28/charts/common-8.9.24.tgz b/stable/minio/1.0.13/charts/common-8.9.24.tgz similarity index 100% rename from stable/muximux/1.0.28/charts/common-8.9.24.tgz rename to stable/minio/1.0.13/charts/common-8.9.24.tgz diff --git a/stable/minio/1.0.12/helm-values.md b/stable/minio/1.0.13/helm-values.md similarity index 100% rename from stable/minio/1.0.12/helm-values.md rename to stable/minio/1.0.13/helm-values.md diff --git a/stable/minio/1.0.12/ix_values.yaml b/stable/minio/1.0.13/ix_values.yaml similarity index 100% rename from stable/minio/1.0.12/ix_values.yaml rename to stable/minio/1.0.13/ix_values.yaml diff --git a/stable/minio/1.0.12/questions.yaml b/stable/minio/1.0.13/questions.yaml similarity index 99% rename from stable/minio/1.0.12/questions.yaml rename to stable/minio/1.0.13/questions.yaml index eab12ef0572..9b7ecd0ce49 100644 --- a/stable/minio/1.0.12/questions.yaml +++ b/stable/minio/1.0.13/questions.yaml @@ -368,7 +368,6 @@ questions: schema: type: int default: 10106 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -461,19 +460,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 10107 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/minio/1.0.12/security.md b/stable/minio/1.0.13/security.md similarity index 100% rename from stable/minio/1.0.12/security.md rename to stable/minio/1.0.13/security.md diff --git a/stable/mylar/4.0.24/templates/common.yaml b/stable/minio/1.0.13/templates/common.yaml similarity index 100% rename from stable/mylar/4.0.24/templates/common.yaml rename to stable/minio/1.0.13/templates/common.yaml diff --git a/stable/muximux/1.0.28/values.yaml b/stable/minio/1.0.13/values.yaml similarity index 100% rename from stable/muximux/1.0.28/values.yaml rename to stable/minio/1.0.13/values.yaml diff --git a/stable/minisatip/0.0.6/Chart.lock b/stable/minisatip/0.0.6/Chart.lock deleted file mode 100644 index 45ae8bed7bb..00000000000 --- a/stable/minisatip/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:37:38.347904403Z" diff --git a/stable/minisatip/0.0.6/CHANGELOG.md b/stable/minisatip/0.0.7/CHANGELOG.md similarity index 88% rename from stable/minisatip/0.0.6/CHANGELOG.md rename to stable/minisatip/0.0.7/CHANGELOG.md index 2823677d498..9def4ad927d 100644 --- a/stable/minisatip/0.0.6/CHANGELOG.md +++ b/stable/minisatip/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [minisatip-0.0.7](https://github.com/truecharts/apps/compare/minisatip-0.0.6...minisatip-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [minisatip-0.0.6](https://github.com/truecharts/apps/compare/minisatip-0.0.5...minisatip-0.0.6) (2021-12-19) diff --git a/stable/mylar/4.0.24/CONFIG.md b/stable/minisatip/0.0.7/CONFIG.md similarity index 100% rename from stable/mylar/4.0.24/CONFIG.md rename to stable/minisatip/0.0.7/CONFIG.md diff --git a/stable/minisatip/0.0.7/Chart.lock b/stable/minisatip/0.0.7/Chart.lock new file mode 100644 index 00000000000..d1b43049fd4 --- /dev/null +++ b/stable/minisatip/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:09.513299448Z" diff --git a/stable/minisatip/0.0.6/Chart.yaml b/stable/minisatip/0.0.7/Chart.yaml similarity index 98% rename from stable/minisatip/0.0.6/Chart.yaml rename to stable/minisatip/0.0.7/Chart.yaml index 02a6a34ce91..e159cc1e40b 100644 --- a/stable/minisatip/0.0.6/Chart.yaml +++ b/stable/minisatip/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: minisatip -version: 0.0.6 +version: 0.0.7 appVersion: "2021.12.01" description: Minisatip is a multi-threaded satip server version 1.2 that runs under Linux. type: application diff --git a/stable/minisatip/0.0.6/README.md b/stable/minisatip/0.0.7/README.md similarity index 100% rename from stable/minisatip/0.0.6/README.md rename to stable/minisatip/0.0.7/README.md diff --git a/stable/minisatip/0.0.6/app-readme.md b/stable/minisatip/0.0.7/app-readme.md similarity index 100% rename from stable/minisatip/0.0.6/app-readme.md rename to stable/minisatip/0.0.7/app-readme.md diff --git a/stable/mylar/4.0.24/charts/common-8.9.24.tgz b/stable/minisatip/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/mylar/4.0.24/charts/common-8.9.24.tgz rename to stable/minisatip/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/minisatip/0.0.6/helm-values.md b/stable/minisatip/0.0.7/helm-values.md similarity index 100% rename from stable/minisatip/0.0.6/helm-values.md rename to stable/minisatip/0.0.7/helm-values.md diff --git a/stable/minisatip/0.0.6/ix_values.yaml b/stable/minisatip/0.0.7/ix_values.yaml similarity index 100% rename from stable/minisatip/0.0.6/ix_values.yaml rename to stable/minisatip/0.0.7/ix_values.yaml diff --git a/stable/minisatip/0.0.6/questions.yaml b/stable/minisatip/0.0.7/questions.yaml similarity index 100% rename from stable/minisatip/0.0.6/questions.yaml rename to stable/minisatip/0.0.7/questions.yaml diff --git a/stable/minisatip/0.0.6/security.md b/stable/minisatip/0.0.7/security.md similarity index 100% rename from stable/minisatip/0.0.6/security.md rename to stable/minisatip/0.0.7/security.md diff --git a/stable/mysql-workbench/0.0.5/templates/common.yaml b/stable/minisatip/0.0.7/templates/common.yaml similarity index 100% rename from stable/mysql-workbench/0.0.5/templates/common.yaml rename to stable/minisatip/0.0.7/templates/common.yaml diff --git a/stable/mylar/4.0.24/values.yaml b/stable/minisatip/0.0.7/values.yaml similarity index 100% rename from stable/mylar/4.0.24/values.yaml rename to stable/minisatip/0.0.7/values.yaml diff --git a/stable/monica/0.0.16/Chart.lock b/stable/monica/0.0.16/Chart.lock deleted file mode 100644 index 7d98bce819d..00000000000 --- a/stable/monica/0.0.16/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:37:43.829452843Z" diff --git a/stable/monica/0.0.16/CHANGELOG.md b/stable/monica/0.0.17/CHANGELOG.md similarity index 92% rename from stable/monica/0.0.16/CHANGELOG.md rename to stable/monica/0.0.17/CHANGELOG.md index 77dc21d94d0..f7e37551859 100644 --- a/stable/monica/0.0.16/CHANGELOG.md +++ b/stable/monica/0.0.17/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [monica-0.0.17](https://github.com/truecharts/apps/compare/monica-0.0.16...monica-0.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [monica-0.0.16](https://github.com/truecharts/apps/compare/monica-0.0.15...monica-0.0.16) (2021-12-19) @@ -88,12 +97,3 @@ - -### [monica-0.0.8](https://github.com/truecharts/apps/compare/monica-0.0.7...monica-0.0.8) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - diff --git a/stable/mysql-workbench/0.0.5/CONFIG.md b/stable/monica/0.0.17/CONFIG.md similarity index 100% rename from stable/mysql-workbench/0.0.5/CONFIG.md rename to stable/monica/0.0.17/CONFIG.md diff --git a/stable/monica/0.0.17/Chart.lock b/stable/monica/0.0.17/Chart.lock new file mode 100644 index 00000000000..e0bccd90429 --- /dev/null +++ b/stable/monica/0.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:24:18.448146672Z" diff --git a/stable/monica/0.0.16/Chart.yaml b/stable/monica/0.0.17/Chart.yaml similarity index 98% rename from stable/monica/0.0.16/Chart.yaml rename to stable/monica/0.0.17/Chart.yaml index e25fa187ff9..b4bc9ac4033 100644 --- a/stable/monica/0.0.16/Chart.yaml +++ b/stable/monica/0.0.17/Chart.yaml @@ -22,7 +22,7 @@ name: monica sources: - https://github.com/monicahq/monica - https://hub.docker.com/_/monica -version: 0.0.16 +version: 0.0.17 annotations: truecharts.org/catagories: | - crm diff --git a/stable/monica/0.0.16/README.md b/stable/monica/0.0.17/README.md similarity index 100% rename from stable/monica/0.0.16/README.md rename to stable/monica/0.0.17/README.md diff --git a/stable/monica/0.0.16/app-readme.md b/stable/monica/0.0.17/app-readme.md similarity index 100% rename from stable/monica/0.0.16/app-readme.md rename to stable/monica/0.0.17/app-readme.md diff --git a/stable/mysql-workbench/0.0.5/charts/common-8.9.24.tgz b/stable/monica/0.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/mysql-workbench/0.0.5/charts/common-8.9.24.tgz rename to stable/monica/0.0.17/charts/common-8.9.24.tgz diff --git a/stable/monica/0.0.16/charts/mariadb-1.0.37.tgz b/stable/monica/0.0.17/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/monica/0.0.16/charts/mariadb-1.0.37.tgz rename to stable/monica/0.0.17/charts/mariadb-1.0.37.tgz diff --git a/stable/monica/0.0.16/helm-values.md b/stable/monica/0.0.17/helm-values.md similarity index 100% rename from stable/monica/0.0.16/helm-values.md rename to stable/monica/0.0.17/helm-values.md diff --git a/stable/monica/0.0.16/ix_values.yaml b/stable/monica/0.0.17/ix_values.yaml similarity index 100% rename from stable/monica/0.0.16/ix_values.yaml rename to stable/monica/0.0.17/ix_values.yaml diff --git a/stable/monica/0.0.16/questions.yaml b/stable/monica/0.0.17/questions.yaml similarity index 100% rename from stable/monica/0.0.16/questions.yaml rename to stable/monica/0.0.17/questions.yaml diff --git a/stable/monica/0.0.16/security.md b/stable/monica/0.0.17/security.md similarity index 99% rename from stable/monica/0.0.16/security.md rename to stable/monica/0.0.17/security.md index 8545961bb2e..41d186cdc07 100644 --- a/stable/monica/0.0.16/security.md +++ b/stable/monica/0.0.17/security.md @@ -468,7 +468,7 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | doctrine/dbal | CVE-2021-43608 | CRITICAL | 3.1.3 | 3.0.99, 3.1.4 |
Expand...https://github.com/advisories/GHSA-r7cj-8hjg-x622
https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d
https://github.com/doctrine/dbal/releases
https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622
https://nvd.nist.gov/vuln/detail/CVE-2021-43608
https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html
| -| laravel/framework | CVE-2021-43808 | MEDIUM | v8.68.1 | 7.30.6, 8.75.0, 6.20.42 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43808
https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| +| laravel/framework | CVE-2021-43808 | MEDIUM | v8.68.1 | 8.75.0, 6.20.42, 7.30.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43808
https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| | symfony/http-kernel | CVE-2021-41267 | MEDIUM | v5.3.10 | 5.3.0, 5.3.12 |
Expand...https://github.com/advisories/GHSA-q3j3-w37x-hq2q
https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487
https://github.com/symfony/symfony/pull/44243
https://github.com/symfony/symfony/releases/tag/v5.3.12
https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q
https://nvd.nist.gov/vuln/detail/CVE-2021-41267
https://symfony.com/cve-2021-41267
| diff --git a/stable/monica/0.0.16/templates/_appkey.tpl b/stable/monica/0.0.17/templates/_appkey.tpl similarity index 100% rename from stable/monica/0.0.16/templates/_appkey.tpl rename to stable/monica/0.0.17/templates/_appkey.tpl diff --git a/stable/monica/0.0.16/templates/common.yaml b/stable/monica/0.0.17/templates/common.yaml similarity index 100% rename from stable/monica/0.0.16/templates/common.yaml rename to stable/monica/0.0.17/templates/common.yaml diff --git a/stable/mysql-workbench/0.0.5/values.yaml b/stable/monica/0.0.17/values.yaml similarity index 100% rename from stable/mysql-workbench/0.0.5/values.yaml rename to stable/monica/0.0.17/values.yaml diff --git a/stable/mosquitto/4.0.26/Chart.lock b/stable/mosquitto/4.0.26/Chart.lock deleted file mode 100644 index 8cb17547404..00000000000 --- a/stable/mosquitto/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:37:53.401457056Z" diff --git a/stable/mosquitto/4.0.26/CHANGELOG.md b/stable/mosquitto/4.0.27/CHANGELOG.md similarity index 90% rename from stable/mosquitto/4.0.26/CHANGELOG.md rename to stable/mosquitto/4.0.27/CHANGELOG.md index ae71661f3e1..48df23cded4 100644 --- a/stable/mosquitto/4.0.26/CHANGELOG.md +++ b/stable/mosquitto/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [mosquitto-4.0.27](https://github.com/truecharts/apps/compare/mosquitto-4.0.26...mosquitto-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [mosquitto-4.0.26](https://github.com/truecharts/apps/compare/mosquitto-4.0.25...mosquitto-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ -### [mosquitto-4.0.18](https://github.com/truecharts/apps/compare/mosquitto-4.0.17...mosquitto-4.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [mosquitto-4.0.17](https://github.com/truecharts/apps/compare/mosquitto-4.0.16...mosquitto-4.0.17) (2021-12-04) diff --git a/stable/nano-wallet/0.0.7/CONFIG.md b/stable/mosquitto/4.0.27/CONFIG.md similarity index 100% rename from stable/nano-wallet/0.0.7/CONFIG.md rename to stable/mosquitto/4.0.27/CONFIG.md diff --git a/stable/mosquitto/4.0.27/Chart.lock b/stable/mosquitto/4.0.27/Chart.lock new file mode 100644 index 00000000000..13d41d860d5 --- /dev/null +++ b/stable/mosquitto/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:25.654138665Z" diff --git a/stable/mosquitto/4.0.26/Chart.yaml b/stable/mosquitto/4.0.27/Chart.yaml similarity index 97% rename from stable/mosquitto/4.0.26/Chart.yaml rename to stable/mosquitto/4.0.27/Chart.yaml index bc06e112641..8ab20b0e725 100644 --- a/stable/mosquitto/4.0.26/Chart.yaml +++ b/stable/mosquitto/4.0.27/Chart.yaml @@ -21,7 +21,7 @@ name: mosquitto sources: - https://github.com/eclipse/mosquitto type: application -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - homeautomation diff --git a/stable/mosquitto/4.0.26/README.md b/stable/mosquitto/4.0.27/README.md similarity index 100% rename from stable/mosquitto/4.0.26/README.md rename to stable/mosquitto/4.0.27/README.md diff --git a/stable/mosquitto/4.0.26/app-readme.md b/stable/mosquitto/4.0.27/app-readme.md similarity index 100% rename from stable/mosquitto/4.0.26/app-readme.md rename to stable/mosquitto/4.0.27/app-readme.md diff --git a/stable/nano-wallet/0.0.7/charts/common-8.9.24.tgz b/stable/mosquitto/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/nano-wallet/0.0.7/charts/common-8.9.24.tgz rename to stable/mosquitto/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/mosquitto/4.0.26/helm-values.md b/stable/mosquitto/4.0.27/helm-values.md similarity index 100% rename from stable/mosquitto/4.0.26/helm-values.md rename to stable/mosquitto/4.0.27/helm-values.md diff --git a/stable/mosquitto/4.0.26/ix_values.yaml b/stable/mosquitto/4.0.27/ix_values.yaml similarity index 100% rename from stable/mosquitto/4.0.26/ix_values.yaml rename to stable/mosquitto/4.0.27/ix_values.yaml diff --git a/stable/mosquitto/4.0.26/questions.yaml b/stable/mosquitto/4.0.27/questions.yaml similarity index 99% rename from stable/mosquitto/4.0.26/questions.yaml rename to stable/mosquitto/4.0.27/questions.yaml index c68e8a54e7f..022458b5568 100644 --- a/stable/mosquitto/4.0.26/questions.yaml +++ b/stable/mosquitto/4.0.27/questions.yaml @@ -356,7 +356,6 @@ questions: schema: type: int default: 1883 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/mosquitto/4.0.26/security.md b/stable/mosquitto/4.0.27/security.md similarity index 100% rename from stable/mosquitto/4.0.26/security.md rename to stable/mosquitto/4.0.27/security.md diff --git a/stable/mosquitto/4.0.26/templates/common.yaml b/stable/mosquitto/4.0.27/templates/common.yaml similarity index 100% rename from stable/mosquitto/4.0.26/templates/common.yaml rename to stable/mosquitto/4.0.27/templates/common.yaml diff --git a/stable/mosquitto/4.0.26/templates/configmap.yaml b/stable/mosquitto/4.0.27/templates/configmap.yaml similarity index 100% rename from stable/mosquitto/4.0.26/templates/configmap.yaml rename to stable/mosquitto/4.0.27/templates/configmap.yaml diff --git a/stable/nano-wallet/0.0.7/values.yaml b/stable/mosquitto/4.0.27/values.yaml similarity index 100% rename from stable/nano-wallet/0.0.7/values.yaml rename to stable/mosquitto/4.0.27/values.yaml diff --git a/stable/mstream/1.0.24/Chart.lock b/stable/mstream/1.0.24/Chart.lock deleted file mode 100644 index 5152b98dd10..00000000000 --- a/stable/mstream/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:02.382365926Z" diff --git a/stable/mstream/1.0.24/CHANGELOG.md b/stable/mstream/1.0.25/CHANGELOG.md similarity index 90% rename from stable/mstream/1.0.24/CHANGELOG.md rename to stable/mstream/1.0.25/CHANGELOG.md index daf1cc07159..db43e20a229 100644 --- a/stable/mstream/1.0.24/CHANGELOG.md +++ b/stable/mstream/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [mstream-1.0.25](https://github.com/truecharts/apps/compare/mstream-1.0.24...mstream-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [mstream-1.0.24](https://github.com/truecharts/apps/compare/mstream-1.0.23...mstream-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [mstream-1.0.16](https://github.com/truecharts/apps/compare/mstream-1.0.15...mstream-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [mstream-1.0.15](https://github.com/truecharts/apps/compare/mstream-1.0.14...mstream-1.0.15) (2021-12-04) - diff --git a/stable/navidrome/9.0.25/CONFIG.md b/stable/mstream/1.0.25/CONFIG.md similarity index 100% rename from stable/navidrome/9.0.25/CONFIG.md rename to stable/mstream/1.0.25/CONFIG.md diff --git a/stable/mstream/1.0.25/Chart.lock b/stable/mstream/1.0.25/Chart.lock new file mode 100644 index 00000000000..bd5bf7b21f8 --- /dev/null +++ b/stable/mstream/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:32.949171462Z" diff --git a/stable/mstream/1.0.24/Chart.yaml b/stable/mstream/1.0.25/Chart.yaml similarity index 97% rename from stable/mstream/1.0.24/Chart.yaml rename to stable/mstream/1.0.25/Chart.yaml index db6c099c6b2..f85570dce22 100644 --- a/stable/mstream/1.0.24/Chart.yaml +++ b/stable/mstream/1.0.25/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/linuxserver/docker-mstream - https://mstream.io/ type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/mstream/1.0.24/README.md b/stable/mstream/1.0.25/README.md similarity index 100% rename from stable/mstream/1.0.24/README.md rename to stable/mstream/1.0.25/README.md diff --git a/stable/mstream/1.0.24/app-readme.md b/stable/mstream/1.0.25/app-readme.md similarity index 100% rename from stable/mstream/1.0.24/app-readme.md rename to stable/mstream/1.0.25/app-readme.md diff --git a/stable/navidrome/9.0.25/charts/common-8.9.24.tgz b/stable/mstream/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/navidrome/9.0.25/charts/common-8.9.24.tgz rename to stable/mstream/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/mstream/1.0.24/helm-values.md b/stable/mstream/1.0.25/helm-values.md similarity index 100% rename from stable/mstream/1.0.24/helm-values.md rename to stable/mstream/1.0.25/helm-values.md diff --git a/stable/mstream/1.0.24/ix_values.yaml b/stable/mstream/1.0.25/ix_values.yaml similarity index 100% rename from stable/mstream/1.0.24/ix_values.yaml rename to stable/mstream/1.0.25/ix_values.yaml diff --git a/stable/mstream/1.0.24/questions.yaml b/stable/mstream/1.0.25/questions.yaml similarity index 99% rename from stable/mstream/1.0.24/questions.yaml rename to stable/mstream/1.0.25/questions.yaml index a0c26e38c62..b2f46d79a84 100644 --- a/stable/mstream/1.0.24/questions.yaml +++ b/stable/mstream/1.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10041 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/mstream/1.0.24/security.md b/stable/mstream/1.0.25/security.md similarity index 100% rename from stable/mstream/1.0.24/security.md rename to stable/mstream/1.0.25/security.md diff --git a/stable/mstream/1.0.24/templates/common.yaml b/stable/mstream/1.0.25/templates/common.yaml similarity index 100% rename from stable/mstream/1.0.24/templates/common.yaml rename to stable/mstream/1.0.25/templates/common.yaml diff --git a/stable/navidrome/9.0.25/values.yaml b/stable/mstream/1.0.25/values.yaml similarity index 100% rename from stable/navidrome/9.0.25/values.yaml rename to stable/mstream/1.0.25/values.yaml diff --git a/stable/muximux/1.0.28/Chart.lock b/stable/muximux/1.0.28/Chart.lock deleted file mode 100644 index 63f37924804..00000000000 --- a/stable/muximux/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:07.255503819Z" diff --git a/stable/muximux/1.0.28/CHANGELOG.md b/stable/muximux/1.0.29/CHANGELOG.md similarity index 90% rename from stable/muximux/1.0.28/CHANGELOG.md rename to stable/muximux/1.0.29/CHANGELOG.md index badee6454af..1e9201d1719 100644 --- a/stable/muximux/1.0.28/CHANGELOG.md +++ b/stable/muximux/1.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [muximux-1.0.29](https://github.com/truecharts/apps/compare/muximux-1.0.28...muximux-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [muximux-1.0.28](https://github.com/truecharts/apps/compare/muximux-1.0.27...muximux-1.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [muximux-1.0.20](https://github.com/truecharts/apps/compare/muximux-1.0.19...muximux-1.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [muximux-1.0.19](https://github.com/truecharts/apps/compare/muximux-1.0.18...muximux-1.0.19) (2021-12-04) - diff --git a/stable/ngircd/0.0.5/CONFIG.md b/stable/muximux/1.0.29/CONFIG.md similarity index 100% rename from stable/ngircd/0.0.5/CONFIG.md rename to stable/muximux/1.0.29/CONFIG.md diff --git a/stable/muximux/1.0.29/Chart.lock b/stable/muximux/1.0.29/Chart.lock new file mode 100644 index 00000000000..e54092f8aca --- /dev/null +++ b/stable/muximux/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:35.738329174Z" diff --git a/stable/muximux/1.0.28/Chart.yaml b/stable/muximux/1.0.29/Chart.yaml similarity index 98% rename from stable/muximux/1.0.28/Chart.yaml rename to stable/muximux/1.0.29/Chart.yaml index 57dd349ce02..ab4e2b22216 100644 --- a/stable/muximux/1.0.28/Chart.yaml +++ b/stable/muximux/1.0.29/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-muximux - https://github.com/mescon/Muximux type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/muximux/1.0.28/README.md b/stable/muximux/1.0.29/README.md similarity index 100% rename from stable/muximux/1.0.28/README.md rename to stable/muximux/1.0.29/README.md diff --git a/stable/muximux/1.0.28/app-readme.md b/stable/muximux/1.0.29/app-readme.md similarity index 100% rename from stable/muximux/1.0.28/app-readme.md rename to stable/muximux/1.0.29/app-readme.md diff --git a/stable/ngircd/0.0.5/charts/common-8.9.24.tgz b/stable/muximux/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/ngircd/0.0.5/charts/common-8.9.24.tgz rename to stable/muximux/1.0.29/charts/common-8.9.24.tgz diff --git a/stable/muximux/1.0.28/helm-values.md b/stable/muximux/1.0.29/helm-values.md similarity index 100% rename from stable/muximux/1.0.28/helm-values.md rename to stable/muximux/1.0.29/helm-values.md diff --git a/stable/muximux/1.0.28/ix_values.yaml b/stable/muximux/1.0.29/ix_values.yaml similarity index 100% rename from stable/muximux/1.0.28/ix_values.yaml rename to stable/muximux/1.0.29/ix_values.yaml diff --git a/stable/muximux/1.0.28/questions.yaml b/stable/muximux/1.0.29/questions.yaml similarity index 99% rename from stable/muximux/1.0.28/questions.yaml rename to stable/muximux/1.0.29/questions.yaml index 637793563de..b7dfeb27a23 100644 --- a/stable/muximux/1.0.28/questions.yaml +++ b/stable/muximux/1.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10019 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/muximux/1.0.28/security.md b/stable/muximux/1.0.29/security.md similarity index 100% rename from stable/muximux/1.0.28/security.md rename to stable/muximux/1.0.29/security.md diff --git a/stable/muximux/1.0.28/templates/common.yaml b/stable/muximux/1.0.29/templates/common.yaml similarity index 100% rename from stable/muximux/1.0.28/templates/common.yaml rename to stable/muximux/1.0.29/templates/common.yaml diff --git a/stable/ngircd/0.0.5/values.yaml b/stable/muximux/1.0.29/values.yaml similarity index 100% rename from stable/ngircd/0.0.5/values.yaml rename to stable/muximux/1.0.29/values.yaml diff --git a/stable/mylar/4.0.24/Chart.lock b/stable/mylar/4.0.24/Chart.lock deleted file mode 100644 index 2618a3da03b..00000000000 --- a/stable/mylar/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:17.540761981Z" diff --git a/stable/mylar/4.0.24/CHANGELOG.md b/stable/mylar/4.0.25/CHANGELOG.md similarity index 90% rename from stable/mylar/4.0.24/CHANGELOG.md rename to stable/mylar/4.0.25/CHANGELOG.md index 494e63aa90c..d374466dc66 100644 --- a/stable/mylar/4.0.24/CHANGELOG.md +++ b/stable/mylar/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [mylar-4.0.25](https://github.com/truecharts/apps/compare/mylar-4.0.24...mylar-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [mylar-4.0.24](https://github.com/truecharts/apps/compare/mylar-4.0.23...mylar-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [mylar-4.0.16](https://github.com/truecharts/apps/compare/mylar-4.0.15...mylar-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [mylar-4.0.15](https://github.com/truecharts/apps/compare/mylar-4.0.14...mylar-4.0.15) (2021-12-04) diff --git a/stable/nntp2nntp/0.0.5/CONFIG.md b/stable/mylar/4.0.25/CONFIG.md similarity index 100% rename from stable/nntp2nntp/0.0.5/CONFIG.md rename to stable/mylar/4.0.25/CONFIG.md diff --git a/stable/mylar/4.0.25/Chart.lock b/stable/mylar/4.0.25/Chart.lock new file mode 100644 index 00000000000..a28c30ae286 --- /dev/null +++ b/stable/mylar/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:50.37137701Z" diff --git a/stable/mylar/4.0.24/Chart.yaml b/stable/mylar/4.0.25/Chart.yaml similarity index 97% rename from stable/mylar/4.0.24/Chart.yaml rename to stable/mylar/4.0.25/Chart.yaml index 7151fad54ca..8637d112622 100644 --- a/stable/mylar/4.0.24/Chart.yaml +++ b/stable/mylar/4.0.25/Chart.yaml @@ -19,7 +19,7 @@ sources: - https://github.com/mylar3/mylar3 - https://github.com/linuxserver/docker-mylar3 - https://github.com/truechartsapps/tree/master/charts/mylar -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/mylar/4.0.24/README.md b/stable/mylar/4.0.25/README.md similarity index 100% rename from stable/mylar/4.0.24/README.md rename to stable/mylar/4.0.25/README.md diff --git a/stable/mylar/4.0.24/app-readme.md b/stable/mylar/4.0.25/app-readme.md similarity index 100% rename from stable/mylar/4.0.24/app-readme.md rename to stable/mylar/4.0.25/app-readme.md diff --git a/stable/nntp2nntp/0.0.5/charts/common-8.9.24.tgz b/stable/mylar/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/nntp2nntp/0.0.5/charts/common-8.9.24.tgz rename to stable/mylar/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/mylar/4.0.24/helm-values.md b/stable/mylar/4.0.25/helm-values.md similarity index 100% rename from stable/mylar/4.0.24/helm-values.md rename to stable/mylar/4.0.25/helm-values.md diff --git a/stable/mylar/4.0.24/ix_values.yaml b/stable/mylar/4.0.25/ix_values.yaml similarity index 100% rename from stable/mylar/4.0.24/ix_values.yaml rename to stable/mylar/4.0.25/ix_values.yaml diff --git a/stable/mylar/4.0.24/questions.yaml b/stable/mylar/4.0.25/questions.yaml similarity index 99% rename from stable/mylar/4.0.24/questions.yaml rename to stable/mylar/4.0.25/questions.yaml index ed7868a8f72..fef66f77758 100644 --- a/stable/mylar/4.0.24/questions.yaml +++ b/stable/mylar/4.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 8090 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/mylar/4.0.24/security.md b/stable/mylar/4.0.25/security.md similarity index 100% rename from stable/mylar/4.0.24/security.md rename to stable/mylar/4.0.25/security.md diff --git a/stable/nano-wallet/0.0.7/templates/common.yaml b/stable/mylar/4.0.25/templates/common.yaml similarity index 100% rename from stable/nano-wallet/0.0.7/templates/common.yaml rename to stable/mylar/4.0.25/templates/common.yaml diff --git a/stable/nntp2nntp/0.0.5/values.yaml b/stable/mylar/4.0.25/values.yaml similarity index 100% rename from stable/nntp2nntp/0.0.5/values.yaml rename to stable/mylar/4.0.25/values.yaml diff --git a/stable/mysql-workbench/0.0.5/Chart.lock b/stable/mysql-workbench/0.0.5/Chart.lock deleted file mode 100644 index bad8cf71881..00000000000 --- a/stable/mysql-workbench/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:18.41402443Z" diff --git a/stable/mysql-workbench/0.0.5/CHANGELOG.md b/stable/mysql-workbench/0.0.6/CHANGELOG.md similarity index 86% rename from stable/mysql-workbench/0.0.5/CHANGELOG.md rename to stable/mysql-workbench/0.0.6/CHANGELOG.md index 696d654b434..a5ec9e0b61a 100644 --- a/stable/mysql-workbench/0.0.5/CHANGELOG.md +++ b/stable/mysql-workbench/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mysql-workbench-0.0.6](https://github.com/truecharts/apps/compare/mysql-workbench-0.0.5...mysql-workbench-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [mysql-workbench-0.0.5](https://github.com/truecharts/apps/compare/mysql-workbench-0.0.4...mysql-workbench-0.0.5) (2021-12-19) diff --git a/stable/node-red/9.0.25/CONFIG.md b/stable/mysql-workbench/0.0.6/CONFIG.md similarity index 100% rename from stable/node-red/9.0.25/CONFIG.md rename to stable/mysql-workbench/0.0.6/CONFIG.md diff --git a/stable/mysql-workbench/0.0.6/Chart.lock b/stable/mysql-workbench/0.0.6/Chart.lock new file mode 100644 index 00000000000..4f278e7abb6 --- /dev/null +++ b/stable/mysql-workbench/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:24:51.209174124Z" diff --git a/stable/mysql-workbench/0.0.5/Chart.yaml b/stable/mysql-workbench/0.0.6/Chart.yaml similarity index 98% rename from stable/mysql-workbench/0.0.5/Chart.yaml rename to stable/mysql-workbench/0.0.6/Chart.yaml index 7731ef457eb..33e02df2d28 100644 --- a/stable/mysql-workbench/0.0.5/Chart.yaml +++ b/stable/mysql-workbench/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: mysql-workbench -version: 0.0.5 +version: 0.0.6 appVersion: "8.0.27" description: MySQL Workbench is a unified visual tool for database architects, developers and DBAs. type: application diff --git a/stable/mysql-workbench/0.0.5/README.md b/stable/mysql-workbench/0.0.6/README.md similarity index 100% rename from stable/mysql-workbench/0.0.5/README.md rename to stable/mysql-workbench/0.0.6/README.md diff --git a/stable/mysql-workbench/0.0.5/app-readme.md b/stable/mysql-workbench/0.0.6/app-readme.md similarity index 100% rename from stable/mysql-workbench/0.0.5/app-readme.md rename to stable/mysql-workbench/0.0.6/app-readme.md diff --git a/stable/node-red/9.0.25/charts/common-8.9.24.tgz b/stable/mysql-workbench/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/node-red/9.0.25/charts/common-8.9.24.tgz rename to stable/mysql-workbench/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/mysql-workbench/0.0.5/helm-values.md b/stable/mysql-workbench/0.0.6/helm-values.md similarity index 100% rename from stable/mysql-workbench/0.0.5/helm-values.md rename to stable/mysql-workbench/0.0.6/helm-values.md diff --git a/stable/mysql-workbench/0.0.5/ix_values.yaml b/stable/mysql-workbench/0.0.6/ix_values.yaml similarity index 100% rename from stable/mysql-workbench/0.0.5/ix_values.yaml rename to stable/mysql-workbench/0.0.6/ix_values.yaml diff --git a/stable/mysql-workbench/0.0.5/questions.yaml b/stable/mysql-workbench/0.0.6/questions.yaml similarity index 100% rename from stable/mysql-workbench/0.0.5/questions.yaml rename to stable/mysql-workbench/0.0.6/questions.yaml diff --git a/stable/mysql-workbench/0.0.5/security.md b/stable/mysql-workbench/0.0.6/security.md similarity index 100% rename from stable/mysql-workbench/0.0.5/security.md rename to stable/mysql-workbench/0.0.6/security.md diff --git a/stable/navidrome/9.0.25/templates/common.yaml b/stable/mysql-workbench/0.0.6/templates/common.yaml similarity index 100% rename from stable/navidrome/9.0.25/templates/common.yaml rename to stable/mysql-workbench/0.0.6/templates/common.yaml diff --git a/stable/node-red/9.0.25/values.yaml b/stable/mysql-workbench/0.0.6/values.yaml similarity index 100% rename from stable/node-red/9.0.25/values.yaml rename to stable/mysql-workbench/0.0.6/values.yaml diff --git a/stable/nano-wallet/0.0.7/Chart.lock b/stable/nano-wallet/0.0.7/Chart.lock deleted file mode 100644 index 3853157eab1..00000000000 --- a/stable/nano-wallet/0.0.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:31.090019677Z" diff --git a/stable/nano-wallet/0.0.7/CHANGELOG.md b/stable/nano-wallet/0.0.8/CHANGELOG.md similarity index 87% rename from stable/nano-wallet/0.0.7/CHANGELOG.md rename to stable/nano-wallet/0.0.8/CHANGELOG.md index 16224e7ad0b..2cc8d7067c5 100644 --- a/stable/nano-wallet/0.0.7/CHANGELOG.md +++ b/stable/nano-wallet/0.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [nano-wallet-0.0.8](https://github.com/truecharts/apps/compare/nano-wallet-0.0.7...nano-wallet-0.0.8) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [nano-wallet-0.0.7](https://github.com/truecharts/apps/compare/nano-wallet-0.0.6...nano-wallet-0.0.7) (2021-12-19) diff --git a/stable/novnc/1.0.24/CONFIG.md b/stable/nano-wallet/0.0.8/CONFIG.md similarity index 100% rename from stable/novnc/1.0.24/CONFIG.md rename to stable/nano-wallet/0.0.8/CONFIG.md diff --git a/stable/nano-wallet/0.0.8/Chart.lock b/stable/nano-wallet/0.0.8/Chart.lock new file mode 100644 index 00000000000..f3c439d41d1 --- /dev/null +++ b/stable/nano-wallet/0.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:01.927851173Z" diff --git a/stable/nano-wallet/0.0.7/Chart.yaml b/stable/nano-wallet/0.0.8/Chart.yaml similarity index 98% rename from stable/nano-wallet/0.0.7/Chart.yaml rename to stable/nano-wallet/0.0.8/Chart.yaml index c286c235ff5..d65b5b43b46 100644 --- a/stable/nano-wallet/0.0.7/Chart.yaml +++ b/stable/nano-wallet/0.0.8/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: nano-wallet -version: 0.0.7 +version: 0.0.8 appVersion: "2021.11.18" description: Nano-wallet is a digital payment protocol designed to be accessible and lightweight. type: application diff --git a/stable/nano-wallet/0.0.7/README.md b/stable/nano-wallet/0.0.8/README.md similarity index 100% rename from stable/nano-wallet/0.0.7/README.md rename to stable/nano-wallet/0.0.8/README.md diff --git a/stable/nano-wallet/0.0.7/app-readme.md b/stable/nano-wallet/0.0.8/app-readme.md similarity index 100% rename from stable/nano-wallet/0.0.7/app-readme.md rename to stable/nano-wallet/0.0.8/app-readme.md diff --git a/stable/novnc/1.0.24/charts/common-8.9.24.tgz b/stable/nano-wallet/0.0.8/charts/common-8.9.24.tgz similarity index 100% rename from stable/novnc/1.0.24/charts/common-8.9.24.tgz rename to stable/nano-wallet/0.0.8/charts/common-8.9.24.tgz diff --git a/stable/nano-wallet/0.0.7/helm-values.md b/stable/nano-wallet/0.0.8/helm-values.md similarity index 100% rename from stable/nano-wallet/0.0.7/helm-values.md rename to stable/nano-wallet/0.0.8/helm-values.md diff --git a/stable/nano-wallet/0.0.7/ix_values.yaml b/stable/nano-wallet/0.0.8/ix_values.yaml similarity index 100% rename from stable/nano-wallet/0.0.7/ix_values.yaml rename to stable/nano-wallet/0.0.8/ix_values.yaml diff --git a/stable/nano-wallet/0.0.7/questions.yaml b/stable/nano-wallet/0.0.8/questions.yaml similarity index 100% rename from stable/nano-wallet/0.0.7/questions.yaml rename to stable/nano-wallet/0.0.8/questions.yaml diff --git a/stable/nano-wallet/0.0.7/security.md b/stable/nano-wallet/0.0.8/security.md similarity index 100% rename from stable/nano-wallet/0.0.7/security.md rename to stable/nano-wallet/0.0.8/security.md diff --git a/stable/ngircd/0.0.5/templates/common.yaml b/stable/nano-wallet/0.0.8/templates/common.yaml similarity index 100% rename from stable/ngircd/0.0.5/templates/common.yaml rename to stable/nano-wallet/0.0.8/templates/common.yaml diff --git a/stable/novnc/1.0.24/values.yaml b/stable/nano-wallet/0.0.8/values.yaml similarity index 100% rename from stable/novnc/1.0.24/values.yaml rename to stable/nano-wallet/0.0.8/values.yaml diff --git a/stable/navidrome/9.0.25/Chart.lock b/stable/navidrome/9.0.25/Chart.lock deleted file mode 100644 index e56fd57d1f4..00000000000 --- a/stable/navidrome/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:38:35.051205236Z" diff --git a/stable/navidrome/9.0.25/CHANGELOG.md b/stable/navidrome/9.0.26/CHANGELOG.md similarity index 90% rename from stable/navidrome/9.0.25/CHANGELOG.md rename to stable/navidrome/9.0.26/CHANGELOG.md index 406e47751ed..885769f96f8 100644 --- a/stable/navidrome/9.0.25/CHANGELOG.md +++ b/stable/navidrome/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [navidrome-9.0.26](https://github.com/truecharts/apps/compare/navidrome-9.0.25...navidrome-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [navidrome-9.0.25](https://github.com/truecharts/apps/compare/navidrome-9.0.24...navidrome-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [navidrome-9.0.17](https://github.com/truecharts/apps/compare/navidrome-9.0.16...navidrome-9.0.17) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [navidrome-9.0.16](https://github.com/truecharts/apps/compare/navidrome-9.0.15...navidrome-9.0.16) (2021-12-04) - -#### Chore diff --git a/stable/nullserv/4.0.24/CONFIG.md b/stable/navidrome/9.0.26/CONFIG.md similarity index 100% rename from stable/nullserv/4.0.24/CONFIG.md rename to stable/navidrome/9.0.26/CONFIG.md diff --git a/stable/navidrome/9.0.26/Chart.lock b/stable/navidrome/9.0.26/Chart.lock new file mode 100644 index 00000000000..b702a64c54b --- /dev/null +++ b/stable/navidrome/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:04.67452403Z" diff --git a/stable/navidrome/9.0.25/Chart.yaml b/stable/navidrome/9.0.26/Chart.yaml similarity index 97% rename from stable/navidrome/9.0.25/Chart.yaml rename to stable/navidrome/9.0.26/Chart.yaml index c6e36dd5908..afe495b55f9 100644 --- a/stable/navidrome/9.0.25/Chart.yaml +++ b/stable/navidrome/9.0.26/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/deluan/navidrome - https://hub.docker.com/r/deluan/navidrome type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/navidrome/9.0.25/README.md b/stable/navidrome/9.0.26/README.md similarity index 100% rename from stable/navidrome/9.0.25/README.md rename to stable/navidrome/9.0.26/README.md diff --git a/stable/navidrome/9.0.25/app-readme.md b/stable/navidrome/9.0.26/app-readme.md similarity index 100% rename from stable/navidrome/9.0.25/app-readme.md rename to stable/navidrome/9.0.26/app-readme.md diff --git a/stable/nullserv/4.0.24/charts/common-8.9.24.tgz b/stable/navidrome/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/nullserv/4.0.24/charts/common-8.9.24.tgz rename to stable/navidrome/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/navidrome/9.0.25/helm-values.md b/stable/navidrome/9.0.26/helm-values.md similarity index 100% rename from stable/navidrome/9.0.25/helm-values.md rename to stable/navidrome/9.0.26/helm-values.md diff --git a/stable/navidrome/9.0.25/ix_values.yaml b/stable/navidrome/9.0.26/ix_values.yaml similarity index 100% rename from stable/navidrome/9.0.25/ix_values.yaml rename to stable/navidrome/9.0.26/ix_values.yaml diff --git a/stable/navidrome/9.0.25/questions.yaml b/stable/navidrome/9.0.26/questions.yaml similarity index 99% rename from stable/navidrome/9.0.25/questions.yaml rename to stable/navidrome/9.0.26/questions.yaml index 28b3757c966..bc4a6a647fa 100644 --- a/stable/navidrome/9.0.25/questions.yaml +++ b/stable/navidrome/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 4533 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/navidrome/9.0.25/security.md b/stable/navidrome/9.0.26/security.md similarity index 100% rename from stable/navidrome/9.0.25/security.md rename to stable/navidrome/9.0.26/security.md diff --git a/stable/nntp2nntp/0.0.5/templates/common.yaml b/stable/navidrome/9.0.26/templates/common.yaml similarity index 100% rename from stable/nntp2nntp/0.0.5/templates/common.yaml rename to stable/navidrome/9.0.26/templates/common.yaml diff --git a/stable/nullserv/4.0.24/values.yaml b/stable/navidrome/9.0.26/values.yaml similarity index 100% rename from stable/nullserv/4.0.24/values.yaml rename to stable/navidrome/9.0.26/values.yaml diff --git a/stable/nextcloud/11.0.7/CHANGELOG.md b/stable/nextcloud/11.0.7/CHANGELOG.md new file mode 100644 index 00000000000..6870ca68b5f --- /dev/null +++ b/stable/nextcloud/11.0.7/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [nextcloud-11.0.7](https://github.com/truecharts/apps/compare/nextcloud-11.0.6...nextcloud-11.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + + +### [nextcloud-11.0.6](https://github.com/truecharts/apps/compare/nextcloud-11.0.5...nextcloud-11.0.6) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [nextcloud-11.0.5](https://github.com/truecharts/apps/compare/nextcloud-11.0.4...nextcloud-11.0.5) (2021-12-19) + +#### Chore + +* update docker general non-major ([#1567](https://github.com/truecharts/apps/issues/1567)) + + + + +### [nextcloud-11.0.4](https://github.com/truecharts/apps/compare/nextcloud-11.0.3...nextcloud-11.0.4) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + + +### [nextcloud-11.0.3](https://github.com/truecharts/apps/compare/nextcloud-11.0.2...nextcloud-11.0.3) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [nextcloud-11.0.2](https://github.com/truecharts/apps/compare/nextcloud-11.0.1...nextcloud-11.0.2) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [nextcloud-11.0.1](https://github.com/truecharts/apps/compare/nextcloud-11.0.0...nextcloud-11.0.1) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [nextcloud-11.0.0](https://github.com/truecharts/apps/compare/nextcloud-10.0.16...nextcloud-11.0.0) (2021-12-11) + +#### Feat + +* move user/pass/secrets/keys from `env` to `secret` ([#1501](https://github.com/truecharts/apps/issues/1501)) + + + + +### [nextcloud-10.0.16](https://github.com/truecharts/apps/compare/nextcloud-10.0.15...nextcloud-10.0.16) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### nextcloud-10.0.15 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* ensure container references are prefixed with v +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* cleanup the ci for the security page a bit +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) diff --git a/stable/nzbget/9.0.25/CONFIG.md b/stable/nextcloud/11.0.7/CONFIG.md similarity index 100% rename from stable/nzbget/9.0.25/CONFIG.md rename to stable/nextcloud/11.0.7/CONFIG.md diff --git a/stable/nextcloud/11.0.7/Chart.lock b/stable/nextcloud/11.0.7/Chart.lock new file mode 100644 index 00000000000..59e9e568125 --- /dev/null +++ b/stable/nextcloud/11.0.7/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +- name: redis + repository: https://truecharts.org + version: 1.0.39 +digest: sha256:c2c7ac7915e674cd178c16d569e957b93faa00b4b4eb4bd3eead9a2b29c26a3f +generated: "2021-12-19T23:25:18.160340976Z" diff --git a/stable/nextcloud/11.0.7/Chart.yaml b/stable/nextcloud/11.0.7/Chart.yaml new file mode 100644 index 00000000000..589444c503b --- /dev/null +++ b/stable/nextcloud/11.0.7/Chart.yaml @@ -0,0 +1,41 @@ +apiVersion: v2 +appVersion: "23.0.0" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.39 +deprecated: false +description: A private cloud server that puts the control and security of your own + data back into your hands. +home: https://nextcloud.com/ +icon: https://truecharts.org/_static/img/appicons/nextcloud-icon.png +keywords: +- nextcloud +- storage +- http +- web +- php +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: nextcloud +sources: +- https://github.com/nextcloud/docker +- https://github.com/nextcloud/helm +type: application +version: 11.0.7 +annotations: + truecharts.org/catagories: | + - cloud + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/nextcloud/11.0.7/README.md b/stable/nextcloud/11.0.7/README.md new file mode 100644 index 00000000000..513e68acdae --- /dev/null +++ b/stable/nextcloud/11.0.7/README.md @@ -0,0 +1,40 @@ +# Introduction + +A private cloud server that puts the control and security of your own data back into your hands. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.34 | +| https://truecharts.org | common | 8.9.24 | +| https://truecharts.org | redis | 1.0.39 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/nextcloud/11.0.7/app-readme.md b/stable/nextcloud/11.0.7/app-readme.md new file mode 100644 index 00000000000..28094fc642d --- /dev/null +++ b/stable/nextcloud/11.0.7/app-readme.md @@ -0,0 +1,3 @@ +A private cloud server that puts the control and security of your own data back into your hands. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/nzbget/9.0.25/charts/common-8.9.24.tgz b/stable/nextcloud/11.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/nzbget/9.0.25/charts/common-8.9.24.tgz rename to stable/nextcloud/11.0.7/charts/common-8.9.24.tgz diff --git a/stable/paperless-ng/1.0.3/charts/postgresql-6.0.34.tgz b/stable/nextcloud/11.0.7/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/paperless-ng/1.0.3/charts/postgresql-6.0.34.tgz rename to stable/nextcloud/11.0.7/charts/postgresql-6.0.34.tgz diff --git a/stable/papermerge/0.0.6/charts/redis-1.0.39.tgz b/stable/nextcloud/11.0.7/charts/redis-1.0.39.tgz similarity index 100% rename from stable/papermerge/0.0.6/charts/redis-1.0.39.tgz rename to stable/nextcloud/11.0.7/charts/redis-1.0.39.tgz diff --git a/stable/nextcloud/11.0.7/helm-values.md b/stable/nextcloud/11.0.7/helm-values.md new file mode 100644 index 00000000000..5099ef18c53 --- /dev/null +++ b/stable/nextcloud/11.0.7/helm-values.md @@ -0,0 +1,62 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| cronjob.annotations | object | `{}` | | +| cronjob.failedJobsHistoryLimit | int | `5` | | +| cronjob.schedule | string | `"*/5 * * * *"` | | +| cronjob.successfulJobsHistoryLimit | int | `2` | | +| env.POSTGRES_DB | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.TRUSTED_PROXIES | string | `"172.16.0.0/16"` | | +| envFrom[0].configMapRef.name | string | `"nextcloudconfig"` | | +| envValueFrom.POSTGRES_HOST.secretKeyRef.key | string | `"plainporthost"` | | +| envValueFrom.POSTGRES_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.POSTGRES_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.REDIS_HOST_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.REDIS_HOST_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/nextcloud"` | | +| image.tag | string | `"v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59"` | | +| persistence.data.enabled | bool | `true` | | +| persistence.data.mountPath | string | `"/var/www/html"` | | +| podSecurityContext.fsGroup | int | `33` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"nextcloud"` | | +| postgresql.postgresqlUsername | string | `"nextcloud"` | | +| probes | object | See below | Probe configuration -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) | +| probes.liveness | object | See below | Liveness probe configuration | +| probes.liveness.spec | object | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.readiness | object | See below | Redainess probe configuration | +| probes.readiness.spec | object | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.startup | object | See below | Startup probe configuration | +| probes.startup.spec | object | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| secret.NEXTCLOUD_ADMIN_PASSWORD | string | `"adminpass"` | | +| secret.NEXTCLOUD_ADMIN_USER | string | `"admin"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.hpb.enabled | bool | `true` | | +| service.hpb.ports.hpb.enabled | bool | `true` | | +| service.hpb.ports.hpb.port | int | `7867` | | +| service.hpb.ports.hpb.targetPort | int | `7867` | | +| service.main.ports.main.port | int | `10020` | | +| service.main.ports.main.targetPort | int | `80` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/nextcloud/11.0.7/ix_values.yaml b/stable/nextcloud/11.0.7/ix_values.yaml new file mode 100644 index 00000000000..77a7b97ab54 --- /dev/null +++ b/stable/nextcloud/11.0.7/ix_values.yaml @@ -0,0 +1,131 @@ +image: + repository: tccr.io/truecharts/nextcloud + pullPolicy: IfNotPresent + tag: v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + fsGroup: 33 + +service: + main: + ports: + main: + port: 10020 + targetPort: 80 + hpb: + enabled: true + ports: + hpb: + enabled: true + port: 7867 + targetPort: 7867 +secret: + NEXTCLOUD_ADMIN_USER: "admin" + NEXTCLOUD_ADMIN_PASSWORD: "adminpass" +env: + TRUSTED_PROXIES: "172.16.0.0/16" + POSTGRES_DB: "{{ .Values.postgresql.postgresqlDatabase }}" + POSTGRES_USER: "{{ .Values.postgresql.postgresqlUsername }}" + +envFrom: + - configMapRef: + name: nextcloudconfig + +envValueFrom: + POSTGRES_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + POSTGRES_HOST: + secretKeyRef: + name: dbcreds + key: plainporthost + REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + REDIS_HOST_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + +persistence: + data: + enabled: true + mountPath: "/var/www/html" +# -- Probe configuration +# -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) +# @default -- See below +probes: + # -- Liveness probe configuration + # @default -- See below + liveness: + custom: true + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + spec: + httpGet: + path: /status.php + port: 80 + httpHeaders: + - name: Host + value: "test.fakedomain.dns" + + # -- Redainess probe configuration + # @default -- See below + readiness: + custom: true + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + spec: + httpGet: + path: /status.php + port: 80 + httpHeaders: + - name: Host + value: "test.fakedomain.dns" + + # -- Startup probe configuration + # @default -- See below + startup: + custom: true + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + spec: + httpGet: + path: /status.php + port: 80 + httpHeaders: + - name: Host + value: "test.fakedomain.dns" + +## Cronjob to execute Nextcloud background tasks +## ref: https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/background_jobs_configuration.html#webcron +## +cronjob: + # Every 5 minutes + # Note: Setting this to any any other value than 5 minutes might + # cause issues with how nextcloud background jobs are executed + schedule: "*/5 * * * *" + annotations: {} + failedJobsHistoryLimit: 5 + successfulJobsHistoryLimit: 2 + +# Enabled postgres +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: nextcloud + postgresqlDatabase: nextcloud + +# Enabled redis +# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/redis +redis: + enabled: true + existingSecret: "rediscreds" diff --git a/stable/nextcloud/11.0.7/questions.yaml b/stable/nextcloud/11.0.7/questions.yaml new file mode 100644 index 00000000000..64fc3b97c2b --- /dev/null +++ b/stable/nextcloud/11.0.7/questions.yaml @@ -0,0 +1,1860 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: NEXTCLOUD_ADMIN_USER + label: "NEXTCLOUD_ADMIN_USER (First Install Only)" + description: "Sets the initial nextcloud's admin username, changing this variable after first launch will NOT change admin's username" + schema: + type: string + required: true + default: "REPLACETHIS" + - variable: NEXTCLOUD_ADMIN_PASSWORD + label: "NEXTCLOUD_ADMIN_PASSWORD (First Install Only)" + description: "Sets the initial nextcloud's admin password, changing this variable after first launch will NOT change admin's password" + schema: + type: string + private: true + required: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: TRUSTED_PROXIES + label: "Trusted Proxies (Advanced)" + description: "Sets nextcloud Trusted Proxies" + schema: + type: string + default: "172.16.0.0/16" + - variable: NODE_IP + label: "NODE_IP" + description: "Sets nextcloud nodeip for nodeport connections (Ensure this is correct at first install!)" + schema: + type: string + $ref: + - "definitions/nodeIP" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10020 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 80 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: data + label: "App Data Storage" + description: "Stores the Application Data." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 33 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/nextcloud/11.0.7/security.md b/stable/nextcloud/11.0.7/security.md new file mode 100644 index 00000000000..bfb67b10389 --- /dev/null +++ b/stable/nextcloud/11.0.7/security.md @@ -0,0 +1,1816 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: nextcloud/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-nextcloud' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'nextcloud' of CronJob 'RELEASE-NAME-nextcloud-cronjob' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-nextcloud' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-nextcloud' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + tccr.io/truecharts/nextcloud:v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59 + tccr.io/truecharts/nextcloud:v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:7a9857fa3f8626b7fd1cbbafaff00dea68a08a30973284c98f232c0168a75b5c + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/nextcloud:v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59 (debian 11.1) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2 | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2 | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2 | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2 | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2 | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2 | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-bin | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-bin | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-bin | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-bin | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-bin | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-bin | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-data | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-data | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-data | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-data | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-data | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-data | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-utils | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-utils | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-utils | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-utils | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-utils | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-utils | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| binutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-common | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-common | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-common | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-common | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-common | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-common | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-common | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-common | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-common | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-common | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-common | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-x86-64-linux-gnu | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-x86-64-linux-gnu | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| busybox-static | CVE-2021-42377 | CRITICAL | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-28831 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42378 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42379 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42380 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42381 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42382 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42383 | HIGH | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42384 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42385 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42386 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2018-1000500 | LOW | 1:1.30.1-6 | |
Expand...http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000500
https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
https://git.busybox.net/busybox/tree/networking/wget.c?id=8bc418f07eab79a9c8d26594629799f6157a9466#n74
https://ubuntu.com/security/notices/USN-4531-1
https://usn.ubuntu.com/4531-1/
| +| busybox-static | CVE-2021-42373 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42374 | LOW | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42375 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42376 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578
https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e
https://bugs.chromium.org/p/aomedia/issues/detail?id=3000
| +| libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0
https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libbinutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libbinutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libbinutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libbinutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libbinutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libbinutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libbinutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libbinutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libbinutils | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libbinutils | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libbinutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libctf-nobfd0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf-nobfd0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf-nobfd0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf-nobfd0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf-nobfd0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf-nobfd0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf-nobfd0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf-nobfd0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf-nobfd0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf-nobfd0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf-nobfd0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf-nobfd0 | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libctf-nobfd0 | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libctf-nobfd0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libctf0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf0 | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libctf0 | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libctf0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.2.1+dfsg-1 | 2:6.2.1+dfsg-1+deb11u1 |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libjansson4 | CVE-2020-36325 | LOW | 2.13.1-1.1 | |
Expand...https://github.com/akheron/jansson/issues/548
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblua5.3-0 | CVE-2019-6706 | HIGH | 5.3.3-1.1 | |
Expand...http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
http://lua.2524044.n2.nabble.com/CVE-2019-6706-use-after-free-in-lua-upvaluejoin-function-tc7685575.html
https://access.redhat.com/errata/RHSA-2019:3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706
https://linux.oracle.com/cve/CVE-2019-6706.html
https://linux.oracle.com/errata/ELSA-2019-3706.html
https://ubuntu.com/security/notices/USN-3941-1
https://usn.ubuntu.com/3941-1/
https://www.exploit-db.com/exploits/46246/
| +| liblua5.3-0 | CVE-2020-24370 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2020-07/msg00324.html
https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
https://linux.oracle.com/cve/CVE-2020-24370.html
https://linux.oracle.com/errata/ELSA-2021-4510.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/
| +| liblua5.3-0 | CVE-2021-43519 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
| +| libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| linux-libc-dev | CVE-2021-43267 | CRITICAL | 5.10.70-1 | 5.10.84-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267
https://git.kernel.org/linus/fa40d9734a57bcbfa79a280189799f76c88f7bb0 (5.15)
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
https://linux.oracle.com/cve/CVE-2021-43267.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://security.netapp.com/advisory/ntap-20211125-0002/
https://ubuntu.com/security/notices/USN-5165-1
https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.70-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.70-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.70-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-4028 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
https://lkml.org/lkml/2021/10/4/697
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 5.10.70-1 | |
Expand...https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.70-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.70-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.70-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://lkml.org/lkml/2021/8/28/238
https://www.openwall.com/lists/oss-security/2021/07/22/1
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.70-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://github.com/szymonh/inspector-gadget
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 5.10.70-1 | |
Expand...
| +| linux-libc-dev | CVE-2021-42327 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://lists.freedesktop.org/archives/amd-gfx/2021-October/070170.html
https://security.netapp.com/advisory/ntap-20211118-0005/
https://ubuntu.com/security/notices/USN-5165-1
https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43056 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.70-1 | |
Expand...https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2004-0230 | LOW | 5.10.70-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 5.10.70-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 5.10.70-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 5.10.70-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 5.10.70-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 5.10.70-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 5.10.70-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 5.10.70-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 5.10.70-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 5.10.70-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 5.10.70-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 5.10.70-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 5.10.70-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.10.70-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-16229 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 5.10.70-1 | 5.10.84-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.70-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3760 | LOW | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-45095 | UNKNOWN | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| m4 | CVE-2008-1687 | LOW | 1.4.18-5 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| +| m4 | CVE-2008-1688 | LOW | 1.4.18-5 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-7 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| re2c | CVE-2018-21232 | LOW | 2.0.3-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
https://github.com/skvadrik/re2c/issues/219
https://www.openwall.com/lists/oss-security/2020/04/27/2
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/nextcloud:v23.0.0@sha256:08937edce142d8bf675d5b2f8960fe91433fb59b209248f02742c784446d8b59 (debian 11.1) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2 | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2 | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2 | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2 | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2 | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2 | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-bin | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-bin | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-bin | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-bin | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-bin | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-bin | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-data | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-data | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-data | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-data | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-data | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-data | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-utils | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-utils | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-utils | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-utils | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-utils | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-utils | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| binutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-common | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-common | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-common | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-common | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-common | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-common | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-common | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-common | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-common | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-common | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-common | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-x86-64-linux-gnu | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| binutils-x86-64-linux-gnu | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| busybox-static | CVE-2021-42377 | CRITICAL | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-28831 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42378 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42379 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42380 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42381 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42382 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42383 | HIGH | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42384 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42385 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42386 | HIGH | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2018-1000500 | LOW | 1:1.30.1-6 | |
Expand...http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000500
https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
https://git.busybox.net/busybox/tree/networking/wget.c?id=8bc418f07eab79a9c8d26594629799f6157a9466#n74
https://ubuntu.com/security/notices/USN-4531-1
https://usn.ubuntu.com/4531-1/
| +| busybox-static | CVE-2021-42373 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42374 | LOW | 1:1.30.1-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox-static | CVE-2021-42375 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox-static | CVE-2021-42376 | LOW | 1:1.30.1-6 | |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578
https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e
https://bugs.chromium.org/p/aomedia/issues/detail?id=3000
| +| libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0
https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libbinutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libbinutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libbinutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libbinutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libbinutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libbinutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libbinutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libbinutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libbinutils | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libbinutils | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libbinutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libctf-nobfd0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf-nobfd0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf-nobfd0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf-nobfd0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf-nobfd0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf-nobfd0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf-nobfd0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf-nobfd0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf-nobfd0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf-nobfd0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf-nobfd0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf-nobfd0 | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libctf-nobfd0 | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libctf-nobfd0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libctf0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf0 | CVE-2021-3648 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3648
| +| libctf0 | CVE-2021-37322 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
| +| libctf0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.2.1+dfsg-1 | 2:6.2.1+dfsg-1+deb11u1 |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libjansson4 | CVE-2020-36325 | LOW | 2.13.1-1.1 | |
Expand...https://github.com/akheron/jansson/issues/548
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblua5.3-0 | CVE-2019-6706 | HIGH | 5.3.3-1.1 | |
Expand...http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
http://lua.2524044.n2.nabble.com/CVE-2019-6706-use-after-free-in-lua-upvaluejoin-function-tc7685575.html
https://access.redhat.com/errata/RHSA-2019:3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706
https://linux.oracle.com/cve/CVE-2019-6706.html
https://linux.oracle.com/errata/ELSA-2019-3706.html
https://ubuntu.com/security/notices/USN-3941-1
https://usn.ubuntu.com/3941-1/
https://www.exploit-db.com/exploits/46246/
| +| liblua5.3-0 | CVE-2020-24370 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2020-07/msg00324.html
https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
https://linux.oracle.com/cve/CVE-2020-24370.html
https://linux.oracle.com/errata/ELSA-2021-4510.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/
| +| liblua5.3-0 | CVE-2021-43519 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
| +| libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| linux-libc-dev | CVE-2021-43267 | CRITICAL | 5.10.70-1 | 5.10.84-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267
https://git.kernel.org/linus/fa40d9734a57bcbfa79a280189799f76c88f7bb0 (5.15)
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
https://linux.oracle.com/cve/CVE-2021-43267.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://security.netapp.com/advisory/ntap-20211125-0002/
https://ubuntu.com/security/notices/USN-5165-1
https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.70-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.70-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.70-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-4028 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
https://lkml.org/lkml/2021/10/4/697
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 5.10.70-1 | |
Expand...https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.70-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.70-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.70-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.70-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://lkml.org/lkml/2021/8/28/238
https://www.openwall.com/lists/oss-security/2021/07/22/1
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.70-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://github.com/szymonh/inspector-gadget
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 5.10.70-1 | |
Expand...
| +| linux-libc-dev | CVE-2021-42327 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://lists.freedesktop.org/archives/amd-gfx/2021-October/070170.html
https://security.netapp.com/advisory/ntap-20211118-0005/
https://ubuntu.com/security/notices/USN-5165-1
https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43056 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.70-1 | |
Expand...https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2004-0230 | LOW | 5.10.70-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 5.10.70-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 5.10.70-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 5.10.70-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 5.10.70-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 5.10.70-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 5.10.70-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 5.10.70-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 5.10.70-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 5.10.70-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 5.10.70-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 5.10.70-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 5.10.70-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.10.70-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 5.10.70-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-16229 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 5.10.70-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 5.10.70-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 5.10.70-1 | 5.10.84-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.70-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.70-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3760 | LOW | 5.10.70-1 | 5.10.84-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-45095 | UNKNOWN | 5.10.70-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| m4 | CVE-2008-1687 | LOW | 1.4.18-5 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| +| m4 | CVE-2008-1688 | LOW | 1.4.18-5 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-7 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| re2c | CVE-2018-21232 | LOW | 2.0.3-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
https://github.com/skvadrik/re2c/issues/219
https://www.openwall.com/lists/oss-security/2020/04/27/2
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:7a9857fa3f8626b7fd1cbbafaff00dea68a08a30973284c98f232c0168a75b5c (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/nextcloud/11.0.7/templates/_configmap.tpl b/stable/nextcloud/11.0.7/templates/_configmap.tpl new file mode 100644 index 00000000000..3bb5a51325b --- /dev/null +++ b/stable/nextcloud/11.0.7/templates/_configmap.tpl @@ -0,0 +1,35 @@ +{{/* Define the configmap */}} +{{- define "nextcloud.configmap" -}} + +{{- $hosts := "" }} +{{- if .Values.ingress.main.enabled }} +{{- range .Values.ingress }} +{{- range $index, $host := .hosts }} + {{- if $index }} + {{ $hosts = ( printf "%v %v" $hosts $host.host ) }} + {{- else }} + {{ $hosts = ( printf "%s" $host.host ) }} + {{- end }} +{{- end }} +{{- end }} +{{- end }} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: nextcloudconfig +data: + NEXTCLOUD_TRUSTED_DOMAINS: {{ ( printf "%v %v %v %v %v" "test.fakedomain.dns" ( .Values.env.NODE_IP | default "localhost" ) ( printf "%v-%v" .Release.Name "nextcloud" ) ( printf "%v-%v" .Release.Name "nextcloud-hpb" ) $hosts ) | quote }} + {{- if .Values.ingress.main.enabled }} + APACHE_DISABLE_REWRITE_IP: "1" + {{- end }} + +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: hpbconfig +data: + NEXTCLOUD_URL: {{ ( printf "%v-%v" .Release.Name "nextcloud" ) | quote }} + +{{- end -}} diff --git a/stable/nextcloud/11.0.7/templates/_cronjob.tpl b/stable/nextcloud/11.0.7/templates/_cronjob.tpl new file mode 100644 index 00000000000..96a0b6145c6 --- /dev/null +++ b/stable/nextcloud/11.0.7/templates/_cronjob.tpl @@ -0,0 +1,51 @@ +{{/* Define the cronjob */}} +{{- define "nextcloud.cronjob" -}} +{{- $jobName := include "common.names.fullname" . }} + +--- +apiVersion: batch/v1beta1 +kind: CronJob +metadata: + name: {{ printf "%s-cronjob" $jobName }} + labels: + {{- include "common.labels" . | nindent 4 }} +spec: + schedule: "{{ .Values.cronjob.schedule }}" + concurrencyPolicy: Forbid + {{- with .Values.cronjob.failedJobsHistoryLimit }} + failedJobsHistoryLimit: {{ . }} + {{- end }} + {{- with .Values.cronjob.successfulJobsHistoryLimit }} + successfulJobsHistoryLimit: {{ . }} + {{- end }} + jobTemplate: + metadata: + spec: + template: + metadata: + spec: + restartPolicy: Never + {{- with (include "common.controller.volumes" . | trim) }} + volumes: + {{- nindent 12 . }} + {{- end }} + containers: + - name: {{ .Chart.Name }} + image: "{{ .Values.image.repository }}:{{ default .Values.image.tag }}" + imagePullPolicy: {{ default .Values.image.pullPolicy }} + command: [ "php" ] + args: + - "-f" + - "/var/www/html/cron.php" + # Will mount configuration files as www-data (id: 33) by default for nextcloud + {{- with (include "common.controller.volumeMounts" . | trim) }} + volumeMounts: + {{ nindent 16 . }} + {{- end }} + securityContext: + runAsUser: 33 + runAsGroup: 33 + resources: +{{ toYaml .Values.resources | indent 16 }} + +{{- end -}} diff --git a/stable/nextcloud/11.0.7/templates/common.yaml b/stable/nextcloud/11.0.7/templates/common.yaml new file mode 100644 index 00000000000..801767a012a --- /dev/null +++ b/stable/nextcloud/11.0.7/templates/common.yaml @@ -0,0 +1,14 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render configmap for nextcloud */}} +{{- include "nextcloud.configmap" . }} + +{{- $newMiddlewares := append .Values.ingress.main.fixedMiddlewares "tc-nextcloud-chain" }} +{{- $_ := set .Values.ingress.main "fixedMiddlewares" $newMiddlewares -}} + +{{/* Render cronjob for nextcloud */}} +{{- include "nextcloud.cronjob" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/nzbget/9.0.25/values.yaml b/stable/nextcloud/11.0.7/values.yaml similarity index 100% rename from stable/nzbget/9.0.25/values.yaml rename to stable/nextcloud/11.0.7/values.yaml diff --git a/stable/ngircd/0.0.5/Chart.lock b/stable/ngircd/0.0.5/Chart.lock deleted file mode 100644 index 5c692784e9c..00000000000 --- a/stable/ngircd/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:04.030345552Z" diff --git a/stable/ngircd/0.0.5/CHANGELOG.md b/stable/ngircd/0.0.6/CHANGELOG.md similarity index 86% rename from stable/ngircd/0.0.5/CHANGELOG.md rename to stable/ngircd/0.0.6/CHANGELOG.md index 8586740f556..521fd4b22d1 100644 --- a/stable/ngircd/0.0.5/CHANGELOG.md +++ b/stable/ngircd/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ngircd-0.0.6](https://github.com/truecharts/apps/compare/ngircd-0.0.5...ngircd-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [ngircd-0.0.5](https://github.com/truecharts/apps/compare/ngircd-0.0.4...ngircd-0.0.5) (2021-12-19) diff --git a/stable/nzbhydra/9.0.28/CONFIG.md b/stable/ngircd/0.0.6/CONFIG.md similarity index 100% rename from stable/nzbhydra/9.0.28/CONFIG.md rename to stable/ngircd/0.0.6/CONFIG.md diff --git a/stable/ngircd/0.0.6/Chart.lock b/stable/ngircd/0.0.6/Chart.lock new file mode 100644 index 00000000000..a897b0833fc --- /dev/null +++ b/stable/ngircd/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:34.123520365Z" diff --git a/stable/ngircd/0.0.5/Chart.yaml b/stable/ngircd/0.0.6/Chart.yaml similarity index 98% rename from stable/ngircd/0.0.5/Chart.yaml rename to stable/ngircd/0.0.6/Chart.yaml index 6902b105a9d..59c131c10dd 100644 --- a/stable/ngircd/0.0.5/Chart.yaml +++ b/stable/ngircd/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: ngircd -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.21" description: Ngircd is a free, portable and lightweight Internet Relay Chat server for small or private networks. type: application diff --git a/stable/ngircd/0.0.5/README.md b/stable/ngircd/0.0.6/README.md similarity index 100% rename from stable/ngircd/0.0.5/README.md rename to stable/ngircd/0.0.6/README.md diff --git a/stable/ngircd/0.0.5/app-readme.md b/stable/ngircd/0.0.6/app-readme.md similarity index 100% rename from stable/ngircd/0.0.5/app-readme.md rename to stable/ngircd/0.0.6/app-readme.md diff --git a/stable/nzbhydra/9.0.28/charts/common-8.9.24.tgz b/stable/ngircd/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/nzbhydra/9.0.28/charts/common-8.9.24.tgz rename to stable/ngircd/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/ngircd/0.0.5/helm-values.md b/stable/ngircd/0.0.6/helm-values.md similarity index 100% rename from stable/ngircd/0.0.5/helm-values.md rename to stable/ngircd/0.0.6/helm-values.md diff --git a/stable/ngircd/0.0.5/ix_values.yaml b/stable/ngircd/0.0.6/ix_values.yaml similarity index 100% rename from stable/ngircd/0.0.5/ix_values.yaml rename to stable/ngircd/0.0.6/ix_values.yaml diff --git a/stable/ngircd/0.0.5/questions.yaml b/stable/ngircd/0.0.6/questions.yaml similarity index 100% rename from stable/ngircd/0.0.5/questions.yaml rename to stable/ngircd/0.0.6/questions.yaml diff --git a/stable/ngircd/0.0.5/security.md b/stable/ngircd/0.0.6/security.md similarity index 100% rename from stable/ngircd/0.0.5/security.md rename to stable/ngircd/0.0.6/security.md diff --git a/stable/node-red/9.0.25/templates/common.yaml b/stable/ngircd/0.0.6/templates/common.yaml similarity index 100% rename from stable/node-red/9.0.25/templates/common.yaml rename to stable/ngircd/0.0.6/templates/common.yaml diff --git a/stable/nzbhydra/9.0.28/values.yaml b/stable/ngircd/0.0.6/values.yaml similarity index 100% rename from stable/nzbhydra/9.0.28/values.yaml rename to stable/ngircd/0.0.6/values.yaml diff --git a/stable/nntp2nntp/0.0.5/Chart.lock b/stable/nntp2nntp/0.0.5/Chart.lock deleted file mode 100644 index 3c48225a4ca..00000000000 --- a/stable/nntp2nntp/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:09.385535521Z" diff --git a/stable/nntp2nntp/0.0.5/CHANGELOG.md b/stable/nntp2nntp/0.0.6/CHANGELOG.md similarity index 86% rename from stable/nntp2nntp/0.0.5/CHANGELOG.md rename to stable/nntp2nntp/0.0.6/CHANGELOG.md index 0988d750187..3ec882a3cfe 100644 --- a/stable/nntp2nntp/0.0.5/CHANGELOG.md +++ b/stable/nntp2nntp/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [nntp2nntp-0.0.6](https://github.com/truecharts/apps/compare/nntp2nntp-0.0.5...nntp2nntp-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [nntp2nntp-0.0.5](https://github.com/truecharts/apps/compare/nntp2nntp-0.0.4...nntp2nntp-0.0.5) (2021-12-19) diff --git a/stable/octoprint/4.0.26/CONFIG.md b/stable/nntp2nntp/0.0.6/CONFIG.md similarity index 100% rename from stable/octoprint/4.0.26/CONFIG.md rename to stable/nntp2nntp/0.0.6/CONFIG.md diff --git a/stable/nntp2nntp/0.0.6/Chart.lock b/stable/nntp2nntp/0.0.6/Chart.lock new file mode 100644 index 00000000000..392c7f99768 --- /dev/null +++ b/stable/nntp2nntp/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:41.634776275Z" diff --git a/stable/nntp2nntp/0.0.5/Chart.yaml b/stable/nntp2nntp/0.0.6/Chart.yaml similarity index 98% rename from stable/nntp2nntp/0.0.5/Chart.yaml rename to stable/nntp2nntp/0.0.6/Chart.yaml index 14c485c84eb..94a1de28a84 100644 --- a/stable/nntp2nntp/0.0.5/Chart.yaml +++ b/stable/nntp2nntp/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: nntp2nntp -version: 0.0.5 +version: 0.0.6 appVersion: "0.3.202111" description: Nntp2nntp proxy allow you to use your NNTP Account from multiple systems, each with own user name and password. type: application diff --git a/stable/nntp2nntp/0.0.5/README.md b/stable/nntp2nntp/0.0.6/README.md similarity index 100% rename from stable/nntp2nntp/0.0.5/README.md rename to stable/nntp2nntp/0.0.6/README.md diff --git a/stable/nntp2nntp/0.0.5/app-readme.md b/stable/nntp2nntp/0.0.6/app-readme.md similarity index 100% rename from stable/nntp2nntp/0.0.5/app-readme.md rename to stable/nntp2nntp/0.0.6/app-readme.md diff --git a/stable/octoprint/4.0.26/charts/common-8.9.24.tgz b/stable/nntp2nntp/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/octoprint/4.0.26/charts/common-8.9.24.tgz rename to stable/nntp2nntp/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/nntp2nntp/0.0.5/helm-values.md b/stable/nntp2nntp/0.0.6/helm-values.md similarity index 100% rename from stable/nntp2nntp/0.0.5/helm-values.md rename to stable/nntp2nntp/0.0.6/helm-values.md diff --git a/stable/nntp2nntp/0.0.5/ix_values.yaml b/stable/nntp2nntp/0.0.6/ix_values.yaml similarity index 100% rename from stable/nntp2nntp/0.0.5/ix_values.yaml rename to stable/nntp2nntp/0.0.6/ix_values.yaml diff --git a/stable/nntp2nntp/0.0.5/questions.yaml b/stable/nntp2nntp/0.0.6/questions.yaml similarity index 100% rename from stable/nntp2nntp/0.0.5/questions.yaml rename to stable/nntp2nntp/0.0.6/questions.yaml diff --git a/stable/nntp2nntp/0.0.5/security.md b/stable/nntp2nntp/0.0.6/security.md similarity index 100% rename from stable/nntp2nntp/0.0.5/security.md rename to stable/nntp2nntp/0.0.6/security.md diff --git a/stable/nullserv/4.0.24/templates/common.yaml b/stable/nntp2nntp/0.0.6/templates/common.yaml similarity index 100% rename from stable/nullserv/4.0.24/templates/common.yaml rename to stable/nntp2nntp/0.0.6/templates/common.yaml diff --git a/stable/octoprint/4.0.26/values.yaml b/stable/nntp2nntp/0.0.6/values.yaml similarity index 100% rename from stable/octoprint/4.0.26/values.yaml rename to stable/nntp2nntp/0.0.6/values.yaml diff --git a/stable/node-red/9.0.25/Chart.lock b/stable/node-red/9.0.25/Chart.lock deleted file mode 100644 index 7f7d46453be..00000000000 --- a/stable/node-red/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:13.418490528Z" diff --git a/stable/node-red/9.0.25/CHANGELOG.md b/stable/node-red/9.0.26/CHANGELOG.md similarity index 90% rename from stable/node-red/9.0.25/CHANGELOG.md rename to stable/node-red/9.0.26/CHANGELOG.md index d5433e5289a..bd16e4b5f41 100644 --- a/stable/node-red/9.0.25/CHANGELOG.md +++ b/stable/node-red/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [node-red-9.0.26](https://github.com/truecharts/apps/compare/node-red-9.0.25...node-red-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [node-red-9.0.25](https://github.com/truecharts/apps/compare/node-red-9.0.24...node-red-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [node-red-9.0.17](https://github.com/truecharts/apps/compare/node-red-9.0.16...node-red-9.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [node-red-9.0.16](https://github.com/truecharts/apps/compare/node-red-9.0.15...node-red-9.0.16) (2021-12-04) - diff --git a/stable/odoo/4.0.15/CONFIG.md b/stable/node-red/9.0.26/CONFIG.md similarity index 100% rename from stable/odoo/4.0.15/CONFIG.md rename to stable/node-red/9.0.26/CONFIG.md diff --git a/stable/node-red/9.0.26/Chart.lock b/stable/node-red/9.0.26/Chart.lock new file mode 100644 index 00000000000..520c4d13bf3 --- /dev/null +++ b/stable/node-red/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:44.522319017Z" diff --git a/stable/node-red/9.0.25/Chart.yaml b/stable/node-red/9.0.26/Chart.yaml similarity index 97% rename from stable/node-red/9.0.25/Chart.yaml rename to stable/node-red/9.0.26/Chart.yaml index d8bde0f3491..1f5e16faef5 100644 --- a/stable/node-red/9.0.25/Chart.yaml +++ b/stable/node-red/9.0.26/Chart.yaml @@ -20,7 +20,7 @@ name: node-red sources: - https://github.com/node-red/node-red-docker type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - tools diff --git a/stable/node-red/9.0.25/README.md b/stable/node-red/9.0.26/README.md similarity index 100% rename from stable/node-red/9.0.25/README.md rename to stable/node-red/9.0.26/README.md diff --git a/stable/node-red/9.0.25/app-readme.md b/stable/node-red/9.0.26/app-readme.md similarity index 100% rename from stable/node-red/9.0.25/app-readme.md rename to stable/node-red/9.0.26/app-readme.md diff --git a/stable/odoo/4.0.15/charts/common-8.9.24.tgz b/stable/node-red/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/odoo/4.0.15/charts/common-8.9.24.tgz rename to stable/node-red/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/node-red/9.0.25/helm-values.md b/stable/node-red/9.0.26/helm-values.md similarity index 100% rename from stable/node-red/9.0.25/helm-values.md rename to stable/node-red/9.0.26/helm-values.md diff --git a/stable/node-red/9.0.25/ix_values.yaml b/stable/node-red/9.0.26/ix_values.yaml similarity index 100% rename from stable/node-red/9.0.25/ix_values.yaml rename to stable/node-red/9.0.26/ix_values.yaml diff --git a/stable/node-red/9.0.25/questions.yaml b/stable/node-red/9.0.26/questions.yaml similarity index 99% rename from stable/node-red/9.0.25/questions.yaml rename to stable/node-red/9.0.26/questions.yaml index 94867254994..95987c28c59 100644 --- a/stable/node-red/9.0.25/questions.yaml +++ b/stable/node-red/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 1880 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/node-red/9.0.25/security.md b/stable/node-red/9.0.26/security.md similarity index 100% rename from stable/node-red/9.0.25/security.md rename to stable/node-red/9.0.26/security.md diff --git a/stable/nzbget/9.0.25/templates/common.yaml b/stable/node-red/9.0.26/templates/common.yaml similarity index 100% rename from stable/nzbget/9.0.25/templates/common.yaml rename to stable/node-red/9.0.26/templates/common.yaml diff --git a/stable/odoo/4.0.15/values.yaml b/stable/node-red/9.0.26/values.yaml similarity index 100% rename from stable/odoo/4.0.15/values.yaml rename to stable/node-red/9.0.26/values.yaml diff --git a/stable/novnc/1.0.24/Chart.lock b/stable/novnc/1.0.24/Chart.lock deleted file mode 100644 index 4807975346e..00000000000 --- a/stable/novnc/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:32.570242569Z" diff --git a/stable/novnc/1.0.24/CHANGELOG.md b/stable/novnc/1.0.25/CHANGELOG.md similarity index 90% rename from stable/novnc/1.0.24/CHANGELOG.md rename to stable/novnc/1.0.25/CHANGELOG.md index 0a50944b754..0cc1efcd265 100644 --- a/stable/novnc/1.0.24/CHANGELOG.md +++ b/stable/novnc/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [novnc-1.0.25](https://github.com/truecharts/apps/compare/novnc-1.0.24...novnc-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [novnc-1.0.24](https://github.com/truecharts/apps/compare/novnc-1.0.23...novnc-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [novnc-1.0.16](https://github.com/truecharts/apps/compare/novnc-1.0.15...novnc-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [novnc-1.0.15](https://github.com/truecharts/apps/compare/novnc-1.0.14...novnc-1.0.15) (2021-12-04) - diff --git a/stable/ombi/9.0.27/CONFIG.md b/stable/novnc/1.0.25/CONFIG.md similarity index 100% rename from stable/ombi/9.0.27/CONFIG.md rename to stable/novnc/1.0.25/CONFIG.md diff --git a/stable/novnc/1.0.25/Chart.lock b/stable/novnc/1.0.25/Chart.lock new file mode 100644 index 00000000000..0920a66a17a --- /dev/null +++ b/stable/novnc/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:25:57.944183813Z" diff --git a/stable/novnc/1.0.24/Chart.yaml b/stable/novnc/1.0.25/Chart.yaml similarity index 97% rename from stable/novnc/1.0.24/Chart.yaml rename to stable/novnc/1.0.25/Chart.yaml index 9b21d1d2c8b..45c763eed2b 100644 --- a/stable/novnc/1.0.24/Chart.yaml +++ b/stable/novnc/1.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: novnc sources: - https://novnc.com/ type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/novnc/1.0.24/README.md b/stable/novnc/1.0.25/README.md similarity index 100% rename from stable/novnc/1.0.24/README.md rename to stable/novnc/1.0.25/README.md diff --git a/stable/novnc/1.0.24/app-readme.md b/stable/novnc/1.0.25/app-readme.md similarity index 100% rename from stable/novnc/1.0.24/app-readme.md rename to stable/novnc/1.0.25/app-readme.md diff --git a/stable/ombi/9.0.27/charts/common-8.9.24.tgz b/stable/novnc/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/ombi/9.0.27/charts/common-8.9.24.tgz rename to stable/novnc/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/novnc/1.0.24/helm-values.md b/stable/novnc/1.0.25/helm-values.md similarity index 100% rename from stable/novnc/1.0.24/helm-values.md rename to stable/novnc/1.0.25/helm-values.md diff --git a/stable/novnc/1.0.24/ix_values.yaml b/stable/novnc/1.0.25/ix_values.yaml similarity index 100% rename from stable/novnc/1.0.24/ix_values.yaml rename to stable/novnc/1.0.25/ix_values.yaml diff --git a/stable/novnc/1.0.24/questions.yaml b/stable/novnc/1.0.25/questions.yaml similarity index 99% rename from stable/novnc/1.0.24/questions.yaml rename to stable/novnc/1.0.25/questions.yaml index bdfe4994d2d..14ac4240d0a 100644 --- a/stable/novnc/1.0.24/questions.yaml +++ b/stable/novnc/1.0.25/questions.yaml @@ -356,7 +356,6 @@ questions: schema: type: int default: 6080 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/novnc/1.0.24/security.md b/stable/novnc/1.0.25/security.md similarity index 100% rename from stable/novnc/1.0.24/security.md rename to stable/novnc/1.0.25/security.md diff --git a/stable/novnc/1.0.24/templates/common.yaml b/stable/novnc/1.0.25/templates/common.yaml similarity index 100% rename from stable/novnc/1.0.24/templates/common.yaml rename to stable/novnc/1.0.25/templates/common.yaml diff --git a/stable/ombi/9.0.27/values.yaml b/stable/novnc/1.0.25/values.yaml similarity index 100% rename from stable/ombi/9.0.27/values.yaml rename to stable/novnc/1.0.25/values.yaml diff --git a/stable/nullserv/4.0.24/Chart.lock b/stable/nullserv/4.0.24/Chart.lock deleted file mode 100644 index 7a4128fd333..00000000000 --- a/stable/nullserv/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:46.146177586Z" diff --git a/stable/nullserv/4.0.24/CHANGELOG.md b/stable/nullserv/4.0.25/CHANGELOG.md similarity index 85% rename from stable/nullserv/4.0.24/CHANGELOG.md rename to stable/nullserv/4.0.25/CHANGELOG.md index 228174e0662..b11f41983c2 100644 --- a/stable/nullserv/4.0.24/CHANGELOG.md +++ b/stable/nullserv/4.0.25/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [nullserv-4.0.25](https://github.com/truecharts/apps/compare/nullserv-4.0.24...nullserv-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [nullserv-4.0.24](https://github.com/truecharts/apps/compare/nullserv-4.0.23...nullserv-4.0.24) (2021-12-19) @@ -86,14 +97,3 @@ -### [nullserv-4.0.16](https://github.com/truecharts/apps/compare/nullserv-4.0.15...nullserv-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [nullserv-4.0.15](https://github.com/truecharts/apps/compare/nullserv-4.0.14...nullserv-4.0.15) (2021-12-04) - diff --git a/stable/onlyoffice-document-server/3.0.5/CONFIG.md b/stable/nullserv/4.0.25/CONFIG.md similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/CONFIG.md rename to stable/nullserv/4.0.25/CONFIG.md diff --git a/stable/nullserv/4.0.25/Chart.lock b/stable/nullserv/4.0.25/Chart.lock new file mode 100644 index 00000000000..1812b61a7fb --- /dev/null +++ b/stable/nullserv/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:26:06.532447726Z" diff --git a/stable/nullserv/4.0.24/Chart.yaml b/stable/nullserv/4.0.25/Chart.yaml similarity index 97% rename from stable/nullserv/4.0.24/Chart.yaml rename to stable/nullserv/4.0.25/Chart.yaml index 7b21a51bcb1..762ee9d8e76 100644 --- a/stable/nullserv/4.0.24/Chart.yaml +++ b/stable/nullserv/4.0.25/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: nullserv sources: - https://github.com/bmrzycki/nullserv -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/nullserv/4.0.24/README.md b/stable/nullserv/4.0.25/README.md similarity index 100% rename from stable/nullserv/4.0.24/README.md rename to stable/nullserv/4.0.25/README.md diff --git a/stable/nullserv/4.0.24/app-readme.md b/stable/nullserv/4.0.25/app-readme.md similarity index 100% rename from stable/nullserv/4.0.24/app-readme.md rename to stable/nullserv/4.0.25/app-readme.md diff --git a/stable/onlyoffice-document-server/3.0.5/charts/common-8.9.24.tgz b/stable/nullserv/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/charts/common-8.9.24.tgz rename to stable/nullserv/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/nullserv/4.0.24/helm-values.md b/stable/nullserv/4.0.25/helm-values.md similarity index 100% rename from stable/nullserv/4.0.24/helm-values.md rename to stable/nullserv/4.0.25/helm-values.md diff --git a/stable/nullserv/4.0.24/ix_values.yaml b/stable/nullserv/4.0.25/ix_values.yaml similarity index 100% rename from stable/nullserv/4.0.24/ix_values.yaml rename to stable/nullserv/4.0.25/ix_values.yaml diff --git a/stable/nullserv/4.0.24/questions.yaml b/stable/nullserv/4.0.25/questions.yaml similarity index 99% rename from stable/nullserv/4.0.24/questions.yaml rename to stable/nullserv/4.0.25/questions.yaml index 0b96dd1d5cb..9843616dffa 100644 --- a/stable/nullserv/4.0.24/questions.yaml +++ b/stable/nullserv/4.0.25/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10004 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -437,19 +436,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 10005 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/nullserv/4.0.24/security.md b/stable/nullserv/4.0.25/security.md similarity index 100% rename from stable/nullserv/4.0.24/security.md rename to stable/nullserv/4.0.25/security.md diff --git a/stable/nzbhydra/9.0.28/templates/common.yaml b/stable/nullserv/4.0.25/templates/common.yaml similarity index 100% rename from stable/nzbhydra/9.0.28/templates/common.yaml rename to stable/nullserv/4.0.25/templates/common.yaml diff --git a/stable/onlyoffice-document-server/3.0.5/values.yaml b/stable/nullserv/4.0.25/values.yaml similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/values.yaml rename to stable/nullserv/4.0.25/values.yaml diff --git a/stable/nzbget/9.0.25/Chart.lock b/stable/nzbget/9.0.25/Chart.lock deleted file mode 100644 index b70252537a0..00000000000 --- a/stable/nzbget/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:54.365817837Z" diff --git a/stable/nzbget/9.0.25/CHANGELOG.md b/stable/nzbget/9.0.26/CHANGELOG.md similarity index 90% rename from stable/nzbget/9.0.25/CHANGELOG.md rename to stable/nzbget/9.0.26/CHANGELOG.md index 2ca16acd382..c9f40931b91 100644 --- a/stable/nzbget/9.0.25/CHANGELOG.md +++ b/stable/nzbget/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [nzbget-9.0.26](https://github.com/truecharts/apps/compare/nzbget-9.0.25...nzbget-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [nzbget-9.0.25](https://github.com/truecharts/apps/compare/nzbget-9.0.24...nzbget-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [nzbget-9.0.17](https://github.com/truecharts/apps/compare/nzbget-9.0.16...nzbget-9.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [nzbget-9.0.16](https://github.com/truecharts/apps/compare/nzbget-9.0.15...nzbget-9.0.16) (2021-12-04) - diff --git a/stable/openkm/4.0.15/CONFIG.md b/stable/nzbget/9.0.26/CONFIG.md similarity index 100% rename from stable/openkm/4.0.15/CONFIG.md rename to stable/nzbget/9.0.26/CONFIG.md diff --git a/stable/nzbget/9.0.26/Chart.lock b/stable/nzbget/9.0.26/Chart.lock new file mode 100644 index 00000000000..6f466569b38 --- /dev/null +++ b/stable/nzbget/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:26:20.432962088Z" diff --git a/stable/nzbget/9.0.25/Chart.yaml b/stable/nzbget/9.0.26/Chart.yaml similarity index 97% rename from stable/nzbget/9.0.25/Chart.yaml rename to stable/nzbget/9.0.26/Chart.yaml index 9f139278d90..0d44a695ab0 100644 --- a/stable/nzbget/9.0.25/Chart.yaml +++ b/stable/nzbget/9.0.26/Chart.yaml @@ -20,7 +20,7 @@ name: nzbget sources: - https://nzbget.net/ type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/nzbget/9.0.25/README.md b/stable/nzbget/9.0.26/README.md similarity index 100% rename from stable/nzbget/9.0.25/README.md rename to stable/nzbget/9.0.26/README.md diff --git a/stable/nzbget/9.0.25/app-readme.md b/stable/nzbget/9.0.26/app-readme.md similarity index 100% rename from stable/nzbget/9.0.25/app-readme.md rename to stable/nzbget/9.0.26/app-readme.md diff --git a/stable/openkm/4.0.15/charts/common-8.9.24.tgz b/stable/nzbget/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/openkm/4.0.15/charts/common-8.9.24.tgz rename to stable/nzbget/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/nzbget/9.0.25/helm-values.md b/stable/nzbget/9.0.26/helm-values.md similarity index 100% rename from stable/nzbget/9.0.25/helm-values.md rename to stable/nzbget/9.0.26/helm-values.md diff --git a/stable/nzbget/9.0.25/ix_values.yaml b/stable/nzbget/9.0.26/ix_values.yaml similarity index 100% rename from stable/nzbget/9.0.25/ix_values.yaml rename to stable/nzbget/9.0.26/ix_values.yaml diff --git a/stable/nzbget/9.0.25/questions.yaml b/stable/nzbget/9.0.26/questions.yaml similarity index 99% rename from stable/nzbget/9.0.25/questions.yaml rename to stable/nzbget/9.0.26/questions.yaml index d2baec578e1..03d5c9fddc9 100644 --- a/stable/nzbget/9.0.25/questions.yaml +++ b/stable/nzbget/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10057 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/nzbget/9.0.25/security.md b/stable/nzbget/9.0.26/security.md similarity index 100% rename from stable/nzbget/9.0.25/security.md rename to stable/nzbget/9.0.26/security.md diff --git a/stable/octoprint/4.0.26/templates/common.yaml b/stable/nzbget/9.0.26/templates/common.yaml similarity index 100% rename from stable/octoprint/4.0.26/templates/common.yaml rename to stable/nzbget/9.0.26/templates/common.yaml diff --git a/stable/openkm/4.0.15/values.yaml b/stable/nzbget/9.0.26/values.yaml similarity index 100% rename from stable/openkm/4.0.15/values.yaml rename to stable/nzbget/9.0.26/values.yaml diff --git a/stable/nzbhydra/9.0.28/Chart.lock b/stable/nzbhydra/9.0.28/Chart.lock deleted file mode 100644 index ad6290ffb1c..00000000000 --- a/stable/nzbhydra/9.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:55.645583142Z" diff --git a/stable/nzbhydra/9.0.28/CHANGELOG.md b/stable/nzbhydra/9.0.29/CHANGELOG.md similarity index 89% rename from stable/nzbhydra/9.0.28/CHANGELOG.md rename to stable/nzbhydra/9.0.29/CHANGELOG.md index e4f7bb93edc..8ec2903466f 100644 --- a/stable/nzbhydra/9.0.28/CHANGELOG.md +++ b/stable/nzbhydra/9.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [nzbhydra-9.0.29](https://github.com/truecharts/apps/compare/nzbhydra-9.0.28...nzbhydra-9.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [nzbhydra-9.0.28](https://github.com/truecharts/apps/compare/nzbhydra-9.0.27...nzbhydra-9.0.28) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [nzbhydra-9.0.19](https://github.com/truecharts/apps/compare/nzbhydra-9.0.18...nzbhydra-9.0.19) (2021-12-05) diff --git a/stable/openldap/5.0.7/CONFIG.md b/stable/nzbhydra/9.0.29/CONFIG.md similarity index 100% rename from stable/openldap/5.0.7/CONFIG.md rename to stable/nzbhydra/9.0.29/CONFIG.md diff --git a/stable/nzbhydra/9.0.29/Chart.lock b/stable/nzbhydra/9.0.29/Chart.lock new file mode 100644 index 00000000000..8beaff7432c --- /dev/null +++ b/stable/nzbhydra/9.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:26:24.101108416Z" diff --git a/stable/nzbhydra/9.0.28/Chart.yaml b/stable/nzbhydra/9.0.29/Chart.yaml similarity index 97% rename from stable/nzbhydra/9.0.28/Chart.yaml rename to stable/nzbhydra/9.0.29/Chart.yaml index 9ea4fd6236c..71fa588ef35 100644 --- a/stable/nzbhydra/9.0.28/Chart.yaml +++ b/stable/nzbhydra/9.0.29/Chart.yaml @@ -17,7 +17,7 @@ name: nzbhydra sources: - https://github.com/theotherp/nzbhydra2 type: application -version: 9.0.28 +version: 9.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/nzbhydra/9.0.28/README.md b/stable/nzbhydra/9.0.29/README.md similarity index 100% rename from stable/nzbhydra/9.0.28/README.md rename to stable/nzbhydra/9.0.29/README.md diff --git a/stable/nzbhydra/9.0.28/app-readme.md b/stable/nzbhydra/9.0.29/app-readme.md similarity index 100% rename from stable/nzbhydra/9.0.28/app-readme.md rename to stable/nzbhydra/9.0.29/app-readme.md diff --git a/stable/openldap/5.0.7/charts/common-8.9.24.tgz b/stable/nzbhydra/9.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/openldap/5.0.7/charts/common-8.9.24.tgz rename to stable/nzbhydra/9.0.29/charts/common-8.9.24.tgz diff --git a/stable/nzbhydra/9.0.28/helm-values.md b/stable/nzbhydra/9.0.29/helm-values.md similarity index 100% rename from stable/nzbhydra/9.0.28/helm-values.md rename to stable/nzbhydra/9.0.29/helm-values.md diff --git a/stable/nzbhydra/9.0.28/ix_values.yaml b/stable/nzbhydra/9.0.29/ix_values.yaml similarity index 100% rename from stable/nzbhydra/9.0.28/ix_values.yaml rename to stable/nzbhydra/9.0.29/ix_values.yaml diff --git a/stable/nzbhydra/9.0.28/questions.yaml b/stable/nzbhydra/9.0.29/questions.yaml similarity index 99% rename from stable/nzbhydra/9.0.28/questions.yaml rename to stable/nzbhydra/9.0.29/questions.yaml index 21b4c827a1c..3e5fcee0729 100644 --- a/stable/nzbhydra/9.0.28/questions.yaml +++ b/stable/nzbhydra/9.0.29/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 5076 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/nzbhydra/9.0.28/security.md b/stable/nzbhydra/9.0.29/security.md similarity index 100% rename from stable/nzbhydra/9.0.28/security.md rename to stable/nzbhydra/9.0.29/security.md diff --git a/stable/odoo/4.0.15/templates/common.yaml b/stable/nzbhydra/9.0.29/templates/common.yaml similarity index 100% rename from stable/odoo/4.0.15/templates/common.yaml rename to stable/nzbhydra/9.0.29/templates/common.yaml diff --git a/stable/openldap/5.0.7/values.yaml b/stable/nzbhydra/9.0.29/values.yaml similarity index 100% rename from stable/openldap/5.0.7/values.yaml rename to stable/nzbhydra/9.0.29/values.yaml diff --git a/stable/octoprint/4.0.26/Chart.lock b/stable/octoprint/4.0.26/Chart.lock deleted file mode 100644 index a76ab5cb7b5..00000000000 --- a/stable/octoprint/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:39:59.751840481Z" diff --git a/stable/octoprint/4.0.26/CHANGELOG.md b/stable/octoprint/4.0.27/CHANGELOG.md similarity index 90% rename from stable/octoprint/4.0.26/CHANGELOG.md rename to stable/octoprint/4.0.27/CHANGELOG.md index 29fe962e53c..9ed5f71803b 100644 --- a/stable/octoprint/4.0.26/CHANGELOG.md +++ b/stable/octoprint/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [octoprint-4.0.27](https://github.com/truecharts/apps/compare/octoprint-4.0.26...octoprint-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [octoprint-4.0.26](https://github.com/truecharts/apps/compare/octoprint-4.0.25...octoprint-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [octoprint-4.0.18](https://github.com/truecharts/apps/compare/octoprint-4.0.17...octoprint-4.0.18) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [octoprint-4.0.17](https://github.com/truecharts/apps/compare/octoprint-4.0.16...octoprint-4.0.17) (2021-12-04) - -#### Chore diff --git a/stable/openvscode-server/0.0.6/CONFIG.md b/stable/octoprint/4.0.27/CONFIG.md similarity index 100% rename from stable/openvscode-server/0.0.6/CONFIG.md rename to stable/octoprint/4.0.27/CONFIG.md diff --git a/stable/octoprint/4.0.27/Chart.lock b/stable/octoprint/4.0.27/Chart.lock new file mode 100644 index 00000000000..6a3d1f96251 --- /dev/null +++ b/stable/octoprint/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:26:28.675259879Z" diff --git a/stable/octoprint/4.0.26/Chart.yaml b/stable/octoprint/4.0.27/Chart.yaml similarity index 97% rename from stable/octoprint/4.0.26/Chart.yaml rename to stable/octoprint/4.0.27/Chart.yaml index b03b287da69..1ffb264e824 100644 --- a/stable/octoprint/4.0.26/Chart.yaml +++ b/stable/octoprint/4.0.27/Chart.yaml @@ -20,7 +20,7 @@ name: octoprint sources: - https://github.com/OctoPrint/OctoPrint - https://hub.docker.com/r/octoprint/octoprint -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/octoprint/4.0.26/README.md b/stable/octoprint/4.0.27/README.md similarity index 100% rename from stable/octoprint/4.0.26/README.md rename to stable/octoprint/4.0.27/README.md diff --git a/stable/octoprint/4.0.26/app-readme.md b/stable/octoprint/4.0.27/app-readme.md similarity index 100% rename from stable/octoprint/4.0.26/app-readme.md rename to stable/octoprint/4.0.27/app-readme.md diff --git a/stable/openvscode-server/0.0.6/charts/common-8.9.24.tgz b/stable/octoprint/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/openvscode-server/0.0.6/charts/common-8.9.24.tgz rename to stable/octoprint/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/octoprint/4.0.26/helm-values.md b/stable/octoprint/4.0.27/helm-values.md similarity index 100% rename from stable/octoprint/4.0.26/helm-values.md rename to stable/octoprint/4.0.27/helm-values.md diff --git a/stable/octoprint/4.0.26/ix_values.yaml b/stable/octoprint/4.0.27/ix_values.yaml similarity index 100% rename from stable/octoprint/4.0.26/ix_values.yaml rename to stable/octoprint/4.0.27/ix_values.yaml diff --git a/stable/octoprint/4.0.26/questions.yaml b/stable/octoprint/4.0.27/questions.yaml similarity index 99% rename from stable/octoprint/4.0.26/questions.yaml rename to stable/octoprint/4.0.27/questions.yaml index 2f4e000b71a..00581fef328 100644 --- a/stable/octoprint/4.0.26/questions.yaml +++ b/stable/octoprint/4.0.27/questions.yaml @@ -362,7 +362,6 @@ questions: schema: type: int default: 10021 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/octoprint/4.0.26/security.md b/stable/octoprint/4.0.27/security.md similarity index 100% rename from stable/octoprint/4.0.26/security.md rename to stable/octoprint/4.0.27/security.md diff --git a/stable/ombi/9.0.27/templates/common.yaml b/stable/octoprint/4.0.27/templates/common.yaml similarity index 100% rename from stable/ombi/9.0.27/templates/common.yaml rename to stable/octoprint/4.0.27/templates/common.yaml diff --git a/stable/openvscode-server/0.0.6/values.yaml b/stable/octoprint/4.0.27/values.yaml similarity index 100% rename from stable/openvscode-server/0.0.6/values.yaml rename to stable/octoprint/4.0.27/values.yaml diff --git a/stable/odoo/4.0.15/Chart.lock b/stable/odoo/4.0.15/Chart.lock deleted file mode 100644 index 9eee5131449..00000000000 --- a/stable/odoo/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:40:06.250801993Z" diff --git a/stable/odoo/4.0.15/CHANGELOG.md b/stable/odoo/4.0.16/CHANGELOG.md similarity index 83% rename from stable/odoo/4.0.15/CHANGELOG.md rename to stable/odoo/4.0.16/CHANGELOG.md index f6f47330e30..671fbb9653e 100644 --- a/stable/odoo/4.0.15/CHANGELOG.md +++ b/stable/odoo/4.0.16/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [odoo-4.0.16](https://github.com/truecharts/apps/compare/odoo-4.0.15...odoo-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [odoo-4.0.15](https://github.com/truecharts/apps/compare/odoo-4.0.14...odoo-4.0.15) (2021-12-19) @@ -85,15 +97,3 @@ - -### [odoo-4.0.7](https://github.com/truecharts/apps/compare/odoo-4.0.6...odoo-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [odoo-4.0.6](https://github.com/truecharts/apps/compare/odoo-4.0.5...odoo-4.0.6) (2021-12-04) - diff --git a/stable/organizr/9.0.25/CONFIG.md b/stable/odoo/4.0.16/CONFIG.md similarity index 100% rename from stable/organizr/9.0.25/CONFIG.md rename to stable/odoo/4.0.16/CONFIG.md diff --git a/stable/odoo/4.0.16/Chart.lock b/stable/odoo/4.0.16/Chart.lock new file mode 100644 index 00000000000..69ac8451ee1 --- /dev/null +++ b/stable/odoo/4.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:26:31.505073644Z" diff --git a/stable/odoo/4.0.15/Chart.yaml b/stable/odoo/4.0.16/Chart.yaml similarity index 98% rename from stable/odoo/4.0.15/Chart.yaml rename to stable/odoo/4.0.16/Chart.yaml index 0409ea99937..b4736de3d95 100644 --- a/stable/odoo/4.0.15/Chart.yaml +++ b/stable/odoo/4.0.16/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 appVersion: "14.0" -version: 4.0.15 +version: 4.0.16 kubeVersion: '>=1.16.0-0' name: odoo description: All-in-one business software. Beautiful. Easy-to-use. CRM, Accounting, PM, HR, Procurement, Point of Sale, MRP, Marketing, etc. diff --git a/stable/odoo/4.0.15/README.md b/stable/odoo/4.0.16/README.md similarity index 100% rename from stable/odoo/4.0.15/README.md rename to stable/odoo/4.0.16/README.md diff --git a/stable/odoo/4.0.15/app-readme.md b/stable/odoo/4.0.16/app-readme.md similarity index 100% rename from stable/odoo/4.0.15/app-readme.md rename to stable/odoo/4.0.16/app-readme.md diff --git a/stable/organizr/9.0.25/charts/common-8.9.24.tgz b/stable/odoo/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/organizr/9.0.25/charts/common-8.9.24.tgz rename to stable/odoo/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/quassel-core/0.0.6/charts/postgresql-6.0.34.tgz b/stable/odoo/4.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/quassel-core/0.0.6/charts/postgresql-6.0.34.tgz rename to stable/odoo/4.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/odoo/4.0.15/helm-values.md b/stable/odoo/4.0.16/helm-values.md similarity index 95% rename from stable/odoo/4.0.15/helm-values.md rename to stable/odoo/4.0.16/helm-values.md index 45891516d34..da0b81e70c3 100644 --- a/stable/odoo/4.0.15/helm-values.md +++ b/stable/odoo/4.0.16/helm-values.md @@ -11,8 +11,7 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| -| env | object | `{}` | | -| envTpl.USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/odoo/4.0.15/ix_values.yaml b/stable/odoo/4.0.16/ix_values.yaml similarity index 98% rename from stable/odoo/4.0.15/ix_values.yaml rename to stable/odoo/4.0.16/ix_values.yaml index 108b332b659..d79fe8c062e 100644 --- a/stable/odoo/4.0.15/ix_values.yaml +++ b/stable/odoo/4.0.16/ix_values.yaml @@ -9,11 +9,9 @@ secret: {} # See more environment variables in the odoo documentation # https://github.com/nicholaswilde/docker-odoo -env: {} - # HOST: "odoo-db" - -envTpl: +env: USER: "{{ .Values.postgresql.postgresqlUsername }}" + # HOST: "odoo-db" envValueFrom: PASSWORD: diff --git a/stable/odoo/4.0.15/questions.yaml b/stable/odoo/4.0.16/questions.yaml similarity index 99% rename from stable/odoo/4.0.15/questions.yaml rename to stable/odoo/4.0.16/questions.yaml index 7f90d8e899f..71ad7e7c064 100644 --- a/stable/odoo/4.0.15/questions.yaml +++ b/stable/odoo/4.0.16/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 8069 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -439,19 +438,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8071 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -492,19 +484,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8072 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/odoo/4.0.15/security.md b/stable/odoo/4.0.16/security.md similarity index 100% rename from stable/odoo/4.0.15/security.md rename to stable/odoo/4.0.16/security.md diff --git a/stable/onlyoffice-document-server/3.0.5/templates/common.yaml b/stable/odoo/4.0.16/templates/common.yaml similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/templates/common.yaml rename to stable/odoo/4.0.16/templates/common.yaml diff --git a/stable/organizr/9.0.25/values.yaml b/stable/odoo/4.0.16/values.yaml similarity index 100% rename from stable/organizr/9.0.25/values.yaml rename to stable/odoo/4.0.16/values.yaml diff --git a/stable/ombi/9.0.27/Chart.lock b/stable/ombi/9.0.27/Chart.lock deleted file mode 100644 index 6f21f12c772..00000000000 --- a/stable/ombi/9.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:40:14.879460719Z" diff --git a/stable/ombi/9.0.27/CHANGELOG.md b/stable/ombi/9.0.28/CHANGELOG.md similarity index 80% rename from stable/ombi/9.0.27/CHANGELOG.md rename to stable/ombi/9.0.28/CHANGELOG.md index ff69068a392..f55fd1ae896 100644 --- a/stable/ombi/9.0.27/CHANGELOG.md +++ b/stable/ombi/9.0.28/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [ombi-9.0.28](https://github.com/truecharts/apps/compare/ombi-9.0.27...ombi-9.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [ombi-9.0.27](https://github.com/truecharts/apps/compare/ombi-9.0.26...ombi-9.0.27) (2021-12-19) @@ -87,13 +97,3 @@ ### ombi-9.0.18 (2021-12-05) -#### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - diff --git a/stable/oscam/4.0.24/CONFIG.md b/stable/ombi/9.0.28/CONFIG.md similarity index 100% rename from stable/oscam/4.0.24/CONFIG.md rename to stable/ombi/9.0.28/CONFIG.md diff --git a/stable/ombi/9.0.28/Chart.lock b/stable/ombi/9.0.28/Chart.lock new file mode 100644 index 00000000000..f920f69b503 --- /dev/null +++ b/stable/ombi/9.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:26:41.875525713Z" diff --git a/stable/ombi/9.0.27/Chart.yaml b/stable/ombi/9.0.28/Chart.yaml similarity index 97% rename from stable/ombi/9.0.27/Chart.yaml rename to stable/ombi/9.0.28/Chart.yaml index 9a3c84421f3..20306a254b0 100644 --- a/stable/ombi/9.0.27/Chart.yaml +++ b/stable/ombi/9.0.28/Chart.yaml @@ -24,7 +24,7 @@ name: ombi sources: - https://github.com/tidusjar/Ombi type: application -version: 9.0.27 +version: 9.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/ombi/9.0.27/README.md b/stable/ombi/9.0.28/README.md similarity index 100% rename from stable/ombi/9.0.27/README.md rename to stable/ombi/9.0.28/README.md diff --git a/stable/ombi/9.0.27/app-readme.md b/stable/ombi/9.0.28/app-readme.md similarity index 100% rename from stable/ombi/9.0.27/app-readme.md rename to stable/ombi/9.0.28/app-readme.md diff --git a/stable/oscam/4.0.24/charts/common-8.9.24.tgz b/stable/ombi/9.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/oscam/4.0.24/charts/common-8.9.24.tgz rename to stable/ombi/9.0.28/charts/common-8.9.24.tgz diff --git a/stable/ombi/9.0.27/helm-values.md b/stable/ombi/9.0.28/helm-values.md similarity index 100% rename from stable/ombi/9.0.27/helm-values.md rename to stable/ombi/9.0.28/helm-values.md diff --git a/stable/ombi/9.0.27/ix_values.yaml b/stable/ombi/9.0.28/ix_values.yaml similarity index 100% rename from stable/ombi/9.0.27/ix_values.yaml rename to stable/ombi/9.0.28/ix_values.yaml diff --git a/stable/ombi/9.0.27/questions.yaml b/stable/ombi/9.0.28/questions.yaml similarity index 99% rename from stable/ombi/9.0.27/questions.yaml rename to stable/ombi/9.0.28/questions.yaml index d4aae21982a..e5eeaaace64 100644 --- a/stable/ombi/9.0.27/questions.yaml +++ b/stable/ombi/9.0.28/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 3579 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/ombi/9.0.27/security.md b/stable/ombi/9.0.28/security.md similarity index 100% rename from stable/ombi/9.0.27/security.md rename to stable/ombi/9.0.28/security.md diff --git a/stable/openvscode-server/0.0.6/templates/common.yaml b/stable/ombi/9.0.28/templates/common.yaml similarity index 100% rename from stable/openvscode-server/0.0.6/templates/common.yaml rename to stable/ombi/9.0.28/templates/common.yaml diff --git a/stable/oscam/4.0.24/values.yaml b/stable/ombi/9.0.28/values.yaml similarity index 100% rename from stable/oscam/4.0.24/values.yaml rename to stable/ombi/9.0.28/values.yaml diff --git a/stable/onlyoffice-document-server/3.0.5/Chart.lock b/stable/onlyoffice-document-server/3.0.5/Chart.lock deleted file mode 100644 index 4e1d8704777..00000000000 --- a/stable/onlyoffice-document-server/3.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:40:24.042948737Z" diff --git a/stable/onlyoffice-document-server/3.0.5/CHANGELOG.md b/stable/onlyoffice-document-server/3.0.6/CHANGELOG.md similarity index 90% rename from stable/onlyoffice-document-server/3.0.5/CHANGELOG.md rename to stable/onlyoffice-document-server/3.0.6/CHANGELOG.md index ca346ea06da..f2d2effb175 100644 --- a/stable/onlyoffice-document-server/3.0.5/CHANGELOG.md +++ b/stable/onlyoffice-document-server/3.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [onlyoffice-document-server-3.0.6](https://github.com/truecharts/apps/compare/onlyoffice-document-server-3.0.5...onlyoffice-document-server-3.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [onlyoffice-document-server-3.0.5](https://github.com/truecharts/apps/compare/onlyoffice-document-server-3.0.4...onlyoffice-document-server-3.0.5) (2021-12-19) @@ -87,13 +97,3 @@ ### [onlyoffice-document-server-2.0.17](https://github.com/truecharts/apps/compare/onlyoffice-document-server-2.0.16...onlyoffice-document-server-2.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [onlyoffice-document-server-2.0.16](https://github.com/truecharts/apps/compare/onlyoffice-document-server-2.0.15...onlyoffice-document-server-2.0.16) (2021-12-04) - diff --git a/stable/overseerr/4.0.24/CONFIG.md b/stable/onlyoffice-document-server/3.0.6/CONFIG.md similarity index 100% rename from stable/overseerr/4.0.24/CONFIG.md rename to stable/onlyoffice-document-server/3.0.6/CONFIG.md diff --git a/stable/jdownloader2/5.0.5/Chart.lock b/stable/onlyoffice-document-server/3.0.6/Chart.lock similarity index 79% rename from stable/jdownloader2/5.0.5/Chart.lock rename to stable/onlyoffice-document-server/3.0.6/Chart.lock index 88be27030fb..ef317d59ca3 100644 --- a/stable/jdownloader2/5.0.5/Chart.lock +++ b/stable/onlyoffice-document-server/3.0.6/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.24 digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:33:50.0456651Z" +generated: "2021-12-19T23:26:52.3291556Z" diff --git a/stable/onlyoffice-document-server/3.0.5/Chart.yaml b/stable/onlyoffice-document-server/3.0.6/Chart.yaml similarity index 98% rename from stable/onlyoffice-document-server/3.0.5/Chart.yaml rename to stable/onlyoffice-document-server/3.0.6/Chart.yaml index 32f887da1e2..044f8b40ad5 100644 --- a/stable/onlyoffice-document-server/3.0.5/Chart.yaml +++ b/stable/onlyoffice-document-server/3.0.6/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/ONLYOFFICE/DocumentServer - https://github.com/ONLYOFFICE/Docker-DocumentServer - https://hub.docker.com/r/onlyoffice/documentserver/ -version: 3.0.5 +version: 3.0.6 annotations: truecharts.org/catagories: | - office diff --git a/stable/onlyoffice-document-server/3.0.5/README.md b/stable/onlyoffice-document-server/3.0.6/README.md similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/README.md rename to stable/onlyoffice-document-server/3.0.6/README.md diff --git a/stable/onlyoffice-document-server/3.0.5/app-readme.md b/stable/onlyoffice-document-server/3.0.6/app-readme.md similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/app-readme.md rename to stable/onlyoffice-document-server/3.0.6/app-readme.md diff --git a/stable/overseerr/4.0.24/charts/common-8.9.24.tgz b/stable/onlyoffice-document-server/3.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/overseerr/4.0.24/charts/common-8.9.24.tgz rename to stable/onlyoffice-document-server/3.0.6/charts/common-8.9.24.tgz diff --git a/stable/onlyoffice-document-server/3.0.5/helm-values.md b/stable/onlyoffice-document-server/3.0.6/helm-values.md similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/helm-values.md rename to stable/onlyoffice-document-server/3.0.6/helm-values.md diff --git a/stable/onlyoffice-document-server/3.0.5/ix_values.yaml b/stable/onlyoffice-document-server/3.0.6/ix_values.yaml similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/ix_values.yaml rename to stable/onlyoffice-document-server/3.0.6/ix_values.yaml diff --git a/stable/onlyoffice-document-server/3.0.5/questions.yaml b/stable/onlyoffice-document-server/3.0.6/questions.yaml similarity index 99% rename from stable/onlyoffice-document-server/3.0.5/questions.yaml rename to stable/onlyoffice-document-server/3.0.6/questions.yaml index 7486409b669..c77e9a9abcf 100644 --- a/stable/onlyoffice-document-server/3.0.5/questions.yaml +++ b/stable/onlyoffice-document-server/3.0.6/questions.yaml @@ -372,7 +372,6 @@ questions: schema: type: int default: 10043 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/onlyoffice-document-server/3.0.5/security.md b/stable/onlyoffice-document-server/3.0.6/security.md similarity index 100% rename from stable/onlyoffice-document-server/3.0.5/security.md rename to stable/onlyoffice-document-server/3.0.6/security.md diff --git a/stable/organizr/9.0.25/templates/common.yaml b/stable/onlyoffice-document-server/3.0.6/templates/common.yaml similarity index 100% rename from stable/organizr/9.0.25/templates/common.yaml rename to stable/onlyoffice-document-server/3.0.6/templates/common.yaml diff --git a/stable/overseerr/4.0.24/values.yaml b/stable/onlyoffice-document-server/3.0.6/values.yaml similarity index 100% rename from stable/overseerr/4.0.24/values.yaml rename to stable/onlyoffice-document-server/3.0.6/values.yaml diff --git a/stable/openkm/4.0.15/Chart.lock b/stable/openkm/4.0.15/Chart.lock deleted file mode 100644 index a7f8b25944a..00000000000 --- a/stable/openkm/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:40:37.817520393Z" diff --git a/stable/openkm/4.0.15/CHANGELOG.md b/stable/openkm/4.0.16/CHANGELOG.md similarity index 90% rename from stable/openkm/4.0.15/CHANGELOG.md rename to stable/openkm/4.0.16/CHANGELOG.md index ea0f8dc9ba5..73031fd226c 100644 --- a/stable/openkm/4.0.15/CHANGELOG.md +++ b/stable/openkm/4.0.16/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [openkm-4.0.16](https://github.com/truecharts/apps/compare/openkm-4.0.15...openkm-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [openkm-4.0.15](https://github.com/truecharts/apps/compare/openkm-4.0.14...openkm-4.0.15) (2021-12-19) @@ -87,13 +97,3 @@ -### [openkm-4.0.7](https://github.com/truecharts/apps/compare/openkm-4.0.6...openkm-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [openkm-4.0.6](https://github.com/truecharts/apps/compare/openkm-4.0.5...openkm-4.0.6) (2021-12-04) diff --git a/stable/owncast/4.0.24/CONFIG.md b/stable/openkm/4.0.16/CONFIG.md similarity index 100% rename from stable/owncast/4.0.24/CONFIG.md rename to stable/openkm/4.0.16/CONFIG.md diff --git a/stable/openkm/4.0.16/Chart.lock b/stable/openkm/4.0.16/Chart.lock new file mode 100644 index 00000000000..be86d817de0 --- /dev/null +++ b/stable/openkm/4.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:27:07.855879671Z" diff --git a/stable/openkm/4.0.15/Chart.yaml b/stable/openkm/4.0.16/Chart.yaml similarity index 98% rename from stable/openkm/4.0.15/Chart.yaml rename to stable/openkm/4.0.16/Chart.yaml index 884b535dbdc..200024a1608 100644 --- a/stable/openkm/4.0.15/Chart.yaml +++ b/stable/openkm/4.0.16/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "6.3.11" description: OpenKM integrates all essential documents management, collaboration and an advanced search functionality into one easy to use solution. name: openkm -version: 4.0.15 +version: 4.0.16 kubeVersion: ">=1.16.0-0" keywords: - openkm diff --git a/stable/openkm/4.0.15/README.md b/stable/openkm/4.0.16/README.md similarity index 100% rename from stable/openkm/4.0.15/README.md rename to stable/openkm/4.0.16/README.md diff --git a/stable/openkm/4.0.15/app-readme.md b/stable/openkm/4.0.16/app-readme.md similarity index 100% rename from stable/openkm/4.0.15/app-readme.md rename to stable/openkm/4.0.16/app-readme.md diff --git a/stable/owncast/4.0.24/charts/common-8.9.24.tgz b/stable/openkm/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/owncast/4.0.24/charts/common-8.9.24.tgz rename to stable/openkm/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/recipes/5.0.1/charts/postgresql-6.0.34.tgz b/stable/openkm/4.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/recipes/5.0.1/charts/postgresql-6.0.34.tgz rename to stable/openkm/4.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/openkm/4.0.15/helm-values.md b/stable/openkm/4.0.16/helm-values.md similarity index 100% rename from stable/openkm/4.0.15/helm-values.md rename to stable/openkm/4.0.16/helm-values.md diff --git a/stable/openkm/4.0.15/ix_values.yaml b/stable/openkm/4.0.16/ix_values.yaml similarity index 100% rename from stable/openkm/4.0.15/ix_values.yaml rename to stable/openkm/4.0.16/ix_values.yaml diff --git a/stable/openkm/4.0.15/questions.yaml b/stable/openkm/4.0.16/questions.yaml similarity index 99% rename from stable/openkm/4.0.15/questions.yaml rename to stable/openkm/4.0.16/questions.yaml index 9d41a4936db..d4368c8f183 100644 --- a/stable/openkm/4.0.15/questions.yaml +++ b/stable/openkm/4.0.16/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10090 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/openkm/4.0.15/security.md b/stable/openkm/4.0.16/security.md similarity index 100% rename from stable/openkm/4.0.15/security.md rename to stable/openkm/4.0.16/security.md diff --git a/stable/openkm/4.0.15/templates/_configmap.tpl b/stable/openkm/4.0.16/templates/_configmap.tpl similarity index 100% rename from stable/openkm/4.0.15/templates/_configmap.tpl rename to stable/openkm/4.0.16/templates/_configmap.tpl diff --git a/stable/openkm/4.0.15/templates/common.yaml b/stable/openkm/4.0.16/templates/common.yaml similarity index 100% rename from stable/openkm/4.0.15/templates/common.yaml rename to stable/openkm/4.0.16/templates/common.yaml diff --git a/stable/owncast/4.0.24/values.yaml b/stable/openkm/4.0.16/values.yaml similarity index 100% rename from stable/owncast/4.0.24/values.yaml rename to stable/openkm/4.0.16/values.yaml diff --git a/stable/openldap/5.0.7/Chart.lock b/stable/openldap/5.0.7/Chart.lock deleted file mode 100644 index 063dbcb1370..00000000000 --- a/stable/openldap/5.0.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:41:07.416358742Z" diff --git a/stable/openldap/5.0.7/CHANGELOG.md b/stable/openldap/5.0.8/CHANGELOG.md similarity index 84% rename from stable/openldap/5.0.7/CHANGELOG.md rename to stable/openldap/5.0.8/CHANGELOG.md index e9614288c0f..8345305488b 100644 --- a/stable/openldap/5.0.7/CHANGELOG.md +++ b/stable/openldap/5.0.8/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [openldap-5.0.8](https://github.com/truecharts/apps/compare/openldap-5.0.7...openldap-5.0.8) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [openldap-5.0.7](https://github.com/truecharts/apps/compare/openldap-5.0.6...openldap-5.0.7) (2021-12-19) @@ -86,14 +97,3 @@ ### [openldap-4.0.24](https://github.com/truecharts/apps/compare/openldap-4.0.23...openldap-4.0.24) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - - -### openldap-4.0.23 (2021-12-05) - -#### Chore diff --git a/stable/owncloud-ocis/4.0.26/CONFIG.md b/stable/openldap/5.0.8/CONFIG.md similarity index 100% rename from stable/owncloud-ocis/4.0.26/CONFIG.md rename to stable/openldap/5.0.8/CONFIG.md diff --git a/stable/openldap/5.0.8/Chart.lock b/stable/openldap/5.0.8/Chart.lock new file mode 100644 index 00000000000..6ea89a83eff --- /dev/null +++ b/stable/openldap/5.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:27:32.791216762Z" diff --git a/stable/openldap/5.0.7/Chart.yaml b/stable/openldap/5.0.8/Chart.yaml similarity index 97% rename from stable/openldap/5.0.7/Chart.yaml rename to stable/openldap/5.0.8/Chart.yaml index 7a6c3142c8d..ec3f7edd086 100644 --- a/stable/openldap/5.0.7/Chart.yaml +++ b/stable/openldap/5.0.8/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/jp-gouin/helm-openldap - https://github.com/osixia/docker-openldap type: application -version: 5.0.7 +version: 5.0.8 annotations: truecharts.org/catagories: | - cloud diff --git a/stable/openldap/5.0.7/README.md b/stable/openldap/5.0.8/README.md similarity index 100% rename from stable/openldap/5.0.7/README.md rename to stable/openldap/5.0.8/README.md diff --git a/stable/openldap/5.0.7/app-readme.md b/stable/openldap/5.0.8/app-readme.md similarity index 100% rename from stable/openldap/5.0.7/app-readme.md rename to stable/openldap/5.0.8/app-readme.md diff --git a/stable/owncloud-ocis/4.0.26/charts/common-8.9.24.tgz b/stable/openldap/5.0.8/charts/common-8.9.24.tgz similarity index 100% rename from stable/owncloud-ocis/4.0.26/charts/common-8.9.24.tgz rename to stable/openldap/5.0.8/charts/common-8.9.24.tgz diff --git a/stable/openldap/5.0.7/helm-values.md b/stable/openldap/5.0.8/helm-values.md similarity index 100% rename from stable/openldap/5.0.7/helm-values.md rename to stable/openldap/5.0.8/helm-values.md diff --git a/stable/openldap/5.0.7/ix_values.yaml b/stable/openldap/5.0.8/ix_values.yaml similarity index 100% rename from stable/openldap/5.0.7/ix_values.yaml rename to stable/openldap/5.0.8/ix_values.yaml diff --git a/stable/openldap/5.0.7/questions.yaml b/stable/openldap/5.0.8/questions.yaml similarity index 99% rename from stable/openldap/5.0.7/questions.yaml rename to stable/openldap/5.0.8/questions.yaml index 9646b5c0421..c8f6acfc37f 100644 --- a/stable/openldap/5.0.7/questions.yaml +++ b/stable/openldap/5.0.8/questions.yaml @@ -465,7 +465,6 @@ questions: schema: type: int default: 389 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -559,19 +558,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 636 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/openldap/5.0.7/security.md b/stable/openldap/5.0.8/security.md similarity index 100% rename from stable/openldap/5.0.7/security.md rename to stable/openldap/5.0.8/security.md diff --git a/stable/openldap/5.0.7/templates/_configmap.tpl b/stable/openldap/5.0.8/templates/_configmap.tpl similarity index 100% rename from stable/openldap/5.0.7/templates/_configmap.tpl rename to stable/openldap/5.0.8/templates/_configmap.tpl diff --git a/stable/openldap/5.0.7/templates/common.yaml b/stable/openldap/5.0.8/templates/common.yaml similarity index 100% rename from stable/openldap/5.0.7/templates/common.yaml rename to stable/openldap/5.0.8/templates/common.yaml diff --git a/stable/owncloud-ocis/4.0.26/values.yaml b/stable/openldap/5.0.8/values.yaml similarity index 100% rename from stable/owncloud-ocis/4.0.26/values.yaml rename to stable/openldap/5.0.8/values.yaml diff --git a/stable/openvscode-server/0.0.6/Chart.lock b/stable/openvscode-server/0.0.6/Chart.lock deleted file mode 100644 index 4a4a7be0b67..00000000000 --- a/stable/openvscode-server/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:41:16.537118241Z" diff --git a/stable/openvscode-server/0.0.6/CHANGELOG.md b/stable/openvscode-server/0.0.7/CHANGELOG.md similarity index 88% rename from stable/openvscode-server/0.0.6/CHANGELOG.md rename to stable/openvscode-server/0.0.7/CHANGELOG.md index 96758eb0ede..9eaa0c3b756 100644 --- a/stable/openvscode-server/0.0.6/CHANGELOG.md +++ b/stable/openvscode-server/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [openvscode-server-0.0.7](https://github.com/truecharts/apps/compare/openvscode-server-0.0.6...openvscode-server-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [openvscode-server-0.0.6](https://github.com/truecharts/apps/compare/openvscode-server-0.0.5...openvscode-server-0.0.6) (2021-12-19) diff --git a/stable/paperless-ng/1.0.3/CONFIG.md b/stable/openvscode-server/0.0.7/CONFIG.md similarity index 100% rename from stable/paperless-ng/1.0.3/CONFIG.md rename to stable/openvscode-server/0.0.7/CONFIG.md diff --git a/stable/openvscode-server/0.0.7/Chart.lock b/stable/openvscode-server/0.0.7/Chart.lock new file mode 100644 index 00000000000..d230aa566e2 --- /dev/null +++ b/stable/openvscode-server/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:27:35.23841614Z" diff --git a/stable/openvscode-server/0.0.6/Chart.yaml b/stable/openvscode-server/0.0.7/Chart.yaml similarity index 98% rename from stable/openvscode-server/0.0.6/Chart.yaml rename to stable/openvscode-server/0.0.7/Chart.yaml index e9abfad0cd7..5a9cdb53385 100644 --- a/stable/openvscode-server/0.0.6/Chart.yaml +++ b/stable/openvscode-server/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: openvscode-server -version: 0.0.6 +version: 0.0.7 appVersion: "1.63.0" description: Openvscode-server provides a version of VS Code that runs a server on a remote machine. type: application diff --git a/stable/openvscode-server/0.0.6/README.md b/stable/openvscode-server/0.0.7/README.md similarity index 100% rename from stable/openvscode-server/0.0.6/README.md rename to stable/openvscode-server/0.0.7/README.md diff --git a/stable/openvscode-server/0.0.6/app-readme.md b/stable/openvscode-server/0.0.7/app-readme.md similarity index 100% rename from stable/openvscode-server/0.0.6/app-readme.md rename to stable/openvscode-server/0.0.7/app-readme.md diff --git a/stable/paperless-ng/1.0.3/charts/common-8.9.24.tgz b/stable/openvscode-server/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/paperless-ng/1.0.3/charts/common-8.9.24.tgz rename to stable/openvscode-server/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/openvscode-server/0.0.6/helm-values.md b/stable/openvscode-server/0.0.7/helm-values.md similarity index 100% rename from stable/openvscode-server/0.0.6/helm-values.md rename to stable/openvscode-server/0.0.7/helm-values.md diff --git a/stable/openvscode-server/0.0.6/ix_values.yaml b/stable/openvscode-server/0.0.7/ix_values.yaml similarity index 100% rename from stable/openvscode-server/0.0.6/ix_values.yaml rename to stable/openvscode-server/0.0.7/ix_values.yaml diff --git a/stable/openvscode-server/0.0.6/questions.yaml b/stable/openvscode-server/0.0.7/questions.yaml similarity index 100% rename from stable/openvscode-server/0.0.6/questions.yaml rename to stable/openvscode-server/0.0.7/questions.yaml diff --git a/stable/openvscode-server/0.0.6/security.md b/stable/openvscode-server/0.0.7/security.md similarity index 100% rename from stable/openvscode-server/0.0.6/security.md rename to stable/openvscode-server/0.0.7/security.md diff --git a/stable/oscam/4.0.24/templates/common.yaml b/stable/openvscode-server/0.0.7/templates/common.yaml similarity index 100% rename from stable/oscam/4.0.24/templates/common.yaml rename to stable/openvscode-server/0.0.7/templates/common.yaml diff --git a/stable/paperless-ng/1.0.3/values.yaml b/stable/openvscode-server/0.0.7/values.yaml similarity index 100% rename from stable/paperless-ng/1.0.3/values.yaml rename to stable/openvscode-server/0.0.7/values.yaml diff --git a/stable/organizr/9.0.25/Chart.lock b/stable/organizr/9.0.25/Chart.lock deleted file mode 100644 index 2aff9fbe4ff..00000000000 --- a/stable/organizr/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:41:34.276124933Z" diff --git a/stable/organizr/9.0.25/CHANGELOG.md b/stable/organizr/9.0.26/CHANGELOG.md similarity index 90% rename from stable/organizr/9.0.25/CHANGELOG.md rename to stable/organizr/9.0.26/CHANGELOG.md index ac3f1ca7a2d..82f417a3163 100644 --- a/stable/organizr/9.0.25/CHANGELOG.md +++ b/stable/organizr/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [organizr-9.0.26](https://github.com/truecharts/apps/compare/organizr-9.0.25...organizr-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [organizr-9.0.25](https://github.com/truecharts/apps/compare/organizr-9.0.24...organizr-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [organizr-9.0.17](https://github.com/truecharts/apps/compare/organizr-9.0.16...organizr-9.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [organizr-9.0.16](https://github.com/truecharts/apps/compare/organizr-9.0.15...organizr-9.0.16) (2021-12-04) - diff --git a/stable/papermerge/0.0.6/CONFIG.md b/stable/organizr/9.0.26/CONFIG.md similarity index 100% rename from stable/papermerge/0.0.6/CONFIG.md rename to stable/organizr/9.0.26/CONFIG.md diff --git a/stable/organizr/9.0.26/Chart.lock b/stable/organizr/9.0.26/Chart.lock new file mode 100644 index 00000000000..663c17c7ebf --- /dev/null +++ b/stable/organizr/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:28:00.250362529Z" diff --git a/stable/organizr/9.0.25/Chart.yaml b/stable/organizr/9.0.26/Chart.yaml similarity index 97% rename from stable/organizr/9.0.25/Chart.yaml rename to stable/organizr/9.0.26/Chart.yaml index f7ef3c68038..affb5771f35 100644 --- a/stable/organizr/9.0.25/Chart.yaml +++ b/stable/organizr/9.0.26/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/causefx/Organizr - https://hub.docker.com/r/organizr/organizr type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - organizers diff --git a/stable/organizr/9.0.25/README.md b/stable/organizr/9.0.26/README.md similarity index 100% rename from stable/organizr/9.0.25/README.md rename to stable/organizr/9.0.26/README.md diff --git a/stable/organizr/9.0.25/app-readme.md b/stable/organizr/9.0.26/app-readme.md similarity index 100% rename from stable/organizr/9.0.25/app-readme.md rename to stable/organizr/9.0.26/app-readme.md diff --git a/stable/papermerge/0.0.6/charts/common-8.9.24.tgz b/stable/organizr/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/papermerge/0.0.6/charts/common-8.9.24.tgz rename to stable/organizr/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/organizr/9.0.25/helm-values.md b/stable/organizr/9.0.26/helm-values.md similarity index 100% rename from stable/organizr/9.0.25/helm-values.md rename to stable/organizr/9.0.26/helm-values.md diff --git a/stable/organizr/9.0.25/ix_values.yaml b/stable/organizr/9.0.26/ix_values.yaml similarity index 100% rename from stable/organizr/9.0.25/ix_values.yaml rename to stable/organizr/9.0.26/ix_values.yaml diff --git a/stable/organizr/9.0.25/questions.yaml b/stable/organizr/9.0.26/questions.yaml similarity index 99% rename from stable/organizr/9.0.25/questions.yaml rename to stable/organizr/9.0.26/questions.yaml index 997bd4c4074..cc9667947e1 100644 --- a/stable/organizr/9.0.25/questions.yaml +++ b/stable/organizr/9.0.26/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10022 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/organizr/9.0.25/security.md b/stable/organizr/9.0.26/security.md similarity index 100% rename from stable/organizr/9.0.25/security.md rename to stable/organizr/9.0.26/security.md diff --git a/stable/overseerr/4.0.24/templates/common.yaml b/stable/organizr/9.0.26/templates/common.yaml similarity index 100% rename from stable/overseerr/4.0.24/templates/common.yaml rename to stable/organizr/9.0.26/templates/common.yaml diff --git a/stable/papermerge/0.0.6/values.yaml b/stable/organizr/9.0.26/values.yaml similarity index 100% rename from stable/papermerge/0.0.6/values.yaml rename to stable/organizr/9.0.26/values.yaml diff --git a/stable/oscam/4.0.24/Chart.lock b/stable/oscam/4.0.24/Chart.lock deleted file mode 100644 index d66287be9f3..00000000000 --- a/stable/oscam/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:41:43.2244689Z" diff --git a/stable/oscam/4.0.24/CHANGELOG.md b/stable/oscam/4.0.25/CHANGELOG.md similarity index 94% rename from stable/oscam/4.0.24/CHANGELOG.md rename to stable/oscam/4.0.25/CHANGELOG.md index afb1b9cf2f2..452218cdbf1 100644 --- a/stable/oscam/4.0.24/CHANGELOG.md +++ b/stable/oscam/4.0.25/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [oscam-4.0.25](https://github.com/truecharts/apps/compare/oscam-4.0.24...oscam-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [oscam-4.0.24](https://github.com/truecharts/apps/compare/oscam-4.0.23...oscam-4.0.24) (2021-12-19) @@ -88,12 +97,3 @@ ### [oscam-4.0.16](https://github.com/truecharts/apps/compare/oscam-4.0.15...oscam-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [oscam-4.0.15](https://github.com/truecharts/apps/compare/oscam-4.0.14...oscam-4.0.15) (2021-12-04) diff --git a/stable/pgadmin/5.0.5/CONFIG.md b/stable/oscam/4.0.25/CONFIG.md similarity index 100% rename from stable/pgadmin/5.0.5/CONFIG.md rename to stable/oscam/4.0.25/CONFIG.md diff --git a/stable/oscam/4.0.25/Chart.lock b/stable/oscam/4.0.25/Chart.lock new file mode 100644 index 00000000000..18152e36acf --- /dev/null +++ b/stable/oscam/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:28:11.313261561Z" diff --git a/stable/oscam/4.0.24/Chart.yaml b/stable/oscam/4.0.25/Chart.yaml similarity index 97% rename from stable/oscam/4.0.24/Chart.yaml rename to stable/oscam/4.0.25/Chart.yaml index 2fed9ee3576..ea75a7ea529 100644 --- a/stable/oscam/4.0.24/Chart.yaml +++ b/stable/oscam/4.0.25/Chart.yaml @@ -19,7 +19,7 @@ name: oscam sources: - https://trac.streamboard.tv/oscam/browser/trunk type: application -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - DIY diff --git a/stable/oscam/4.0.24/README.md b/stable/oscam/4.0.25/README.md similarity index 100% rename from stable/oscam/4.0.24/README.md rename to stable/oscam/4.0.25/README.md diff --git a/stable/oscam/4.0.24/app-readme.md b/stable/oscam/4.0.25/app-readme.md similarity index 100% rename from stable/oscam/4.0.24/app-readme.md rename to stable/oscam/4.0.25/app-readme.md diff --git a/stable/pgadmin/5.0.5/charts/common-8.9.24.tgz b/stable/oscam/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/pgadmin/5.0.5/charts/common-8.9.24.tgz rename to stable/oscam/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/oscam/4.0.24/helm-values.md b/stable/oscam/4.0.25/helm-values.md similarity index 100% rename from stable/oscam/4.0.24/helm-values.md rename to stable/oscam/4.0.25/helm-values.md diff --git a/stable/oscam/4.0.24/ix_values.yaml b/stable/oscam/4.0.25/ix_values.yaml similarity index 100% rename from stable/oscam/4.0.24/ix_values.yaml rename to stable/oscam/4.0.25/ix_values.yaml diff --git a/stable/oscam/4.0.24/questions.yaml b/stable/oscam/4.0.25/questions.yaml similarity index 100% rename from stable/oscam/4.0.24/questions.yaml rename to stable/oscam/4.0.25/questions.yaml diff --git a/stable/oscam/4.0.24/security.md b/stable/oscam/4.0.25/security.md similarity index 100% rename from stable/oscam/4.0.24/security.md rename to stable/oscam/4.0.25/security.md diff --git a/stable/owncast/4.0.24/templates/common.yaml b/stable/oscam/4.0.25/templates/common.yaml similarity index 100% rename from stable/owncast/4.0.24/templates/common.yaml rename to stable/oscam/4.0.25/templates/common.yaml diff --git a/stable/pgadmin/5.0.5/values.yaml b/stable/oscam/4.0.25/values.yaml similarity index 100% rename from stable/pgadmin/5.0.5/values.yaml rename to stable/oscam/4.0.25/values.yaml diff --git a/stable/overseerr/4.0.24/Chart.lock b/stable/overseerr/4.0.24/Chart.lock deleted file mode 100644 index 8954d570ccf..00000000000 --- a/stable/overseerr/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:42:14.684710251Z" diff --git a/stable/overseerr/4.0.24/CHANGELOG.md b/stable/overseerr/4.0.25/CHANGELOG.md similarity index 90% rename from stable/overseerr/4.0.24/CHANGELOG.md rename to stable/overseerr/4.0.25/CHANGELOG.md index 496011df5f2..ad9c6e2e11e 100644 --- a/stable/overseerr/4.0.24/CHANGELOG.md +++ b/stable/overseerr/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [overseerr-4.0.25](https://github.com/truecharts/apps/compare/overseerr-4.0.24...overseerr-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [overseerr-4.0.24](https://github.com/truecharts/apps/compare/overseerr-4.0.23...overseerr-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [overseerr-4.0.16](https://github.com/truecharts/apps/compare/overseerr-4.0.15...overseerr-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [overseerr-4.0.15](https://github.com/truecharts/apps/compare/overseerr-4.0.14...overseerr-4.0.15) (2021-12-04) diff --git a/stable/photoprism/7.0.7/CONFIG.md b/stable/overseerr/4.0.25/CONFIG.md similarity index 100% rename from stable/photoprism/7.0.7/CONFIG.md rename to stable/overseerr/4.0.25/CONFIG.md diff --git a/stable/overseerr/4.0.25/Chart.lock b/stable/overseerr/4.0.25/Chart.lock new file mode 100644 index 00000000000..1b0f10cace6 --- /dev/null +++ b/stable/overseerr/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:28:47.928633888Z" diff --git a/stable/overseerr/4.0.24/Chart.yaml b/stable/overseerr/4.0.25/Chart.yaml similarity index 98% rename from stable/overseerr/4.0.24/Chart.yaml rename to stable/overseerr/4.0.25/Chart.yaml index 0a2745f95bc..f7552f9f63f 100644 --- a/stable/overseerr/4.0.24/Chart.yaml +++ b/stable/overseerr/4.0.25/Chart.yaml @@ -23,7 +23,7 @@ name: overseerr sources: - https://github.com/sct/overseerr - https://hub.docker.com/r/sctx/overseerr -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/overseerr/4.0.24/README.md b/stable/overseerr/4.0.25/README.md similarity index 100% rename from stable/overseerr/4.0.24/README.md rename to stable/overseerr/4.0.25/README.md diff --git a/stable/overseerr/4.0.24/app-readme.md b/stable/overseerr/4.0.25/app-readme.md similarity index 100% rename from stable/overseerr/4.0.24/app-readme.md rename to stable/overseerr/4.0.25/app-readme.md diff --git a/stable/photoprism/7.0.7/charts/common-8.9.24.tgz b/stable/overseerr/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/photoprism/7.0.7/charts/common-8.9.24.tgz rename to stable/overseerr/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/overseerr/4.0.24/helm-values.md b/stable/overseerr/4.0.25/helm-values.md similarity index 100% rename from stable/overseerr/4.0.24/helm-values.md rename to stable/overseerr/4.0.25/helm-values.md diff --git a/stable/overseerr/4.0.24/ix_values.yaml b/stable/overseerr/4.0.25/ix_values.yaml similarity index 100% rename from stable/overseerr/4.0.24/ix_values.yaml rename to stable/overseerr/4.0.25/ix_values.yaml diff --git a/stable/overseerr/4.0.24/questions.yaml b/stable/overseerr/4.0.25/questions.yaml similarity index 99% rename from stable/overseerr/4.0.24/questions.yaml rename to stable/overseerr/4.0.25/questions.yaml index 255ccd87cd7..f97cd3414c0 100644 --- a/stable/overseerr/4.0.24/questions.yaml +++ b/stable/overseerr/4.0.25/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 5055 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/overseerr/4.0.24/security.md b/stable/overseerr/4.0.25/security.md similarity index 100% rename from stable/overseerr/4.0.24/security.md rename to stable/overseerr/4.0.25/security.md diff --git a/stable/owncloud-ocis/4.0.26/templates/common.yaml b/stable/overseerr/4.0.25/templates/common.yaml similarity index 100% rename from stable/owncloud-ocis/4.0.26/templates/common.yaml rename to stable/overseerr/4.0.25/templates/common.yaml diff --git a/stable/photoprism/7.0.7/values.yaml b/stable/overseerr/4.0.25/values.yaml similarity index 100% rename from stable/photoprism/7.0.7/values.yaml rename to stable/overseerr/4.0.25/values.yaml diff --git a/stable/owncast/4.0.24/Chart.lock b/stable/owncast/4.0.24/Chart.lock deleted file mode 100644 index 640d5859cb4..00000000000 --- a/stable/owncast/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:42:15.727726932Z" diff --git a/stable/owncast/4.0.24/CHANGELOG.md b/stable/owncast/4.0.25/CHANGELOG.md similarity index 85% rename from stable/owncast/4.0.24/CHANGELOG.md rename to stable/owncast/4.0.25/CHANGELOG.md index 2436a770e1e..60a199aae6d 100644 --- a/stable/owncast/4.0.24/CHANGELOG.md +++ b/stable/owncast/4.0.25/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [owncast-4.0.25](https://github.com/truecharts/apps/compare/owncast-4.0.24...owncast-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [owncast-4.0.24](https://github.com/truecharts/apps/compare/owncast-4.0.23...owncast-4.0.24) (2021-12-19) @@ -86,14 +97,3 @@ * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - -### [owncast-4.0.16](https://github.com/truecharts/apps/compare/owncast-4.0.15...owncast-4.0.16) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - diff --git a/stable/photoshow/1.0.28/CONFIG.md b/stable/owncast/4.0.25/CONFIG.md similarity index 100% rename from stable/photoshow/1.0.28/CONFIG.md rename to stable/owncast/4.0.25/CONFIG.md diff --git a/stable/owncast/4.0.25/Chart.lock b/stable/owncast/4.0.25/Chart.lock new file mode 100644 index 00000000000..56f241f58e1 --- /dev/null +++ b/stable/owncast/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:28:52.253672971Z" diff --git a/stable/owncast/4.0.24/Chart.yaml b/stable/owncast/4.0.25/Chart.yaml similarity index 97% rename from stable/owncast/4.0.24/Chart.yaml rename to stable/owncast/4.0.25/Chart.yaml index e0ab0e25790..b4c3ddc8974 100644 --- a/stable/owncast/4.0.24/Chart.yaml +++ b/stable/owncast/4.0.25/Chart.yaml @@ -22,7 +22,7 @@ name: owncast sources: - https://owncast.online/ - https://github.com/owncast/owncast -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/owncast/4.0.24/README.md b/stable/owncast/4.0.25/README.md similarity index 100% rename from stable/owncast/4.0.24/README.md rename to stable/owncast/4.0.25/README.md diff --git a/stable/owncast/4.0.24/app-readme.md b/stable/owncast/4.0.25/app-readme.md similarity index 100% rename from stable/owncast/4.0.24/app-readme.md rename to stable/owncast/4.0.25/app-readme.md diff --git a/stable/photoshow/1.0.28/charts/common-8.9.24.tgz b/stable/owncast/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/photoshow/1.0.28/charts/common-8.9.24.tgz rename to stable/owncast/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/owncast/4.0.24/helm-values.md b/stable/owncast/4.0.25/helm-values.md similarity index 100% rename from stable/owncast/4.0.24/helm-values.md rename to stable/owncast/4.0.25/helm-values.md diff --git a/stable/owncast/4.0.24/ix_values.yaml b/stable/owncast/4.0.25/ix_values.yaml similarity index 100% rename from stable/owncast/4.0.24/ix_values.yaml rename to stable/owncast/4.0.25/ix_values.yaml diff --git a/stable/owncast/4.0.24/questions.yaml b/stable/owncast/4.0.25/questions.yaml similarity index 99% rename from stable/owncast/4.0.24/questions.yaml rename to stable/owncast/4.0.25/questions.yaml index efb527afc8f..10b211288fa 100644 --- a/stable/owncast/4.0.24/questions.yaml +++ b/stable/owncast/4.0.25/questions.yaml @@ -352,7 +352,6 @@ questions: schema: type: int default: 10088 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -446,19 +445,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 1935 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/owncast/4.0.24/security.md b/stable/owncast/4.0.25/security.md similarity index 100% rename from stable/owncast/4.0.24/security.md rename to stable/owncast/4.0.25/security.md diff --git a/stable/papermerge/0.0.6/templates/common.yaml b/stable/owncast/4.0.25/templates/common.yaml similarity index 100% rename from stable/papermerge/0.0.6/templates/common.yaml rename to stable/owncast/4.0.25/templates/common.yaml diff --git a/stable/photoshow/1.0.28/values.yaml b/stable/owncast/4.0.25/values.yaml similarity index 100% rename from stable/photoshow/1.0.28/values.yaml rename to stable/owncast/4.0.25/values.yaml diff --git a/stable/owncloud-ocis/4.0.26/Chart.lock b/stable/owncloud-ocis/4.0.26/Chart.lock deleted file mode 100644 index 8d86636e6ea..00000000000 --- a/stable/owncloud-ocis/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:42:20.620870321Z" diff --git a/stable/owncloud-ocis/4.0.26/CHANGELOG.md b/stable/owncloud-ocis/4.0.27/CHANGELOG.md similarity index 90% rename from stable/owncloud-ocis/4.0.26/CHANGELOG.md rename to stable/owncloud-ocis/4.0.27/CHANGELOG.md index e01ec6517ff..30e43262bae 100644 --- a/stable/owncloud-ocis/4.0.26/CHANGELOG.md +++ b/stable/owncloud-ocis/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [owncloud-ocis-4.0.27](https://github.com/truecharts/apps/compare/owncloud-ocis-4.0.26...owncloud-ocis-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [owncloud-ocis-4.0.26](https://github.com/truecharts/apps/compare/owncloud-ocis-4.0.25...owncloud-ocis-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [owncloud-ocis-4.0.18](https://github.com/truecharts/apps/compare/owncloud-ocis-4.0.17...owncloud-ocis-4.0.18) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [owncloud-ocis-4.0.17](https://github.com/truecharts/apps/compare/owncloud-ocis-4.0.16...owncloud-ocis-4.0.17) (2021-12-04) - -#### Chore diff --git a/stable/phpldapadmin/4.0.25/CONFIG.md b/stable/owncloud-ocis/4.0.27/CONFIG.md similarity index 100% rename from stable/phpldapadmin/4.0.25/CONFIG.md rename to stable/owncloud-ocis/4.0.27/CONFIG.md diff --git a/stable/owncloud-ocis/4.0.27/Chart.lock b/stable/owncloud-ocis/4.0.27/Chart.lock new file mode 100644 index 00000000000..442b763c5d4 --- /dev/null +++ b/stable/owncloud-ocis/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:28:57.414047486Z" diff --git a/stable/owncloud-ocis/4.0.26/Chart.yaml b/stable/owncloud-ocis/4.0.27/Chart.yaml similarity index 97% rename from stable/owncloud-ocis/4.0.26/Chart.yaml rename to stable/owncloud-ocis/4.0.27/Chart.yaml index b3fcbcf2c13..19e6a77995d 100644 --- a/stable/owncloud-ocis/4.0.26/Chart.yaml +++ b/stable/owncloud-ocis/4.0.27/Chart.yaml @@ -25,7 +25,7 @@ name: owncloud-ocis sources: - https://hub.docker.com/r/owncloud/ocis - https://owncloud.dev/ocis/ -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/owncloud-ocis/4.0.26/README.md b/stable/owncloud-ocis/4.0.27/README.md similarity index 100% rename from stable/owncloud-ocis/4.0.26/README.md rename to stable/owncloud-ocis/4.0.27/README.md diff --git a/stable/owncloud-ocis/4.0.26/app-readme.md b/stable/owncloud-ocis/4.0.27/app-readme.md similarity index 100% rename from stable/owncloud-ocis/4.0.26/app-readme.md rename to stable/owncloud-ocis/4.0.27/app-readme.md diff --git a/stable/phpldapadmin/4.0.25/charts/common-8.9.24.tgz b/stable/owncloud-ocis/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/phpldapadmin/4.0.25/charts/common-8.9.24.tgz rename to stable/owncloud-ocis/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/owncloud-ocis/4.0.26/helm-values.md b/stable/owncloud-ocis/4.0.27/helm-values.md similarity index 100% rename from stable/owncloud-ocis/4.0.26/helm-values.md rename to stable/owncloud-ocis/4.0.27/helm-values.md diff --git a/stable/owncloud-ocis/4.0.26/ix_values.yaml b/stable/owncloud-ocis/4.0.27/ix_values.yaml similarity index 100% rename from stable/owncloud-ocis/4.0.26/ix_values.yaml rename to stable/owncloud-ocis/4.0.27/ix_values.yaml diff --git a/stable/owncloud-ocis/4.0.26/questions.yaml b/stable/owncloud-ocis/4.0.27/questions.yaml similarity index 99% rename from stable/owncloud-ocis/4.0.26/questions.yaml rename to stable/owncloud-ocis/4.0.27/questions.yaml index 51f8808f046..ce041b0a6b8 100644 --- a/stable/owncloud-ocis/4.0.26/questions.yaml +++ b/stable/owncloud-ocis/4.0.27/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 9200 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/owncloud-ocis/4.0.26/security.md b/stable/owncloud-ocis/4.0.27/security.md similarity index 100% rename from stable/owncloud-ocis/4.0.26/security.md rename to stable/owncloud-ocis/4.0.27/security.md diff --git a/stable/pgadmin/5.0.5/templates/common.yaml b/stable/owncloud-ocis/4.0.27/templates/common.yaml similarity index 100% rename from stable/pgadmin/5.0.5/templates/common.yaml rename to stable/owncloud-ocis/4.0.27/templates/common.yaml diff --git a/stable/phpldapadmin/4.0.25/values.yaml b/stable/owncloud-ocis/4.0.27/values.yaml similarity index 100% rename from stable/phpldapadmin/4.0.25/values.yaml rename to stable/owncloud-ocis/4.0.27/values.yaml diff --git a/stable/paperless-ng/1.0.3/CHANGELOG.md b/stable/paperless-ng/1.0.4/CHANGELOG.md similarity index 87% rename from stable/paperless-ng/1.0.3/CHANGELOG.md rename to stable/paperless-ng/1.0.4/CHANGELOG.md index 08c64232398..394e7e592b0 100644 --- a/stable/paperless-ng/1.0.3/CHANGELOG.md +++ b/stable/paperless-ng/1.0.4/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [paperless-ng-1.0.4](https://github.com/truecharts/apps/compare/paperless-ng-1.0.3...paperless-ng-1.0.4) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) + + + ### [paperless-ng-1.0.3](https://github.com/truecharts/apps/compare/paperless-ng-1.0.2...paperless-ng-1.0.3) (2021-12-19) diff --git a/stable/piaware/4.0.28/CONFIG.md b/stable/paperless-ng/1.0.4/CONFIG.md similarity index 100% rename from stable/piaware/4.0.28/CONFIG.md rename to stable/paperless-ng/1.0.4/CONFIG.md diff --git a/stable/paperless-ng/1.0.4/Chart.lock b/stable/paperless-ng/1.0.4/Chart.lock new file mode 100644 index 00000000000..d0fce597a44 --- /dev/null +++ b/stable/paperless-ng/1.0.4/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +- name: redis + repository: https://truecharts.org + version: 1.0.39 +digest: sha256:c2c7ac7915e674cd178c16d569e957b93faa00b4b4eb4bd3eead9a2b29c26a3f +generated: "2021-12-19T23:28:59.929316233Z" diff --git a/stable/paperless-ng/1.0.3/Chart.yaml b/stable/paperless-ng/1.0.4/Chart.yaml similarity index 98% rename from stable/paperless-ng/1.0.3/Chart.yaml rename to stable/paperless-ng/1.0.4/Chart.yaml index ce34236cf81..55592e8f41d 100644 --- a/stable/paperless-ng/1.0.3/Chart.yaml +++ b/stable/paperless-ng/1.0.4/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: paperless-ng -version: 1.0.3 +version: 1.0.4 appVersion: "1.5.0" description: Paperless-ng is an application by Daniel Quinn and contributors that indexes your scanned documents. type: application diff --git a/stable/paperless-ng/1.0.3/README.md b/stable/paperless-ng/1.0.4/README.md similarity index 100% rename from stable/paperless-ng/1.0.3/README.md rename to stable/paperless-ng/1.0.4/README.md diff --git a/stable/paperless-ng/1.0.3/app-readme.md b/stable/paperless-ng/1.0.4/app-readme.md similarity index 100% rename from stable/paperless-ng/1.0.3/app-readme.md rename to stable/paperless-ng/1.0.4/app-readme.md diff --git a/stable/piaware/4.0.28/charts/common-8.9.24.tgz b/stable/paperless-ng/1.0.4/charts/common-8.9.24.tgz similarity index 100% rename from stable/piaware/4.0.28/charts/common-8.9.24.tgz rename to stable/paperless-ng/1.0.4/charts/common-8.9.24.tgz diff --git a/stable/shiori/4.0.15/charts/postgresql-6.0.34.tgz b/stable/paperless-ng/1.0.4/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/shiori/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/paperless-ng/1.0.4/charts/postgresql-6.0.34.tgz diff --git a/stable/paperless-ng/1.0.4/charts/redis-1.0.39.tgz b/stable/paperless-ng/1.0.4/charts/redis-1.0.39.tgz new file mode 100644 index 0000000000000000000000000000000000000000..16aae70b684e14d43e60730d45156cd656ee38c9 GIT binary patch literal 65304 zcma%?V{m3qu<+xJjg2?9ZQHhO+Z!jlNj5g0m``kPoIJ5@+kE$bZ{6?j`7kxr=Ty&3 zP4(&SU(XQ7!eWB`_k7WS(V0lAGMh;&aLW7eaG0`bGMlS$*yyV9a4KnPaw=%q+nP9< z`>3lp2}oPmJAj>cz4>MhEpoqqR#$F&bZq6gJ2M37b1#DbP)eP#mt1G^LCVvIjHA>{IXXS=6&)nk(DlFp~@ z%oi=r9)#rejQ|Ilg<{kkHqww8ed_5c4&{aUF@Pz`vn^-;ZpxJ9CmH`OL{>z{dMWs@ z3jrvDyB`MG<}t~bwInv72rSDzt%JaLtGiId+V7IlD->q=sZ=P11dkRn>2;o?TrN=; zhW}_6ZsQ<|E5rLTcn{*#uYk~}Z-bF5j#OwJE6mjZGOlA(#a1jJ3J@YAhQ1s)xS8`j ze;~?)4EvEgaERmy$I)izJG^B~Rigjh2b>Uj$WYbE@b5_65Rip@6QG)bg@PXUq%?%SkG)I3UA2*pPVXBp_*)RMeBFiQvZqaN!ZciSj=_{C z!&M$aSK8yV1ghE)V?X%t-w?I64V#EG&UE50THH&HE7!q~}fvxWSqP&;IGh zFcJ5oIRoUkZZix{k8g7!;bP2~4}C|58b% z!JM0wkRcC6^RNjfv%PfXgZ(igHYoN1LEDkoim+b*s31*b*9q*It9?&ZYX8g_gl#DX ztI__dppLmaGfMp%_^~x?rgR;3IaPf>lMWRPU?^iRXFlW>^2}BP0Y^6&z0A9A3+I9( z=6|CvAjf;Q;g?i@u<5qCr|V$dHN-Q;-6us! zNx^9GG%ds^L&0y>sjmqlVc`C3IrD>Z=AvSUlCuJK(SI9{bQ_rrbMnNWxRXRej%Cby zb#}mc6kYLP%taqXu@8Pi5jpO`Ht-b%M4PVl;9T9iIDj5n>D%sCi6=7KMK4G9{ zG{+~-tfNS7Yfxoz7i!5z@{y-n+;f*mIa1Oc?Jr_L%z3bf^3R9{sTv$*M!YqXTZYo0 zmR~5Xnnh0;fA^K4sCx*VPj^e(`=Jw0=#Cg+qemXfGNWjm9ERKgj&S*54N; zS!#&t67&va`_8=S5;MTeqKQtI81W~5z}ZSzXw}5Lqv+1OnF_{ImucXO{F*X+l}&UG zh@|s^bAS0u_atkb|K%;{b3kC5bSpzurzZ3*)o&zVw_XP%ux+2l4U}oiQ9r_^wC*p! z;#0g`Lgv~hat(UFd8$gZ^KBWw06eDWHCa>P+AU(h(a4|x$bm$orYJxzhpP){+o-ZwLugA{bfDRMqDd7Gv7Rt85=FcmF!N#}wT#wy-r-esALo z1<#r*4Y6W|u~;eMmY$?~+&RjFwEcM7LUH9_V!?wEH37-mgo35=c_g zCS?18a7FkQ(aw(eV&1=YUMoH(2?V{#JQQ3zUn4z%{85*Ai?c-tuRIg5(;55r5V4N5 zrgM_Zhx%Q3kf1G{N7`dqtV_e1OV|+TH;~&#_5x)DKl)d&y^j8_R};o1wG=2tJ8V!~ zK}>acl#VEsw#pDlZkiK4{7q*yo~kc5bJbCb_|^N%PtUM7@bEW%0g+`{oT{(rsWQ4s z(p$0i2GdsQeyPVVfnh|qU(Mso2BfPo0jm85OI-v-{CP9?d*@DZIw;E=R!r!d7;$n! zKB})Yzi2!Qf!k}B$6|^j--gMSaU;x-ku2#~20csRSaM<)*i2u2=+sPO0ubB^fB6k0 z72>@drDLhd#>|lt|4Hs>%*DXfs>nq%L9?0kKgM}n7303PL0vTw-%t;(Cz7YIhtK+b z1oc+#tp^;l3ic3X)p(fe&PH0zVo{hkV5%l3q@xVsS+nRtN1IakYp@yrjfRkh4K?uJ z4;v--fdp?3h2}ZF$3G7X$tIbaRA#j2F6c-VT8Mtpd=SlQ)kM_!=3_jpaHlX>DXUFw zTOM}{SWUX#z^N81rW>%kRl4FLZJJg)9xRT_8@sd_7W8xApP+yOf z{B5@_>~*5+0@_!D&_n$s`{=1!2mhzCHvIE7@!jBG))9tsgwPjq;^W!ybJ`z@v@3Aaj-_WvG9> zp!D?0&0fLry$rTB+o^Kx0>YY{*Vku4pm# z(Lo+G(XHI__v%5X^;veijUFBARf*+)jioZ~7VGcOwCj$)`XLh<&2IK?MmPIrDofXO zL=mkbv-c>HJd-osx%)|eql=k~QW-jH3B*kfnKt98f}HPWyxY72UAz|^l@Cog**Gos zL5fpMwBKlI-}ldV2P((Y;!!}H&6c`TZ{3wW?F)U2U*FC%u|m^`@ZXGA`-*a$h|@h2 zMkF1N^y==I|K@IgqDped3`hlct-N@`s2?G%$PDexm7?Fb2vtMn&9*@0ay+i}N7^oS zPChcihG6I`_#vNvzcAg?KLVn(-zy$ya~`=Ncr z=u@4%633OZ$)Nb#7sREU8A%`<^(gmzULCwd@cmU0hfH%YHn$3N9G*Y;wd^@Dk4V1c zEk3ZbjelusAF1z2{A0hL#e=|c-y4Rj4^1X@;7MPYkYI%?`Obx%v2(bF=Q+adB#Ob{ zGK5%p{8M_;-R0|PfW&K;*DL#obtH^@sucWanUN4V;@c7N6d6-~s8egekVtFghuc(R zs53Lc%Aej(g;8R}-&>F&A6Y%$3AJ;k-vON=WTT$qMGxI&bwjDjkS!d*My34I+;zY|zyJL5^XcAs99||= z8OHxGh7v-C2_hnt$svlQ0Ax5zJyCq5f8y;V=P(Dkc`6jU{o5unC5il}G7wc0>xv~`C_ER;RB3#aODJn(#hYMEVMs!^wg$uh?g&bgr# z@s(p?<|&dz49~CfiWw4h73F9ayvy*1z^jMiA;(fKuCsp94#j<}%oSBo%<@d&da9#d zhx-AV%nBQ`-DCQ7>$s!mDlS{8dz-U%Q}tYpaIqfxctndW$K4hee9?3keC^81<>b|B zO$Xs5DPti{l?i4Eg2qP+tj9CAV<;wL*R^W_$iXx$|yggs?IY-KGw@RVw3^+s%3ZjdLH zf&ghvyj@=Cj~>iD0FDb1E{SX;#O2)gFN$}t#3 zT0Cas8FNRr$54XZ&dG?7C>m zxUkd4pC_^9?HZC7HJBvV=1fu^mA5rU_FO`*z=yS)AYWdP|7pPnH#I>%5^LOcUsePh zng}tNB+%w`%U_HdQm|IzK&n#FGuCQ?PF=t*!^DfS71$jARv^Q8d@Tz#CDMx2*5A_nT6Lro#a z#%T>UL{Xb8yE2%dRFY0{M1TJZHLxI{ALoXRos@KI*RHX73E?W3NgpD4y1%tfX@~x& z@tl@)3?1U9Y+@Q4m5N;pA(idJnhVE73*8k%!zSrb^>Su~WA=Kzi)+B1ZS!XPWoHW4 z=Dg`%vV~n$L^~dET7xz@{AYc3`)N(u>PbVPdM#*iB&lW>K(7$f54GqGOXu+f<%iVA z(GR$L)QmQ^;ptl_nsLT(=fyMaqHA-UtE_ZT*+eX}U&n|kDu+AwGhv6fe$Gmg9_0qi zZHv(RqIyo2|4rxY%1P3}Oykb5Q-7}^Ev?#SB3|l8dbfE?Y>r48bY$ICF;y+z#02h4 z{cRkTHoD%SEYtB)ayB-bE5oqiK(987pBUXXji>iTnT6TwjWtN}fkH!@ty0Yv71WoSpSUu~q$~O-3FgCOE49@RU zS8x|xEu-ONozTZdO}FqN{wRDM0OR0Q!AXIouS+VFWM30z0%DZ7OBwF)3-h|^ zHlu2`psKqeP5-eAMqdKE(>F6z$iXl~tcZ|qtqU01WIPkJ&$Ll-1cAI6tVg|t`@IF9 zZrYhXO>*eZ^E!Q98*>Kokfws@lymvM;8FxXk3RUf%+tCWtYy|^@Oan^;?9fYWQdxE zVu#oT=GaF>G1?maUD74UWmC@^?{lvr;X+$sOwjn zc*|q@2-?t)^v}7y_|~0(3N>@zUDv6b725gA;w0(i>+sE_yeGl5waa=)uGzuips8;Z zbs<685}PAk{HNyFu9PUmyxg*oU)nC1R)3i1kihx&B@Gv;GPE)V7$f&avbLi#v&|yW zj&vIS?JQoswrDfHRPh+2yVEGf%5V`zHwb3E7Y+u;d}0oSdO5sNCr5>DE7~ zs-c(7tp8^*5}u{V_la3Ba}iH5zx|TV-gHGLTUT!S+V?O&XZl;rrwCW5j_flEJG^hp zzpa}`W*;UteEU4ojeDbU4>S2a`MLO_we*GmdEPAp`JKdtjP2|aPG+9HIEMCRl%n8W zxU`Ke<5eopt5$U@X~IH#s)U`4@JaYOLe-=2t;E!z3 zA%KdgTP9p^bgz05H8$7fttH}|Uen#aTTAmEvxbeWnYl*Yse-TBUQ|h;Rd>nGHesyf zIro;^omSnmpOORvdN} zddAClao|X)-t7|m+oJlU_B_*b;w#Iu`bahN1RJw+9`~Ap@+U-)jC%UmFQj#dYt!vd zTv8U1M%K?Sh$&Uy2pduGOAH*zf6&x_H_*j_s&9jtt?w33yFHZmyi$#lUdm8Ce$0YLzZEQDD*%kThkeWY*fAK3vk^_1BAF)NHY`b&v_=d{gcL_euIz7+M0Q z`*-Z!v=nLUoMn;%HYxteWoG(eQ+#YT4#e7%^}5o{Z5z_?$L|~Sx-?uxYM+ro8sFGo zv~s}<#n(aGTUZ)eN4wf!@<=D>=6G{u`skV(DkΞ8le``S7q~Qv3kw&YCd>&-hcf zAIalbZeJ4vP!fLiU}|1I&P0O!MXcMFN$`^ubmxASYeYJOH%i%7%qV@OI?gVabF*dp za%jk|(rvi2nL2ikZK(O6kp-spV-JLZ${@1(5 z@3(n5HtE+n8(-&`5Mfv6vhB|w$g#4G9cqJ3cf-UzfXtDY?ZdNh4yCn*ggGm2xnnkr zN@GqcozJ9pT&n8yT)80GV*o%BI+Sh*&gm<_lol*`YJo}{T`tM&U}SPKi3 zvE_ppQVlL7tgvxCOW*g~J(m8n(4(Q1j9ysvE+US`U(mDCl-DuRC zlQW8!llk3b6!25c<;r_!tIXs^RV(WJtLehv;zZwDe%|LEvShJdIp;2DQTkV+r{Q`x zZBE7^C|HD(R=mn4{H!oU(oQk3x88+i!o9)@_K;QNLD7jQ^BN6AQ#$?1f!SD*gP<6A^@1;zpvt<`W9ZH#w5wjB{S+omIq6crf*O zFT0^)+Exq<*0BcNn^mZ}mLewl5lH@%A9nwFHz8=FtvE-i@<{soNquBx(1knZ zr*kTNnY7Lj5I(xp6;BneN$pv6?4?J{3Z34;&=grAT0W1pyy@OTq*#GZHafFdbu6zj z1x~GanIT{lpo^^j9dnqi?rwNpdZJSlq3BOHBZ_ztkzRbd10|_pc%~ zH<2YDX*sc@6}ZZ#2Fk6Yul9LqEMFdDzxsnZut)Vo_r_<{h9cfnqVI*^g((mRMKd|i#8Bje^z=>x47$RN%0{g4EC#1kxf=s$il=cYFCTJt zG$o?>TGhN?fos+=Q-1=nrufHn523s|jU%wZj@qp|&&tEe0x89dqPZ#NRv^Z5j)kdf zysM7T>U3P8r4`ZE2V9}ce^f4Q(=}I)?r@v{t`bjIM2hB&t0m8|fgFof*4fvo|Da}t zvBZqCkZjAsMzTNDjJJRPa>w1xl55MuWbu$W-WG(0z01B%1G|_3EAW0i_v6)!Iem%7 z(N;ZYHe{t9V4;iZb-cM8ay0d<&o;wH7AL{X?e6sXeL`gdR{G57N2_^Rs`S>~hlO~l z42NRrO4S)PBSZQM=}N{S3Qcu5&nYWkllT%H9!0EBM%k!4k5X)yhpzeKhsd+DK{zEa zfi5{CZQ1iq_f%tOP*lL;8|me(rc3VlMw~-pE|GlB#0gr}56^)s9#D++=|E5M(18kD zPT6#FrcL5P;8Zq|;kDGoZiS84P5CKgNsHEG_TSRn6-EbDiMvxlrd3k8n5oqy_JX+M z`wU_OKKWX!nfPuTOFhztX_E7#BTE%i?2@tFh6<}$tBeFjj4Xx@)ywBoE6bR9*wWnw z)x-l3{DARIIVV;>{G0KO&76-0=iqL`U`1J3cSep1cmd>9w39|#BjtBU zsfXdYmxJkEH&gTVZ9dDif530yShw{DdEfS!kWwYVVIv<)$~YnbS90B59bA{kM1Xh^ z^WL>(pgI!?ot&r$KUbqdX1YE-jwItz#-wTFdSw;#mfO+epcnNK^g1wda(G#0S+6c9 zrB#<702=i4;voc^u44ae9jB?MAFGCOY3`dg{m%3qwMCb@6jZotVU^ZT^!_xENSzCJ zyuXwSnlNu}NU}E8@7h)MZ{{Mk02)-|saZxgY9(aoEBsEE*Q(TtA7`ys#jZ*AS*WjG z&IjU1;+}+W+RT^Tk7hkiAdqz{fA)2A$w;MUqHrDR=+BpxQttGpnepkfV^w+%j#(Dq ze|!sH$v>5*RY3os`(7x6FPgY9o*beRYE@bd9D)I^)_!fO4JHkBpXhE1~>?Pxkr zxce#Z$H+Jg<=vVKu5PGHN7$yene>uHOI-^P`h#k3l#fb4R=(}$2vQJxvf|P&V)1O7 zs|<((SY<)P)VB4y5kMxLeQn0MrOD*XResPmFAg3xV)mI@kyraA^v_3a;M#sgu#1hs zPiblwv`ExF1z1v(a zlm@{G3HU$9JADb35sk{XgSuBPsq;;=X&&5;qyjtLRA{nz`EE(wItta$a)YMKp9hf# z#5-Qseb?7*O5i<=WqmZw^?q)koa3(*6v1oF%_Fcf^egZ;4CLB&eOZ@-%Fch*@?L7l z-RcDT^U{DO!2}U5mR&m6Y^aDLpi0xu?8>*~z*=dbxFBEn1Bg5PcIZF~ul1>irUli? zI!zBiZ>Y|{r+GXt@b-Yl)%LUJDlW!>b4(ctC5o+7r!aDgION;CBp2yWsLHIZ^kKHi z9$dS0uCh`>Iy&6|{AH8ZcFDTBxr+2c-TANg~A}+|3_(nGZ(cF`R1Sir<<1 zZ6fJaoZ5UeXnkC2yNMF@((}gUKy{ZqEzdQg0`z9%a#-q3!6hno{fQ8frR_c^#V2h$ zT1ka|l}f&!Tub-O7~r-iFGdon$>GmR(wfDe@Bh3qKL}-rK3}&Uo-Dr3nI_c9a%^Z6 z>0jx|m+$-g_VOhM7joHybtz@oL?mHgvv)Vir+VQ z*a_6|E}V71igd`M_!-xD`WU?=2bQDzZGtrk#Mj|E#1jd9&~D8H>GKZ;-BxfthlF8p z@o~*(zTFe5Pv)2wrj)Q>B%cXVKb=UPOgA;!e`&1O=Z3S>?h zAxCfX=EZSJo6dQy#PWD1Yj8pDB)_OI2-ZKmpJ)EzR|4c9)LSiioGc$Y*7CF;W%tU{gr zr}OJ)=d1UGpr)r=W~7e4hNazmHVMH87Hqp1v&*qvdwcg{`^8L$PViWI9P+E#*k2+e zel;dkpTS4i#~$|635f+4a4^Uh_d~X;>j|LpA2eA0f8YfRezq7S1?~g)VEKd`2@X&o zK3Q->pbKw)^9=U<#IQ|~o=#>?saJZMUh7lyboYo^^GyV$`vu|oFXX$l{Wl3Zf3SyY=mz#znb7GK&>L89o2p==!fm%g*R6Gu)8cL z>5bm-yGOl?w(tqkS8Rit{?%xJ{d&W}_-MzWkfjN7>IT-6dk(p_q0ToNDPzdCVS_qq z<=1;|xtdDYs7L)T?ffnPcsQ&NTJAG@dN>s0>>hNLVJ5Z1JW*SQ%^!*BoBGu&rLcKh zlaw`;wdr9zJxDm2QAC-c<;=uEDu6o&b85kPdmUg1LGBc1F|Dbt*=g;*^7Kqw!}swl z8+}*7f9i=KYngqbC?~^U;;Bn~4-eW~HDHiZ2XiRrUu9U+VOt{E###+tFfyPooXvMR zb8UzqXBsw(yPx0FfJydclz!}c-XCT*0B|p!MM$l{du=ZOq|a-^r6IMXQ^l40_tnS` z+i4x~xb#|!CmfCXRVicJt8;BW(#L(;;#KelqTaccwQ=|fm!9r2Bq5X_(t=1R4~VS*UpFFWKIjd}unZ|^7fioBc@<7zeqdwBhB z&Ob7!4Z8XLA75|Q?k>DWW#Mf*$T>~9VpgiM$4r-E?M20QZr`z(#59f&@GKi{J$w&s zBZ`825T%Ubca8-HPH+`L&fUrpMIlUaJJ!Yw|2nxl_lTud+(xtmAx1<4A!jTE%WT>I z36JC~xR1xpxUB^uLVY9V{uBC_BTB6^4xB7`_Y8gA+jTw^CUx`EFjZ3>6dR5`5p36v zgLk{rF#R{4Vf@a>|Ba^}QRM$mq!YhG{ePl=Q#hp5@C56LJCJ_z#j_A7lD+s{k$Z4Y ze-vxMCW((_!8fpmaR(mmcv5 zfZC*T=kmO+d=x=$zPWC-{G~#-n|Il{NB8_kfW0wSA`bdL1$qAzfN%Yu0#Mm~|8It&r~fUbS^O$062{?j z29>F(^><`Q+c+0>%d7ne%CAXVCh`SqaE%V_-`<$Wb8srNd%wIfmA4Q`OGa^Tj{lI7 zlzW@jF_<&J2|oBoBExwKEKx3-D7*-jSMA9u$Yzoy51DeuQBM6TX;N80$5lp@7#GJu|hksvTpXUf4ix%!PfrhkL&ChltYAHT{myhf#ErC(3cF=$SqRG({3k+5R|-*wh+tMVYSmDV_1Y~qLNocGY6 za$`9;r2f@uoH#ccWqDEsO+B7i0~hbYeVCM~=psJEANFozytRx>sPf57zHG9hgV5lQ z5M}qRI3+yo$y5rG5hdU0_LJ#6B29?qdo$dj<+5nOZWTU{c!L{DNC@ zSpH>YuNAsyA)3_w%fsf`aUSf*)SS2psM_t}6j=B%q$jK@90LhIAYha&M%g`d!l1~; zArfKfC1%X!-66{=Vm@EET($sQ1JM_|5Vt+ik#{kh9}As{S}0QUzxm^5SY1Ww$qiu5 z4Xcc&9xSx9_GV$<0yE{tJAqx?>#5kHW$B}F zhkm2LcAvp5!QX;{OZ>z*FE$OAI=$!i7c^-sfPJ3IeCv!m3a1}6 zFI=bTcT!F;XHQwFgx7quYYyhmYj0VWNzsX*7*3!SLPQdVm<`hjcL3)S4_;0Ia}m>( z=AAM~Nx*E!aew$ZbpyfMSrQ^gC>fdOe6PpUs`!PjZV*J|gUA-lHp_6) z#wmWi^_T-)+eqmIZT9pJGn^C{m<%J`$%e}Oqc{OKM?Wfwf$nmlW@JoqI`bEEIk?EL z#Xr$98v_X?JmTXEQzuE4vW}J+N7Nlxk}TJ{rb83rkL&7oG8?$jV3-uJ2on}IK*kag zg;LIN?E&_L;Pp-RbcpKhbm%LwSE?)Vo%yS=dqeQ!6;@&EkhmJ|%QcBEFW>qnQQyj# zND$MbBGXhY<9ty=WoTNOQ_W_#@7=xe8{=sT=DJr}b{CJ}y4I!vVYfJFQ(rK!vh3)a zk`ic3=B<{v@_66*&7eNr3w6sQwFMeMi zP;N+&GYNXwlM<>-E*gD80QQ(VpJeSf>+Z||M2`(}V+4I3@ni{V7yXrm57W4x&S%re zt>m`p_~|K6AlWrmM?~yFkEDXc+|dVdmZ}<_-wnEFH9Rc5s@&5SVx3`h`Ai_Yfn6EZ z0R>kXmCY+22`R2O##g{>{&}9eoA5kbiaLVG1{g0Ihq3katb6PjI%Rzc>Lfen03apz zV`_P|!d+Q|+@dLsoMBO?L6_jG1og~XlQr9Dhas5vH6~ zJ2hAqEetP(d9l321WOvVq5@F4pBIGjG*_LqLp=ng#2@K-$K(|MQ-L~5w}iT1LZgE& z?rpIuH{0N{M zGd%n0_VSmAx69k@=JZxJu(S~2=Hao!oC4a8nhLgg?mqEWAti~HVQ*+cweS0;vLXYG5BC)gFAh&iZ{?65*w zT=SZnKr%!*QuP!>V^M@NJSa*ER_3}WIA|!f7%Yvysj>+%9$2E%!J<(Gj>eq!1*f2C zI6F{8wfg3n#^ghV=TYIRUzKHoQPGl^)UK5Z-QbXI_`g+5YvO}!fE@ENFP`k-&#DVC zxgPgbMJ#9OJ^da+Rc4>{vlWS1>q`=L`s-HP)i2-CEs8^Y24kxGh7b9gXa>{9hJEkK zxZ?k}aq_P9^-%8;tbKaPa|2SAWY~#F9axt0I58uG zwH7m(!{nJl*O%{8*TY8nNZ?JMGCw5vm+CQwIAlKeK6+z2ow+}0^0_?!o$@9FP#0Ew zq2xY)Wf^<3_w{+4zgkeLyiN~SUds|qch##88GzlN8E6T|!|%&2~$fV=Q-FqD0Q zre>lHtk%;E3loEXF4k+!r4BW&YYjz`-}JEFL2$M}{eG1r@&r%#N5;+t1gty>Z&r73 zWM=*BcFng61JLJji6ezvCOuP>GkaK6WJZf6gGerlB2CQHI(JGm4Ro&!Tt}NUzJ)Ar z$P#*zwhbBAqZHy=H~_n{;#oU3>NVs-QVc&SI7QJi6fB?pep2*DoJFywHW8bs|5|Au z)LLBcW{S?NQz95x0^oGuI45Bq9eX{ott2eYVOE*D#6@_cZ2gh4nD6W*5iy0+H&C~` zyM3AvTNzM{z^nW4)Xs6W4D(2~*+VocHvMhwG}PgtulZBGubE(tIoob6tjl3@?eMp~ z+c2ke|J*6%FKVUYzR#7JzcZhkE;Y!u{7`lmD^2TYW{vJ!%4XYyPo3ZGD+OwC2l4z2 z+pB^X{S4Le{d&qCpKos`59V65q=sv^47+&v+tiI@j;+5|PVTh)BGXEroK+mKpb5#M z%lVbFB+=!@YC1Mk?lrU41G|(+&Sb84gQxYftFv_ZaLY3dqwZ(m?b%X-#Egeudq|pg zTD5NYbke5N`mfM+7q`9OytM+;dYkvW)S{T;w>b3q@KpI~+G+M*F^nMV#;cTiGc^V4 z$#$r|W~g=G2mTO#Fa;)8sC@ASlAFy9!Z%`?msOO>(9R=9gQ;OiKxe5pB#_`1%G=7U zL)|vvo35rdEethQ<-3F?#)Rp;tzu6#WIS;}Aq%0ON;MxvJcQMNoev^`qiFb$qG(O;`@up)%eGNLH02E}kEgqN%=Ck*)Mkrt_W^t$73WCMkR6s@Eoa zY}4jo4PpVR%vl`f2OxUWhLckBxRW^S!NvbD;!-Lz$f(hf#+d6s83XV$%Q7RXz=S1c zl*Na6v~xC9V0iJrA3Dof#eVg6=RtY@?t;hNlxmkD)1sm$)y)8 z!o=l52B)KbQs7#*myIOI;-4ooBu>xBfcZdW^1>z7pUE=e_A4IBg1chOBFN?daP&#L za8j=S5N@c3hTtsR+>p(Y#~_wDMp4cbhyqDOQj|ATJu1oy%kYF@D%IbcfM3wiEc+5@ z4B0EXYN#zS#*iIho4MeOTa4s;y;;jQGJ(YR$(=It?sh)J z-HP!;^uW#W%=Dz+pkRs&SJ;IG`!t}Vz)iM2&)0OD5VXd!ta)@{iE2corc*N=Gop@# zg@Gik&c*&qK_=N^VA|XOT)R(s-aG~gOD~l|jyJWuh6cV4J^WFNulG#9az%23utOxV z5nw1CC5c6=+io2VWg`wPEFMt?0Zk*#$q|(gkWB>0rc3i~3=&o{sBbi3u;&}AL<&b@ zT8}W(M9`{Y%1A=d)r%rQXoQbVGm9IDS5V`T!hClyWwbB4tl7vvQ?Gab3l)JFqR5aR zja^SoQbLW6OUwFWT3G>$8gHo3M3%M*c9ClqNw2J<5&=RlksJa}WI&nTKuZE37lRC} zfE;C(2Y?x!G@ z#)X<_A<@7*O`+0PC=17+{odoZ$txInp)%bh$6VMRrVtD9i$1u3hJ^M+x)=`)jUxTH zf~KOR07Gmhm{CuiOTo-n%6sE;S@D68Z$P||UWbi z)xt)b!#vtL@h7V4$l>AeBlYoV>6_fX5^){%8K6 zEhGLm{)F1xg3`3zj-(d9JCNYknz5vZ$GL4Kw-H%^<;5-x? z9?&qGDq6;M)$ZZAgJ~@o)6;+iFuu})MlQ*c1iL%ZvT^0Fhk4q;52m|onOIqC1@got1xnYIFdjMII>|jZ{yt#l8jZD2Z>Ws-+eXGeD3>ocgX~x zg41zW`%L6J8^SfY^=o5Esxw1HDRIDXLlLH`l(fF)k?4-aH#W`O26gr_YX(qkDYKo1 zUM6RbsRkfFhqAI?EO^?Vx8lLdE|mYa0!$oS82sl6YRk`xEcKR_mH~qPTWJDT`v?d4 zc2cr7_hT!WHYAD95#H7_B5#;Y8x;Of2jDluu;*KHqpRBP7Bzqaz+Gx*(+(%+d-D)k z{%MvL(`g$C6s@{2WOD|#K008;co_eVTF=~E3rY-)g1XQ2x^PIik_-ha01HB|Ly~`2 z%JFyj*@sb<6|U|4Hny#`Gx6)yP$+ni6|#04@Y{P`7q9E=SMIYJ$d75F!(xY#6)t8 zBARu{^cfo+U^E}HLAIAu?S%_4ey9$!LcyyjvBX8wwP>EDq< z?c2-xzjI%hzGRi)9(qV}uO_3}(C`VE`IVEF-iE%_6`VcS?Z$>yI~=id&D?bD^qnz3 zs`5mR{w(R@$Q9-_rEe2@#8Hq|7~y0Y;J8+Lka!v3@QUL%XRrC)v$D1u#h7dpGW}&< z_7o{AMYUV+#^ES-K!1do?#kQrztt7o)XL54IzEz)ZVO&dCr5#{~pyn+KI-2F)Q8*~x4JoN{ z#kgdk{9(-p1p@sYHqGq2PxE74P!}7r@{vcG(?HkU^FF;QZ)-2^ve7(UBv@^*LPuQ( z0j*5gaUeNG$mLVT<%i?nmy?bboNrWA@x^mXN=%y`T*Sct9!}fg0L`;=+LP>*`!TAWe4*9JbhsFt(|$PaQg9#6km)f_ zY3h#b?(fD1M}qs3oV$)~aa!GN)56B)CNkG7jveXgcaCr6F^$l*if8BjaJU--gUr`) zE~ek@JKp=$qCAir{WXB|3wuwsjLA4SOixc++1);V-naMfDa=-%GH+-$4I|5KAUz>h>IFu*x#bA8}qAO+L@M|wQKeFa>)Hle45Jh7=!OV znow|nXd69Z-pb>+f!98cwBIf=Oa|qb72|)XJ8PS9at8yvWBR zo|dek0^gEH9)ec_+^jUXsynF;Xwxf6@X+kUbt*L8?h=eV`YEL#(9s6|N09l zU?@W9uSkTT!GP9b=$RYGJH;d5RUheTfg+$LLQqRAuX0Bzv9f>>TQRS!KxuxO%Jvw8 zW8JARg4-Fu8xiJiL&BTJs}3O9E)Ghc5B?!(2Q1-sjv&F3j}H@VTWx!2t=JzTHDXD& zbMAraOigFG^Y?QcQ+1sImr(inmwV%1a%@qJm9vUzinK@z?sGuc<(rS?52!0o_#EX^ z(Qbc%h0eF)BAzkLpZUjJvbrvEa?iUGHY;{_?qa*%&xRO42Ef*J^FV?D57Pq~U=>f3kL9Tug`kK^JP5}~YtQ)|8v zudRU}tKo5Hs$rm1wdj<+I4-AwmKCL;p@VLOJj{suwrrke_m9oOE2oi1{i|W*7X?QY zT(o7Q#S>wBE4t-#?7zHQbA}%u_%MO|d^X4LY9(^HAdFlFU4ZYt3)S3fP1>J!3!3Z! zpK;qI>M5Ex%^Kh$BD92$_K@1OBlFh6nSw!B<{G0&r?Q!wFBSeUhH?}C-AMjp`^{zB z{HsnH{%08mZ8`SOc5ru6+urH?;uGu?3VHK?*wcnOLdL4m0YXo&3ArK$Q1zG!_{(dj z6}z{EX-aq@8{q&_!V2bf)WE=ssi(&MM?j-#ilZP5zDdtB(1WLt!gA1>RH-Qp&?fv) z*O1YQW%(w>Lg~HB)3}!U@JPKJ)?aQhMyjvg(y`m>ba6Vma`1`o?(=ZEanSchMa%0Q z@V@_$;r{yWY_t+oXy{#Z*<*Pf%t zlB=*b7LAst365~oDWn)Doo1#qhy1hCqWoZW9L5b0d2VYjXugdjG|@&cs4xe^(A8f0 z!A$cfBt$}<`bWBIRT*uw`cL($N>ot@OwnHo`*6#m3wZ??i@8X8<(*5_nP-|vWIs>9 zJnr--fAnZxMRq&4y#=brzGQP$%6h6WG%iTG>)InN6iQs?SYEtLR7ijXeII9H0w#>2 zdWauch{NnOMinmauxkapAe<)06R7EsCdf7Ikqnzz>vfR+ftPV#wsNkd|7}3twSgY$ zJ%Y7Vub)l-ffqaNqRZ$Ch~EAW!hc0BBE%iu7(nI_0ri*VvClb(K*@s$~pG$=b%CZ{U$$2bM02(jxx!= zZUVO@47mxuFsJeP8U>!vR54W+Ry?ku28!U2Ys~&10DwS$zrQd#+p1#e($8xQJuAA! z0c9192;nt>jIleSVa2*{2-IZ=bsoyv^f2$HhOk41Cl)Rz6Qr`TUbd(TT$O{eE^2jy zWG>MiI_ArgbJW`UxwqzU)w9XMqN=^mr9-Lcw`&g5HIh&=!`np?nnJ7*NeF66+d$$4 zprwmBxbq_f>SVYmD`0*>!=W~mcsX;~tR>0YIz$*f-Tf&HymlB88)@Xm{)l0_kVQ}s zz!e{xBPxcyulU#)k)$Z~h$N-{rd_#guunBZwIDDkQe}fs(~vC!WNJ#9sA5ewEK>n8 zQD9wd%`w!HME$^aqoIvSz)&*#M=yrvtSiycXT=7;mCtGhvCbhj33Rw3kOOVPE>-g5 z{fmd`y5hKRyY%sk7Z)c-PoKO&=TBdW2Pf$A*|V$n>dWWn?_NoJdyltom#(DX-meI# zCwr&+mrqZhh*!sZ>g&Ddm#@!{kt`obM;BKY$M78`TV5( zmur?U6Y7aZA}Xlj%H4*0MIa5KAJ`2<@d(q{tRR40-YO{~?4l8;T?Fe85?OxKMNP>14>hC+l3ulZzsRC{Ea zgLkz$k{)Sibxa}FusS5E^>$kUXkFC>>V=z$i`Gw99BXS-K$xyv&{d;a#8FGu#CB>PK{9&_Dn{2I{=>whopiqy^OX7%pXqgn-@%vI4PA zkc@PVR+6z4Vgp_%h}PAa7I7?_{capNp;*nfAuo#BJlhtB%21siL{!%>e{nz}o0#5c zcO^EAgQw?4aXY|CtjLLws^!P0{Z$2cG8bBmHE<0746t1ht^ln|p!)7?d zVMGHvyiVnNY|Q57-uXqE?6=I6x?65jiA~Fk!W*7F7Ylc!(8bsM#2+n z5vekeRb2;A*3x5>w~uC9U+qD=5uvF_)MOC>B!QMhRDpIPLKGDl0$qVfmbG?7RDyOR zLPZ(?l8h9nx9o{Z&`v~1NR~83Q2;`+*p7%w(9T5YvZ?~4K-8Xy1<+a|?vhm(l+Eo? z;Ke>O?`AffCPZV(r_O@JluPVxc3yl&)Y_=(i1fl6Gxaa2l7{qYjdSnoz=N?n45&HA zQE{*F>>1l@WDF0??ZY>Q=vJl3LrIp~R9S$it1{_v*T%(T^)?L!Nmlil@wTi`Tg0lK z2h>|ps4Zd*$;wK^Nukz=6&@$jl>{M>Ei;_&(SZACu^VXMKpq^aFD}n{jze zHiB&#skSj;z07vt6a6%)AQXPZH(2=9ycV(@@e)A|VU|`q@o8XV=f?IN8kHJ^#LSnB zU9)1Ac7k3?ip#o?4v8Z?W=i+@`SCEoLAlDhQp-?Z8$&{al)#(V2?g5}G(}P*v4p$6 z*fQi3?3#gngDbg%O~Z7<{pG<`rj_pkxjee2YF<~Xb1QP*584B~K zW>=M8r#c0+t4;wOtBYOxW2@%P0M@Foc>`wv-737bUDLY_TQ#x-vu?G`n_7ZtR&6HQ z6M=qX(^~-oAk|e@S$1hPvr|TyTu+##5P7~$W{&0Qi6bcUP*;(z!bPsP9;yuy89NL! z5*1Y!m9>bhK(zrP6DgEm;((BsBvBH(cV<1dWuz7y75Rjjb67wgikh@YRx8N$NMKT zzLK9HK(el@4JyftcB@2zKx|k^QnX_wDv+91qJru`Y#C(XOmQ5#>>M>jipawf{@PMY zQHMO!!A9PVKyb*ILZ-)F?6J)$u(!BY8bj5d?Mn{{70;r^?v(pbHwx~AN$f%drO9(^E%d(=0;>?`w4!@yWV(A&o zu9w78==wWi9tr216x8M8!ghJ=n>Z@$pBu5`(8zYf)RdltOq3LF+iwbGEzx5HWJMa@ z-rl0&I1RFs4vrAo5f#RMNCZDN9GfIMp6QVTJMql<*EslICDUr7@IX-!3+h(~*kwvnVV9(!VU%`EfCK@L zq|z=+d(gEk9U$`nq7H^m0kFLx0wL1$28IYLw+ww0#9?HAWL=ff$IcW3AeYUMWd&=O z5B-=rPlg{YFCcVi8x!JqvB~J0Qx65G%Ef!&?O|73ap|*#ZIMRF>n92*6(;PW zgmC0WbVP%{A#id-1IzJlD{p~r4133AYbA?A#fG9tx=d8fFeHe80aRHsO1Wiu$d6Rp5RI8sZY5>Wt!x(rNJLR6%t1u&qNW{R3Vm+y5m zC_4~6p}~lL2clL7oQOj0RaNk|>;_bnUcW<6tDX-A8XIJNkiu&Zq!Ate2_~h^yy?=ENx!zY& zaNk{W^6IJh^!eG@^Al0tKRJDR_5AJI^Y_P>(sTKpg!V4B-z6(4xbH4GJ3o>xj?nXq z*Kb~n?+!2D%5O#G>BZI47bnu|7w_eJ2=}*&g8S~0OXdCBV{~@#>h;;)v;CJZ-khGi zeE#IcyXT@Ly_KHbLj=T?6x4Rfs%S<^!I)iLwzCULf{NBE@)0ZFIQkANy(Ich`hAH4 zdo8mlES}hVvwCk<@6GDHS-m%Fxi@Pm!|Xj-y(jA{^<**kY_A3MT0pM_^jbi#1+3Bn zYPn^v0`w}tSF8eLlB04nMZK`f?s2Z4cs?m$FcKU2RycL~R=DrX^6P6Z+{~Y;i)r0MPk_{=)2Q3DkY*sXUaRJTFu> zz4r3#RtYhT71>cJ*se)GvLUl<*R;(?nmTunuo=i&jaOA^G4J_i8^2CgG+EqShP4dW z1`pTGP_KUma30r+OZPSNLO61XH?iH(Pi%6?dc*m&09U(|ugP#iuthUI;03-H;E1NE ze)92%J|dnQQ8!{i0d4cq`C|w~rEq+%Gm6eL9RVK7D%|!m?-E}$A9iugnO=cwQ!~AY zT3+)QX$7v@sfG!mVOXhxJZ2I=-xU>AnoX>R0Luh&SY9Lx>9~ksd zOZlGyeU)pNc$10e_G)skCiiOceXGe!*4|%0PhQ^oUQzB9UdrkR^ zU&OylJgmDasmhXAk>*wWY&RuAp5lH3R}klLZStmMj#^zmtN%Q%rc!N`TpvVTH7*Rvi6j?Jw4N*yxbp=pV z9FObRjJut$*h=LcJ3<1AW?&5hMNxHRAwx0|&5YMMz6S(Fr&V97ufVG~-GqL`YlY^Ec& zQh9Ah%=y0y$tTmmvU%uiH1AJs3D}f?3N*~sj^+aswu4(@Bu>28jVi4~1bI z6o-%p!_EfcoZfql1M2*auZ1|W9iBO=^I#*8=ui?(K%k|oIuT85K|mo9RYNu))uBQV z!jM$z(;L9sM7OW1CNn#rsLPE>E5NM2WAD-k`)T0QX^I**!af@|paT{)90?US?i)fb znK3SjgOG+w-JH>7QJtGJ$`Jko0jNO$MIL1i2DFBQf!u_*)JPg*geGGmMrbB)$jBD_ z>rohxG-Ha8Q7ia3BIEr3eD?N3WV@F4fnY!KlD~%Jr-0r(fESblJkM4Z>D54)D z;Uk~c%ujG|9nX@Seo$Bk=qbg zmvbQb(rJDWqy*9RBnSe$tSWN5lORQ)6>O}KwlDpYccTBx-rN7TZ6gWe`?LQFJWBT4 zxEo3&MZNjC+@0g3P1?lq+D_8;?miAgLK4pu$r7X-ZMNUP{rTXP;HyYUcGIr-*={Tn z7z}{HU}i9w!I?E>^d$Q+iXJK3!g%PYT-LjHKcBw+;lrCZXK#LbasBFJ|HI(@Pv`I7 z{PO(ykJh{4{YT~6h`~b-$?55td3xF(zPrAB_2botw}W>dM%ULLp7+mwdHwy%?;apf z*+vX%RqpbPlcr8HPFlmsFso^AEdEC}Fwg{Mo7&${Zl1Kam1)C)*iTNsM*bGi`8xfgcmbKFmmUv54|*(X*d2HXSx4|!rQQX zW26~|F|_gq^*!)=qT1d;p6iX03-$3)vuTeAA2WJ;6kQv0wKlgVH-Xb`r7mfH`v z69c^MeS2R0zya!Rsn?SC(Cp{K)$D`3iFSZu90$=-9%K;unYkXqJ!7DcC!^lQ+2u=Z z+_entc`}=!NE1;9vWB5Oz}ij>GR91b>NgaFWcf|L>l@dwVGsevFbdx5jce`+h2n*b zrWN;uz-U_pYLmXUfHU3}fi2SW8oDuTl>V0$tQTO>XLniZl5OU5k8UWtC2JX(*5DpE zOU=GC(ud_)flJD5<8#k0UX4#oYdmb^bFWsYo-CS?R#7M5Jm5Qdzh~+_KFnHt7ic(! z_N_LB7&+RM@wtHWIqfcTW2CvhMkmF*v4e1ZgOe$aBiEnPw>NVXYqp|CJ$&1nPs)oC z=8ch|Yv!QjY`n7U_B30#hQDG&|8uecT`41JVA;EmFUykw?thwrUTrzSRw9 zUbn>+XSK$`$nzDbcn2fT7DgV7Y&%$nx&e{cc~gey3Y?rn$fCYG!>T z)15$%_K43HQ#l(i+dl3ORbr5WR9aw{ua+04dFUb=3y%KSyk@7A2zvbmbn`ng16 z6uFv2W9)k?aOMVZX1&iu17j8Cd&Zz=+dfgAg|>n40ho=1;g}1^BqH#47aGfJKr&#{$OU?BQ!yi(GZ$_YdAF=Wa?;O&BnuF zAC2MAp298oPE*kL$#+a+|9pqT+=1`3@vTv79Qe+kgYOihTs|z{F^y6F=&xPn-T97f zP2dI~j^PS;ndp(O(-ktCCEq$h=>1fs;j)(vPZ8+26WN1%kwqrSl2`zmv zFw3J;?FaOI@}2Qu|9pqT+=1_mTJxP66YzoW{JwmrFeE{Qy0<9uk;gCEFakO|eR*zT z=hq*8e6@P0vmG;AU9=#vWu4aAn#f$j!v)lDzY`w#0zutUU{%sBa{+~9{{~rh}obqkexnM8nB=I&p@R;Z%wBG!25=TZBRsZRb~Uk0@;GV`AC5IT{Vd zL*1EL#$akq27}RP42`~Fo1@9VH2brmVNb{Q5LyF$Jn0Vy2D0`zDEElMu2;&9Nlzb@ zg?!iz#y)Pko8p#wdAN>kU_7+^IDGT|{ME(Bq4oOvv(u|ztRMbv{xJCQ#ZTwIoDcdh zK7PD^`Eer#4?QGrN3Xx@zd3*P?sPPGXMOzT!_3Xqad?vquBdks@S}#5ck0W*Q{EgKvn$aO1ex4tyWk@l91H zzbdr05wodni;L;QzF|(FF*S#lHJuHu$-tP5CuV=pxB8~(46PoHY<|hGYd?Bpjhjj5 zJGQZtKg-P8wDdo&!4kY!KC!|`lVuK4c=b8Dr?(nVXi zXV}9ToS4(m2=y&TA5W}Fe};xmpNR7Im1#-dvX!%8T4RU6Q2mL~ zJ}{K5vm4?QH;KaXC%eA%}yzx(m*`lsu+&;S1Sj~}nz{PfGmtFxcZUp&A6A=!vQ ztx)J0-BO`YA8EtUAn$)V+!5x1K8Jyi{Me;atKGTrLYu+Fi#69L zyOA6CDM{}WXdSsAWaDnKbnQhKIZ5xYqn9h_p~!{32w_BKr57es&$Ssn_FkM`zclpA ztJBQt-x*RJiag)(T@ZN=B^V#wVKE}QW$1JuQqu(;pWeu8D4Po6fk^!-NT-8)~J&-pwlUd=$Z{>yf=T)8h7ED%U*v%+8Uz zpJzd2qpmw$+Fp>bAyi?w2=@lVk$TqEzHZ$Lj~)AOe=CjiZj3d<97}IYdDJ@Y_Pe^a zb%Il>h}yP{f`@^R534rcKkj1X;TZrj?p;%Ko&r7dT1q8Wp+HQMtm?s!Rcum|&L z4%U6#%N^|TUhbg&UhX!5+Xs6}99;sd+CrtQE0ILDn6K8b#zy&Ctgo}JHHlDoJ8P1x zv4b_q7!O-n4(bCZ?7Ic3sli14jY+8mk`u~~SHNKZ9JBB_sjA5g=TBKlI z%#e+#hcjKx_`J5Oy0-(2EFRm`ZgdZv&Aa$l!!ewCh#6-G7I-p+_H7tMF_;ArSdl4b zC63GQh;IvR%T-8v*=iBW3cIYq(PWD?C@LL1cn%&sd-34eyWw>3!%u%d{qgGh?dkJh ztl`TKXP0k34$T*@KK}gb`ue+z5TY@;-P;a-nu{zsJ4yN8OUZCI8v~Oc~l1?LgNMx9UwZ|}{ zeKqdyR@Jvq|AklC)Etd0*oSC1F%6@SjF~lp{r(URZGAF@_Qak|tqF9R7y;VC+&VgH zzs+^|OpP6+7HcqQdu>&z^w28at6wh8-o5=e_-Xk1mtTH5y*hjG!aO_wXuf#!UH|9P z7iagc;%&rWw`+pBZW{Vl*94WC|B~A?5vKbCb8=6Ny4fyg8a;j7)2*J_a(hfG?zTTO zIL4@T0*$od?g-FZQ`;cGD(+_!67;a;CM2qF6@-A-ZI{qY*4QNoL4R1xp4zz5LvwS> zyng$`hx4B=e;y8=TYo?M;q}?`pWnTF{o$7n{U6`|{Q3dXrEbDtn^2~vp^r4HStwIp zcGtV*Lvuh_|DgTda#^zyg&2APcKsN6o;ydrjS5~9>l>zN;NJD=n|D_tE3u`-Jlz4v z*1Oq&sBA5EGgf}L=30b#W#xC-?M9<}QA;+6!y+WYU@|U`qfl32Yj!#swTUIA*4Tla z8pD!g)Qu}WG&_C$^Y?GQd->z{*5KvO&wm(QU;O>;n~#_8K3-h^^8Drd;R9Si-H5@i z!tu~B2)F9D7mj7kngtg_>>FC8XP2()!$CfBu+=sCTK{2vg7hKR+V#oK&Ng{id-MsC zpp6}!ZAxIZ_dGWAfiW-|oy3rWd$NQ`vf0)aA_3G{Lqs;>xu3)yS-gyt1?SD)XWLYG zTci7*G2=-Ik8u52P|6}qL+eil{d~x~Vb}N@nMZ?e_uS2Um;6Zf3g4kAVRuvPFb6U0 zkT>?+?S;2<9N9g3GokvJQ(dW4LSz|40s^93>gU<%C70z^ghwD+&nI?15Jhz9A1ve~88{0$K18Rnn zt)%?E;dW4JC_Qn|sw%#~!JY2lPIqvpJDmF;&i%iFbN_=o-N6-N|7R^5w*P}K-NBdc z;7fPdQ~#uU>R|)9#|`A*NcSgoq^pw|4qkKzFS>&l-NB3Q;6?Y+`)hD;6JxN|G6Y_okP;HL(;N_Ny~z{>z7fBKGFumg009n zvAP4z*eQJlLEU$uin5Dv&m5T|KiGys?c5H9D~{2##-?FTdWNpk|Co6jIUCNhHrC$( zo$+8qL2ZXjv37fhOmnDP;|8aBv|JtdRT3hf?Ir%)bMYcGZ9371tdW&zsaciE#lue( zq7cRlhG!JqVbr_4c%vC(Q(38-O154cMqjhcej$$cu8V`<3T+!m;)IND)LP=sJE3# zPuIsyR}C*)wQ80@;>QO)^Pp!o(lhz}2W<*5I^5ei+}rt6-`n9y6)MashYV1M3{Zy* zQ03qc8K4dspmxsyRl|P|`Jd{D<&gjBkpJlqkpC%!7~eUEQ>(+N)#22t&FVNDTOE$A z4#!pxbZk|#3=ij4hjXhvoLkjU*x}&naBy`vxT;t-DDtY$A#}|c8iPXe*g@AEcMWaG zEd;x05>qdj<1WF1BAs9q;hv9NZ^~|u7)B2|PJ}QuoZ2DuwVZaOMaY9Oa;&S*AIFWFm~rYjFSjyD-^jiuJh;HQx2VWgR{SDH-r#& zxOPLTH(6@XcW!A9!=-XT(;gVmndvhJnga)+v1Lz3rad*M#&kAv#(mSU#^nc?JHV?% zcZp(1K+?X4fzxwb97panp*E$ni_`NSwj(!;F>N`;t7XNl7Oi1umSN+AxKwJid*0WJl7U68rB4g$|!K-bs4hyJ|xo$Dd(8ZAS49&MG;1hVfM|@ z&>Wk6-5iYR+q-8eZMUzwrOIlLjQ*f+O$~iEaUep-MEYc+n|-2C>LX+t#u!-;PSAJ^ zN4jMgqmeZk*-Ge-;?3_P@*>Uw_|v?K*%qD>}d|6WL8?#5jVSJ3z2LLP|Qb2skA zFzS+j`DQ|viapgwW6QDzmNT~P$!uyGvq2x)Xf&9N2D6D_j0ey#bxAGv0=*VvGjEmd0{kX-_H` zAA@aGFkZb*q;0+>ITOdS`h(%bGzR(%j%Tys7#ULoTBE*Wj7PTJpE;vZ)`qx$@YT|3 z#Wpb+t9H%0Qd@=y7-(igvkWU+wGdL5)`L^=!Kt``Q}NNa-_C=n>%(aM?YBoqjAV}f z3C;uXA!`x>vmo&mL;2A^PqaFuWt z>ceYU^j}@q^Z)9@zVR2sG6tjJP`3v9Uvy)j5Bq-s`hJ?Pe-a$S=r8)tZRI=n2YF!V zen1g+1OEi9%p(|v@+WgXJaQ1T%h7k=B|h~Y1D-pLV6>*O;;*9wQJTR=i(rXPKnZh+ zqXcm(gJFn!afDEB32}^~EcG3^HfczD2CQHVBiv=65{x45!%m?lz0uIp_0eE(bc@z^ zLFC|*BMqdD9ccnnjlMY20B`0tnIhTMZ~pz6(KUu$UDLlgqDLjr^-)BDp(S*^6X5!@ z;6GEqWJ5awfQT6<>Hq+cL|%%1t^zC0F^Jb8IuYm{tpqOP?xbs455)w^*8d86L}1<< z1E^j9hHmyvGr#`(rg2#R5Ai$#ng-s5$p3J04seKUcjnr_4*Z!rPa=A-a`XuNr-P{b zC@Fk}5SSt_xH}3$a!Z^o^l2GvUY?j;EG6m`-eKJnid^F$fdS17YB~_WB6WUl;Vp33xp_ z58{gmVbY-^3hkpCq3;tIIc-P%&W+HVRIDEN6n4WQmoOVZQwMrwboDNi(F{wBci(W} z#4yak2#$u(9-E`_R7cj(oH?cgbrX#tf_C4Uz**m(nQ&l^Cbl)TCzIL0n2j6Z&}yi| zC|DA4vF%8Udes9hAvYXnQGPS5%qW{(t80ki9rvd;LXJ6v!~S?`8iq3*OowQ!I~MHs z9o=y3u{j+ZXxP`C!3d4V{i!w4p{?745t>;I+HN(vK8o=o2;#P*E9zB`u7uohbVd2i zu&SBGKp!}LtFI$xWE+mvpCQK>J5$FnMx*Iyi0tWbX7@)!!{|?K%W(RZ1I@l}Te=CY z@nF!P?ds7z_3q#r^KrEU2VoSgP}Fv0)0)*|OK)Cr@C}DosnQ5yhJ^cF!|dvkC7VXy zgwwGFN5ko8GI4A;nGEcS?pSC#7!3zAqi+sJmOh@1CWC=xOp!et>9d(>+BWKso3-DH zjG-60K59GEtXB0fpE9ToN0>p|1SdbPR@W5cYUz_fe`3Mu6rzbfLKACh%n08_rh|sI zH8XVs4yKclZVg6#)9TxBjHbrWnT~B|IJA%$+YT8qKIy9`AZkv`qu`S&g>y`tJfo;#mCK~A@6WX&G)TcveL&LGB zvylmhx=~8Lh314|48T~a&JdbE2T!(qb zOJ|^va>$R}2+=aYK{MBP>BIpEK&|QGtFzNLFHgV>dKeuY5mhY;JP$<@F7n~jLwv!C zuiYcSKR72;dCOyw76n9W>eBBYpyxUupqeQLFd_(sUa(#wKYj`vh?aqmQ4E3z;26ee zmUtME&4DRiY2nPsIS%b1^Z@kzAZFK+K;Tn6(mFi_WKXtr1k_q@TpXW(|N0*WpX-V^ zSRy{~j{pEv*J5w!pDHf9V{ih#{8rIB4^ENS1}v+vYoE4kR_(}nvYeub5VC`?8zBdT zfrHud_gov|6JXR3P!i4~=pcaO2*zl>rbWLCBJe^YgP)Ql4sFI&w2x2V<(~4w2n1vZYea zpM77+lKF-wcp)db=D4OZ`AlmbHDq65;2ed4 zb6UcpN)~hJQa*a5G}fdAx^hbq%(4Pr^G%k^G)JqP!DOH+sGK?ufZ$aSx&I);>4A&D z0jEhEU>kZU$_Xa_=D3*dPXB%cc^TKI#36Srw&M|^iRLIiA!L)T7|t7)u74?66nI3r z)DnKqzSDIHDgaWHsH_{N&#^|$bYXo=FIu^4ERJ>rR3{yq=1X5*zpuV2FS%=j(kKItOID^ zij2?%Vzdm2-Y6}=olbU$Avp6A9HZzm@EDg@em{48$Mxrx10PMHErcZ7*^7bi!${lB*@ZLV<*-u&^_(Nm2X4T@c-}y-4mC zROtZ=6rpaN4JNI*k>oO^E2xXbY;pg=tAv4bg*;@(K_n#`IWP<4E!nXQz`T&grjLSB z>Ym5}CJZ8oK!lcLym*(1Ku_wht@)b#V*6rgB}CLL%nG}-9(&WOit8(NXpQ%n$!4T? zVGt%B;{%w;jWM`$;|1+Bmjc&8!j!I!uLskmg7pGTOAKzWR zI04JGMsJw~k;A+D7P>w_{>qI4pGt)*7`c>Iy5O3#M?oQ^hgWMqhM$GHc5?IxoF0Sg zUrxaL>oYO{$E>v%C*YeeUqJT~c?e?EJtyq;x8J@wdIZj75h?=!LV&C9qF^b11JLbu zkC4BjJ$OV^M2-{dJ|9uS{AW?Hlx!S71?V$ehGfhhfsb^gK*TT*I}1@5m%&q}6tlvl zeFhWUxt<56h!xVHvvhre$93q*!MuL?_TtUy^~;+Nr*GcBJOQ1OZnBzWFR8+v;{AlI zagM|>#pp$F=ikA|0jC$QNoBIc#Tn#nGDVS(VuZVH&~pMC(;IlW$6|qK4ve7&!%zg_ z=qag;VR+GMV@nsX5u%0 za{=SU30((WKX4Ekg`*=et3v)`CZo47r1e>Caga*BXiFGsTr|}9dMgxVuVpa}oKZ#v z!pIFGH(mqVgO~~1jys#7h>&zl*fAyUDKpYwdx4yU2#BKI8L4(on*fghOA?`xzG!yj z#;y%LA#r+MaEHa3ClUqZ%rb>aaXpehC0KZOOD0!ypg%`ZkYFuEqzXFvOeWNg!6Lv^ z03~D}lMPV35L(N}1@gI&Lq44|E)SOQ77=w0Fz9a7>oWD^~Z@ zkpe_+4YZ*b3jgn@)jPnQW!iQzt4P^fr=q2@T11NL9!W&$=&99(q84%;BGjkm!==}5w zP}}4YTXSbhH8LAc6ohGt-kc8sREc+8DVdx<;U(ll;#O(8OXEb__AnNE=0YTL|KN+c}M~vBXAy2#AP)*HzS!j zQD&vAgPuD>_S*JPRnKGr)f&N#@6cZZ*LUMHQ5sXB89)pimpVJaXbs#LEpZpTg!Up^ zTIjk9xI(}s?BdP`w}?u0L@~|5AfK4D;Gh^qOV?*z2qFhXUGNHdidX{dbOCgavPf3+ zM6s{fjXP9UsjgpjSf;Q_alMFwDJq--X<8Eo#H1Ecm&qa$U*)~$u8@x~)(EA#^e-I4 zC{98xB+cXAaow5!lo24s>J0}4!VkHn3iy1E$njl@S|&-<8~uj#-yO7%xPf zvZi|-ZZ;-Dr1&K*LS$T+lqrZBs|r}&teP3ME(i5`#)TiEh9U=i5+g}x;weLuwXq01 z2MdV&m`rR$rLe0g2T;sUxIjQ5LGK0f;Q9*Lf$!iGVCej7h$5HnI=T0;yF@_}%MSzo zeg<7HiO}^TLYN>-zNEHx2fAC)x?E=E#4bPI3$;t=2Xb#i?%846GrgAs|Jn%titP!l z$(`>d<;0FvpnE2D4*NjpZ3tZ*v^|q~8R&fwd7hX}{{9h>C|wMe2>KWh)gEF1!4iIU zm&uY~HTbr#KQjh8QIkkrN=5`rkc42$tb=Y$R|PI#QPm4)s2?3Mi4|tfXtSa?om&`# zyM=2rgXhd8OCwO;WQFr@Fi^k(o_$eR)WBWj#xe4{qB$lf)`^J`qUIYLDIYZ$x;>(+ zdI5AaqQ)nYjc|{MkSnA2NGb@LaZD5rjs>+(Nrv&-cZh0>z#_P7-jVbyOjw1TD*u&F zM4kFXjUJ!AgPu2q_U(1>CYa-Q{>vx|qEElmFo;ub-uMg7CV}gxl*X+6z($NT_KUp!sOUa|O|?2g!NPjMPpr%I(+z-6OHklC6?7bC@F!?e zzOATmM3uzu()C~@O#0stlKe)1*@*QCJ%M)p!d_N9{NXi9wzRbFTX-wZK8X9gnc09OK1?n3+^i|qvBREwV+=6sbz zPsqm0zrN#kLvZCTLk~T96F_GQJ?PsgI(`bs&*%K-Q(^CXeeo2W2M)RjqFC9;^!NadfNvVX70AJ=CWTjN<+lgxPJDqNr`VnuD>=3ghCybJEg({m+roYNc?;%QTVh z(xSVGcN|W&cqhD5nu~X02r}$c`t{WEQeJge`Hq9B;-#XMdzbIz;MNIv^0+k+ZrRY6 zUO8atI*xY-BczV!ckXB8yd_@{{Zzn{(snRowOJX#W8w&+nR}~#xgBG6Kpa9F3D-%O z!~xmdZOD`@di+g&$}oVwB4(xjNGeRi1Yj5HPqTRQ8Nn?3W?L7%B1(fpfz4TaEj}b-lobUMjQXkqTkFNRc7{QfZWYO7)KvvkMq6 zx}X_KKw7SQnRm>BNcRedNUub|Q(};Se}4vyu3>3<0n#!iPMo@abCoBTE_fcq3+}#0y(9^HWRyi_AdCX) z(h9S)!{#IQu)+uZkMP!>}*b_K3jWgL~ z-(Nik4x*y_Zc?>^ZBepjEmR8D&3bxY$mLou#ZY>sHjw+3vfB#&48%7ep!Wc(C4W|K z3F+~qEgcUxNdFSSGWlQDW;ZT!*L1Q~Gq*LtrYk<#x@D3A1t5z72gVSH08lx8EPc&M zJyI|uZp?z<1WaL6M`=4#S;INxUQ`thNGU$@h>bhW7I4j+S<{0y+^s#jZcGqrOQh3P zbg@?HtL-V>r-nGr`Umi;3Z2Wl(pnA=n-697(QP4Q1q{%@0iRV29evpAg#Zl^xLXQQ>+F1nBQc>0$ z)}{)BsZp9r>fAf!4zjDO5lZMq2!KAjm{O?iL3jByopkPwBEOS`m(fm?lO9p%jKH9c zuY)AgC`bi|_uQ0c2mb$xkdM@O@hJn~Q&+hT3;|B28guUPu^>yS6FBLD6}EBeR~)g3 zP4teVTsmYbHJnVT`oPg*iz^C3IOh)K8Mb&z?-;xd)Q~5FLB=`KeVdvX11{22IhkFL zTLuo2ODHwMPq`}=pFTFP4vPK{2inRw&S3OX3^j%!7MCS7f(2%#aVWcX0xl7BK1Obg z-VxC??f&%w0mztRFq1fnUXYCk;q)k>a%`~s4|D=1lgan41kQ{K0aaocMG_{;$-sc!5? z$|$!PWI3|5J;#lX>;3x(3eHJZ_ln?VpS z!x;uoE>GWTQ)u6kd6G9Pj>U@MK&AH?n_>Z&%rvQs<(UuPljwK4s#wEWRznY^uH1hh z_VGDw{R11ZPhf^1snF&?G^JOT!z zv_AxCtYG8?bG#*OtYFk5)eqG1z|_H*9$JP0jakgcrgo-D=`E)@UWQ-c1oPSb^G)u< zE&V9*PpTB*21`Fm`~zJyrwbX4f?u`|W&oxd>5>P=*lp?wI3i-!PdzE6IcT+E@&#_H z(n@rHDiL#w0x45e_`32?gp-SdR*GONju)vi5~677VoY^==F4v{f;*oDf>O}Foa~sn4PI~I+eOP9gY^7xj4%&k}PxC{2eKm zS$rB0urLknO2Dkg`zK=o_dv|Q8!_`+Ln#ecTAFD=Z7D*B)sUTHS^NW=`jr0OpTX}1 zHB&K@9Gi&`9At=WYUSC%79n^GvpKL|qyw3A6lonkk*|QTbTI>kW$MZ&W`$p_H4$Z_ zg094|RTI(@WyNXfCi=>pG8Mfe6%$&D1~bAF3Q4Dl)@L8idAHICG=E_Fy>Id@opFA& zzInQN$Mg$y*6j&8aLs4E&^cTDZRBu3RU9 z9+{b2W_Ca!J8)0fZ7g5qMk90-PtZC3HRdXb7=}XlJ+{svhJM=rV+)~x) z(IfCK0`%AbcrK2WFselPO2R@b%4=zcj~D2Q{oSH{^Lv;5%A9f73j{-rztgCbA0PE| zLKn;ePX^o$d>lv6rC~{1ZDK4Smg~@TXc5<{>}AcG)K|DQ}PfMe1FlQ7dou3pg9Rt}& zE*d0}&rdxUVk8}3xYUOHIC9zB9*XTA^JgQY6^4ZEzrGNTkgSjh*|wKZUC?nfj(`>i zlm=03YZM2Ka6I~_1{vnP<0GXXa$eo=1aypv*)@jauF*AgopAw)DdS`s=m?iKJ6Lwa zySux)Zsz?_#waGP_KIUG409w=>2*^^0pf!m_W7{fvb25kv*i#ZskJ{2f+2oUO;bnEC|EL z%$Ep*DDjC3tpsD^aUDH3jy*&`OGKUmoY)J}_*>U^$@F%`p|BIkb79dBrCQ>%zOqrA z1)dk&(U7-~fJfNHQvjX+O>oQ{=^+L_B0L>NYZge9M>}QeMdYo)G@`EOa2BHoe3Opx zH(eUyh|CDvckM7a0hX@oOKx0T(j*+??_C-nhRvc<)W{Va=x<$41lK%vI@t|aY*=;z zivdO}6hV(H4UH(lq$rk-xHA5eL(lWM&qJ-R6?7aPjc-HC(!=Y+#W`=j3tqZo+4tJ;Rbyt|QsJcw5q6=4Z07ZWRV>z!xcp&@#0{K~#W1hJgr1?Rp+bDCfgkdNG zwz6d*E@Be46T*eesOCmER%lAG$5GfEuNQ8_f|{v95px;$)+~6g;202m@5V}&BEr~- z)Il9F~Xz8~I6FRbq2q(gYD6O;B@;JN{j;`D;$QLAe zQ{EdEiI>Ur=yOPubGX9n8?r=tk_RL3$#rfb3_l58oI&Y|r$`V&U+xl~$_~@O6{#O} zeuL<4+>x^Zdnm(Es9ic4=YqQkAyo~pQe@s~p%Y-3ebZ3hmSF@kF*`&|K#px1i$ZBf zDe&mgy+oy;fFm?JsY`gUMO2DR1L}`7N(JZ-4SmGuKnb}}paWkjI%WHPmJDv+fznHS8N z*#|G&P=*)qf?KzRpjIz0iT3NHC5dBGQ3*7clqBp@F=;ihbbs>{dE9)W(5<&v>wJ(!u&ehzD z^FGuF34EW6BTb0D&Em)<3%@TL!=pz>Jen*{kKR}?U3&M12xY8Eg29ZMaQ#>Wb#YLL zd?K>B2oq2|wtt$!SQc2f&iGuKR#DtKlG2wmwIk%E}`J|F`rP_=}geNMdu zg^}yC2po$vUv3z%xL1rGxW5#SG(_}$k@q!Co|=_Nx<}vke*5j{%NOZ0)L{j>ix75z z_8ZxP$yav#{QQbw`{heT|5G<8qMY$j06@XLY@*o6 zf`3X&g*w(0Kqf761r()>0?Ob3)EvrH0MarFfIbI+;>fktVJ;`S`n1eqI5cj!x#Y*? zLR9BJQ^lDlF$@#=hBa`yLJ^!JrI8Jzy9p!GCFDEm&)Oc=B$VE=lgsp$(GLA=fLErg z;)ljLjrjZbX1ZU|vtj>-p4V=#FMBrZ|N6kxv-`g>91IWp|ARbq|L3`U<7gcQVy`c5 z+01}Wm4B-DMu;l>L_4LbzsC+_Wm>o?B*MK&#Lteh9bo~e-2S2GsoQ_=Tkt*4#Lf-) z(05dYg~zr2wx`Mrx&4dg;^Z4v3ET)R`SF1eV``xhRrN}R_(x_f8`i(P5U~pv*s%T$ z)9B~c|7bL@4(tCR9=iT7=}OLpf|H9u1g#Q&C5#PJE?`MARm+%#I#*)iL8Xn%%8Q^s zN8mB3@Dw~wFXx;*lR`rJGArDqr3uS zJ9gEC4p7=4KLE+M+s!~qapYLu5WGm^1$;Yd#SR;#OdlmrIx2++I`8NNGjJX7#BuGI z%%YsWe3QqyAd><`E~{}j&#{x3t_-6Q`u&0${t8;wT&1OI=B zr`G;Mm|E5XM9r;~Ca&c5xe}`nKP_rw_K}pcFJJ?o41?owx zY((Oc7!T)|;gxalGhBMruq1C(kNPVFP^Cy$T-hl_vkpl$(58Y%HJ%EV!nhP67TE5U zi{l_#^8g--3a_+RR+a&l>98mgG>!QiWoqgsrz`5dDVeJw125>BgI5R!fWmNBHCHy| zT`~;WCdb)H&y0N-IH$!iuNn6oFvWnArQIEdXq-nQkMWxvDK|m3fUcVPvQ%zJsU!@X zl1V%W3HSDF+W%z)+#Ljf4f}uJ8s*P_bW&hQsAXPjtgG`&vX6x z`_N&Zl|h?9*8@-JLYaZic@P5#R`lwetWNWAlSQN~peKLD$DOo^*tk}*r>3s$eRXGN{++Q(LM;H2VwMINEqE9{|Sfkoz4I^%76WW{l^*(5Axqb zJk+?Y+W%kkn+mnoe^4dFaeApY{ikU#8(RLw?Fq&1FJ9%W{(@dBZ2tVSV(}Mn%Iy7) zh}TrK?u=_AHulE;@uhO%4AyVN8Yc@5z5Ik@B|1!?5`{Bud5E|#2)LE zgFb`oI2UMV)3Hohn}sH6t91}JVw9763Nx6FVHq*hVZQkY2u1O$z;jU4QQ9dTwmc!A zDDJXbdCJ*OX_xARu=4YvBhIVhB=QRZ-SWw3d1SW@d@5ajDeHO6dB24)NP zq_yKu>C_aEU~4?=I!2&=}p*`kuePJVCZXSQxxiD7&upoDWSHrO4$md-G=h4 z2Em;x!Ym-8GvuG^b%?mwr@T06-M7u{Aw_RM%9ZW?wvtg# zGFQV}we#iP9hf)pf9dOZkNzKhYhdR2ziuA*|ARb~|6d_H@EsztDNevd+7p7D7eI&S z;)`=Z@+w)r;wGCh2JjocC9#s+S%oz~y{te(_I1+$6Y5q`#k$z$l-7~wKP8Jg#W0Qa zSBn|xvWRro$>X^SeHt@3D@vE5w+j7cc;zD+v=}x~wfUfl8qHA4Un*~bnyA_wHBn;& zYR?nbb5j4zB@9(m%Iv?wc~RZkbWi~_^>?p#8eiF22lS$kIt@Z{YTH5L$GNhzvO}G+ zftmsIYgt)JgPq(FYqcJ)7A%Yc;NGP~fY{Vv#;L2Oy|mme%_(uYJD|SBOwrmlGhnKZ z`SQrHlf4R5kMm{^N;n1jEnpo@p+9ClI?~;6hp5PtD*>>RZ9w;|MOb}Hpzc0``+(=8KyqU-~Srwhx;E7@)YiW zT%^JNcy1Y*tYF*QAavg=KMV?2_QnGsabj@s;Y>BJs+rG=HcC=j?v78;ui%Mv5TWSM z?~D!87svc4hgMV58|TkG9xLrCXGjD&Eq_8pAr{IvzU@(LDR1UyM+fDHK5eZ1N=u!R zcAK94u#wF$(7b`S#{o9z^3~j1Jlg&|B-p%{}1xCivIyUPuU+n zq^WH7>Ilk&+!7NpCB~d(ShWJv?=XpJm=fyQq*#NQ37H4eybL__6*-Pl#Ir7=6`oCv z97d~JXzlM=;MPT$G|vqAO#cw3?rH-k2S_CH-KOuk>pQMLKg?pgW}?7DJP-^F-S49y z32R3FNCbsZ*G=mqk%Tb^(x%4YU1h8t6v+)hv-Xj5bsAY+973CWe_kRFL5#ZR;&q8z zZTa8|T+=co<7!q)GJiZhal`)46!RS=fDQYdVIUPr2^B`v01i zo|pee*5I)IALJ?6e?+pRE$uzhkX+{gEP}8%_5T%--xUjxc$M?76ZBf)U&lWywi^Lw zn|L3hZbh_@)JHheY;zxB(V3<`!r9*4Q+yCP!P(}Tnu*ftZ9PAa6wgm_E{!w9x``<3 zygjc3Np5oXtf9rcv*!k4EI4~g9PY{2Q$fAZWSy(0sHeJm=7#k5bM=%xICy$)^EBK4 zA=A3H6azNN|D*i*k7?-r!~O3Ec@+6y)vsIY0a@pTqU|nQqRTU8*Xs=#6G5r|Aa>`% z)>%*_j;k>7caODOVob<2Qn1;S+IkvYyxy|{vT6ONZW7z;02|i7)i;g2|6hMFI;{VP zc(#cDaK&k2-w~iPE;+o&4IrU(;wv&C?<;~t9pF9k zqOUXvL?(8@E|DPK`7e-%?lBUCx|AA(f=Fm{S1kfUG>h)ADPlx7gi-9$EHNB*X}kwn zs&WSFfqr?wKn#3?K5x0)>*F^RmR(htg_1xImCNoBc_E#(ReI!nErgVmXXSi`R(7mv z>1B0Q$|L1{zL{|6nw&nrvQ=@hq*hr0WdO7S!Kis31Ryzp>UaU3@8)gbpiJsLjnsX@ znof%-DGoZ92s$4lH%9NMhtDziC-^l9)G#n<*!~RYY}$VD5Uvg9Db8K&{v*@gWHR~Q z?Uc1r=J?5=G4oIdJOO1sNn|2Bb1#@euLB+zd}seGrug6Gsh9tmZ+=g?tI@kru3j|M z2sX+8rjd*PVfKfXevtnk;$iZ?5dGsoMD@>I&k6h^5%ym!;T~{(ek~NGR{VZ8T+QR2P-`-BG;jfYU&^r02U0Zy>G#5jypTl$RslsR#&tP z<8`L@{Dibg*K;t_3`?msJa-EqgZ&@$C_hl!2&ZDe>JP6vd7e-LVB7PmhNo4^u7fzP>iA_;py~l9LxQcIVb)9SgLY)T*}C3WeYow z5=KXDriq1D%Ymd>!<*0~y*HHkKyg&zaoytPDR{gHaID6T;?QY6?aDL0CrqQDmAfok zuzsviC#P1{7dajsf=5So=D6Y@t?63W7~ZLFEhxdAc32BlfB)Wc(7)=ljr`Arjm8H8 zoBV%9qkR0A{y;y-{}1xW^S_LUkWXCA&jDQ@qp0>EuudW-%bce?l;4kNmg^JH$rud9 z*Vp7@H$q{6-8hKW;J4pSY6`}14u1Qs!(d({p2vc5zNGe{3myt z){l_CIyq9d2cDC=e$x?!^2TRTo0*X0FRC=L!kS_($`t1On5X$xKeO5yW6YOK^cQKe z?p)CG6Q1IHO`Gbm>a!qH=BzZIdZ+53vh3zS>6nN*d?;_9g2yX5kj1{=mUMWfcCy?w zM0fdUc;@l}Q4qwvF2;+V>)b>b zGCO!OWuN)GFEw{;ir7d~Expa5+HG69Ei}(|`9C*j zKZ(!`MaZ{Ze-7quoC-I`IVBLdejF$VD9mi$;&i9n;{FgjL~B`(ZGum`K&AMI(x z|3##|ZH#|S;y+t?`M+-%2mk*Ec_jarp&NHK{>ea&rKUgewaoA*zHKo3Ws5a2`ekcm zO@6IyegN1ogj3gZV^=s#LB|nZQW`jad3|&G;_d76qZal-CH&!U%5 z{pWE1<3XM(|1UL???XC&r9pkGUB3#Ug3BGhWEbwm>#J;=yJw%TbZlxpzFG<6jn=;i z0!`&V9%^-u@}Fhp?|=36!6E+pgFI6HlTpRl6t}eb%E01E`0VNhTo#7B(qwx^A-;v- z_V=_j(O|}A+sa}q+LfrU;nF(+|70gRRB;y);3AI08;^SZ-GuZsaiWiP{&60KcJ?Ft zLS=DqW-TR@;^PyQ{?}<>i_CiP}Kh=Coa+d#kURm zf3{c?{Xbh{NBzHrQm^cDe?+BTlEl80dUZVRU#Z{Vbt92!>~q7mt1j7@pY>2|r+hIZ z6?6)YEuu4`7>87F7paDsbsQ;viV$?(`QG{j#E}~6ZcERc2EI78^ZUoKfBdUIE%$#p z!+W&<7^8kZ{*O62#Q%Gkr^^1LCYgFj`%jv0s)hPkZvRm=+Wp&q%EX*|w*RDK)B47r zRLiUH`lUr0^*K$FRp=-Olj&&sy7gthyk%ndTYs`2tNXg@m)q&@{leeY+G|Vx-`@GB zf&IU47VQ6)dAR@aAWyCT4uJyb_a6VDKN{xwe}6DI z=>HG$6z+fSdi-0$CDYSi{;}-vmw(!D_M0iyNf&p8@bh2^jW&|GMgwmg|D! zd>{8R_`{OHALd5i*k<&rsWgbdlQQ%K+f6Wv=yE@wTyRYn^k5zWl)U*3>m1p;di}Rb)_t&pZSVZ;Qw$g;p>p5|EG&Pc-t@^hIL zNPgU42g;ReVhPGsX=4i-497WZ5PP$;Jt$R5u3lc8UY=gRyUbV&{%_}CGAf#k{*X4K zA78(DbM^7{_1UY;3{yA2O7n?D%_mvA(Y@GGtcJD}tK61S?BvbMpU&RAfAR9g`OE8% z?=FA5x_N!^!77kb5q@s$|NM5ShGRF(ja}nW*-XrT6!Q#Zo9q8dhMIeN>g7Kk z`+v)O|Ki!?|1m1ae}-iq^uGsrYV*IsT=rM!2`BuwFx+eISCM2Q7e0Wq+*#szB0tDx z8?=_c)9@CCqIL>ODOJcZ+s$5LNaZP>5x-lW=R&=buYT_q??hx#`deVr(*rSLptg{ayo4VP4w?amY1B!R{xsuE0B=PPd93Z^)-B!0j=K zE*p$O3*>cLHV!@TM1VWa7%{6hkY@WwL;f$)4sGQCUeEsx-74JwHw^O-|L;Mb*8Kl9 zPaJh0++U^`+6V9Fz*=&CH80lAd_SLL>nq^;>ZlZXzWTKR$5#-197gUEM(Zn{>+9qh zm@76=kpiq>aFq!vSoNHl^)Zi2dzEHuuA0mI2<7l8j8yh}&4`ttP#n0DLJeBT&w8OX zk->}%WgZ?)=}~gQKbyLaXa11G%kLqsI05H?9v^4s)WugZoO-2ePqlr?taPFRzsMlq zEFI@AB7=fM$Y`U(``H26iaalEk`Ds~}&d9RmWGtJ_ z!?JD)mOG4ob^DbA-=ewVnCCcc$@CwSx68~6$x1hkS2@KNVac%|vr@N+Y8u34jU5;I zn^$K_d=g68U|NSWLZ$?9(WycOQup4kP5~;YH=Q_wXy)F^KBv^wb%S0MBr#3v6-VnZ zaQzr}6xTPbd{EO$-JvNxh!NKRrp+kx%$reXzHmxWugSGg-9(0d^|VFqnf04l{%vM- zs`tMP_fvMISWIo~6~gsNt`~bsYS>~`05m|8n4TyZ`y~)rnI}3;2?@}^Nkl{KQpL0+ z?|&w^V2XSS6Wh>3XGo+^1E7%KAjjU+|K$YNPVBK1r-Wg5+|M?mIaJFUd)&Q5^mwX! ziB>LIu%%qroq=wOP9=(T2$XViFv=Ng$&AV$QR1amV?G0`lHq4FmbOlF)0RxaB96m! zT50}SHGHCSB*JpjDzhhV_ejCMOxo3oH9{`DmdLc({JI&UDCCJQ#p0P{8uFEtc>N+i zDn?3G`a2^jm*AA4TsG#RI2oa1P9sW|62407k}u@GliJrb9n_aEDJQ&$(9HeZVZh1f zGOz{A0GLAi7WvLe=H+H2fXLCDuc&TNVxS9k0Zr*#tO|giET<@9)zjpNg??ltn;b^x zo7=}JVQp+GKV(%)u$>j{kNY&V|Ai}i%is@9^8f1j_+Pqd9pb+~$kW>XcOedeV;1-2 z%!BUoUaW!PN=XM*VyaWaA1GlX>TPuumbyGFP-&~n9t3C3gdc}#8vACZ%Ke!3I21pK z!4vdrdC88}$tB1a$QF%R;!ACl`9Vl~BMlrulo1Yct(F%{p%LYa=}o01mp^AJSE@vF z>No|FY&$|Rbp4j6I!YILeW9!@khkpOMNgdjYaw+o>zsgFgu=2w+qF0fBMK6<@f)?`QJl5t@nR%pmHBOKBuzUU0+oXciHjt zYG$k5{zz3uf3Gb+(|&OmSHD(5%1bbKWm9cav5M0mRtnQpW``dhWlpJht^J%%u|JNF zYkf;NMOH`v>M-nTR?V^U{H7@O#N79~4YD9&e37xmo@BhZv=;y}sydDETIU&U5HN-$qeAUU{-rDvEK)zRMtAR=my>EjoK0!P(5U(>oUF z0A)Uvj#NqIx;9lDuc%ab3H`Y^4yyWkQnhZYpjDE%mYu3ilTp{HdKl*4HubI)U2a#!_*V)Tx znjN?MsB%|2uKG;2kz>BrJ!Hp0bW+A4*r$qBn*GezWVJtP)!I~Ns9Nrlt-Yxi!>Vld z8}`#mA@Zf~uyg8ti;;z)!O0XOanS}!#v|_tx?$;#D7IdO*RHbf@;Qwv*t;7BA2YIOd=Mu$9lI?^41>@?L5s}aJ4 zB{L_-O=FhraBj@9PSd1DM@-hS6u%fv(n*k(3l&GIEz)6_5XpM7-{}asI z2*=gF(+a@7*v9`Ao(=q8TwKFF%KBlu#9#c`!2hk$U|6{SIXImEKgd(Y!R1|FHszhv zo(SpF^NV+s`NwMTgQ zW1=SBxM3&lBk!DL^_6~eb(mD4wp*nw!QY3{QS9)90^5rmc-}0(uu5@-tD;&WD@&(_=bV#3p zCv5j&g^romUnR^s6;+KPLbuNHTQQl*DDwy|)-PU#DX)B7qL4l2CkJf#E`s2eK=gv( zHVHvzWpqGCUgGVj?RL@{owQ$ygE#3|*0VcDXR@R!8_Ji@O3UR3vdDmVuPJv>Aghbv zSzR5`h`4G{93OSfJmD;$Sd87|ReO|?6LSb{0jGw%xHW{Xh5SlTzUP=`oHcr7u;plG zj;6A(AemNUe%VmYvyrX95p2*3d5{FmCC z(-z#eqQLXGxhjIbbLxc)c%Cf5Ky|JWNaPIA8QZh;wr69Tam~qE&vM^{$2c3j%(o=+ z3O5{1dcD7{PX4-L{&)ff)+hu2m`}^b@ILjbP`&)`xznDFqPTZM{{O0VxNX;J#!o4`Wu>OCyo(gqbW+eV((!TD z)2Q9(b|`|Z6KQV>*RPIC{i?Y8OF?HNWC>T$_1Fz_qCD^{x@k%~f!Tlif5rdpcR)we zG`iEa4nF-jbKy(-@&y#{im3-dt+puU8<6$Qi9Ia0pxDD*o9`y&13}NG?H|#a4a7e| z99+eb>(A5p(wR+$K)glkI*5_Gf-!0e^2a|Y{C^Mh zi1VMwMJogdJMGONS9!^tyEE5@F#;~;k>8RCIn{?hIUcPzyf)a&O1yrb5Z1X&aQp(H z@GJ<|iq$OL)r9{n!-Bwi7gFgzv%&p{*34T%oQ-e9C~ZtSN2@)(2_uA&AE(~`nyNC2 zA8b7Hd@^$|a+IA0#@xXzT7w`n4fO-B>4#4a>njysTVw0 z1aAQCC{ThuRwjN>h~qAZZoL3HT^u5QfxD6UHFt{RewMDAevG0Sv=Khz5-4qnMztap zZ^yX1GP<_!c5UCD5nWouT&GR`Z{Yf%^AvQpfL&onZ8`=myZ<||$;RtH6X>cP1K8;Q zXX*w2KjV=9?Li)vW6AS^JMd#NMchWlGrk1O4(cGkTeBXF0Av?-GXO z2ECQh$=bIuTCPxZ7A!*=fA8Ont}*G9SmQR1Xg3?mfnzX5G0Zess%kQZzd-h_91I+@ z_SWr&BMtVc<<5GWbtw}i@3?*h`K^N}DGQx?kTAD@8uNdCJ!2aS;3odB7ybVX^WgvY zAdf2l@%zf{L_cxHK^C8ge?m#7CWR;c&O>8X9-EZh1X9^d_lyAPo`#{|@AQ->%-wii zDX}|?RjNX36yYqP59i3yraY;bI19Q;gOU~5?3K7VwZq63hCwUEZ$r}5G(U4mUDwAk z^lg;wnd)YC;I4nxr!oI$baWr_U#!t6FaPVK(ZT=YK_1GdUVaWC&#_9cas)FLzJ<(u zC3{jCi{dK4;vb!>UKIITDvGPehg{U8j88`isAu4byxUyzS*Q){Q^uF$xboges+G{~ zf$}}sih!7L3n^)uo|i|7Z-Zf<{^>5SlG)7t3_4n;TnaxrqY-lelo-qs&s&3E6X>}! zmuwVaNGGIw^bs-Ww0un3Ad`c^6xlGr2;g9er~=2hI-ACsi#&&2Ir7}48zYCM%XKk$ zGF{UtesO+9%DVoXCTKkF9=)D{i0uFj2+!e(IW^FCF3$x#MIgZhPYfVMo?}~2GO3f0 zLNkqg@k9`NqO}6JBE1!grqDpPQW}??daY++G`(FWRYbN1S+!;>5%86$kT~IoTy`Yn zP05_E8CHr)XB(K~|6}iMyW7T*g~9#oUx8(MPRBi#tasVIlX)JulTK%EI`P_0_qn(4 zoERb@iDQaj6Oa;3lKt&_@J0e4K#_{$$;=adNGuVoDgcE-RiRKN^<2wWpmkJ}IP&jO zGtE(!@c8;a2OxMGw3jccSGHJ}D(iU|;&n=yNMI7Az9++8MCK& zwc;eGgb*J3pr&S0$qMTh36hHY6b%7+9VW&NS)8Ff*@6%MmMiFK(oZl)MD|a9jo=SbVPTS9XDh>U>S{ z0;MQtD=))@E^bD?_e973+0WzP(x#%144(NAL2O zBAY55odK$d3G9NPyjr2CF)+C_j{^?p_y@onf(%FJWiY|Zm{5_B%lusoeR*9{fA%yE zX^~Q;Y-Luxcc9S#mSK(#&_Zz*ldQc|-pEum!8FBuY zt8k(lLn?l%jHdXx(LidtWm3ZTjim;-@h~QERvpC(S{r=L7-}zrKpo+j!)r zolNR{Y>uw8N!yWzO<32DsoBt%@4FeMx{(CivX14%nMeCVj^;c#X?4Tbxc20>$JrbtvrQJIF70Z z(8&Fe#DsG9(qmNwO}olhguNCxD4~FrJ)fv~q@6m@Ueu5!yWWJzHe!>N7=kwx(>T^A1WW%GuOtJ&@?) z)Y${i>|{8)wkF6iD(;Rw*%yk%apzgae&NOKSf>`nR5*aNW4^MXYxLFBfk6)ps(JVK zr;p!qet!98*V0hUT+=U!8;wA}H}%pM;?*opMJR`G=fWiMFt*yKbyga#o#bSNt@kZqc7YR`;S!YX7TNKK23R+%}Y7H-u zIkl*nSr+3u1dqX8oJKFW6QE4rVz$viJ+537eFFNu!H7xALPk2F7)e@Hub&8g-y=n& zbzzd9)eP3WdNHk=4Y!^$MlF)_kgDDF+QbQvPg67K=&) zhLUDB5dOO<8*CY9Y}J(?cN&m}L;(R?Z$SyivtLP6W;a@5f>9I{P^vboYZ+Jk%S!T4 zyCNp~1E~1ac$FpS^4E*NNh$~^kIxOVO<3g*FT9^GcYs@BLN6g*nkl)v1kp>BuVP+s zkz8|F9zbT(VAs19X{;!yMN*RKZNJw#HRo+p7WcnV5oixNfsF~R>=Qd^6Jxc5Fh?fz zMihSdyz7|_;{S?6@Z+~k$;?Xb>TcnxK{()!_}}4hYUh6*4JY67e>}*iw*EU^BC7&C z`(=gKsV-x{-|OG;qeI=C2r6 zSV6o0TEnML2OXK-*c##k0OA!~$ot>2=P=3Q6un@-cXO0s5>uRS!KY7Wo<7eT{f!;EcV8VQsg5FF3q^q4FI^}Q1of1+@S!T0Bec^=|C zMkZ#St_%{9`ReJ zTfAlypR#_w`ssQz0_PVm$^YV=6hkReVzCwY_6U5p%(zF(W^j#K#(Yu^eEKBnFl4K) zkVvAi0#O+qtUmauu0r|rsh<8Fh>PAa9uQiM=*gMx)B565EE!NN`AwDzxN?ycl%JWi z>vNr%a?(3d22Q&;tbx@v>IX(SCjOYLXXZosLkXbL!a@E0=t}>NpLY76ybz4?R`)>a z^}l|vKN{Hi-=>4{H~sG+J|D!Lq#LH!!8irQ467?g5r|X!W~+8F$*;#Ta2E=i(Bd?~ zu)BT;U%sVYQeK)o<5#Cu)Pt>{Jhsv~XxVbDWqQDP!gn2Qyw+K^}V8>OlUG}hR`yq+I{#?qnqrq6%86;zL27t{dFJI-5+gs z+=5@BY@w`Guq5#uh1*d1FN&|951BG;E)~Yk3K7B>s@R;ghrg81&a|Oz4_sqL2Y8K- zU9Jt3ZqAGy`||mVr;^{eH_=!EHP)7~j7o6NuU@~oe0#qj?*rP0BKyW;uNyK)FnXOP z+bfJI)5XY^P_*KjnD-TCKzkbT`su=~WWof2;(36wPic|lI zwpVCgzQ$L7@q78MR;j1#kpV-P&~_i?N0q|yy~{{y z8}IHW-1<#U>qjN>N`ZG$dEFHoXD|v%H#{=HWD+fE&~Tr~N3y@_n;tM|u#?f;!PyoB zYYeJ;mP{rQT#9T*Btv05-*SY<0tB-TQM!q9oUYi2sDLq7rO4uoTXv&#<1nZ0*s>Cp z1`PA12$}fq&U#QR!tXW}gULLtGl$7^K;`I$<+7BM zZb9}N>DCvNZq%+(J&BPIP1h`tqFfWl9Z>vKN@7C}m+v^mug)vLDe*fVd2eFbDd$bb zaSn?o?-C=wS$`YaUIua=@t`K5lHR$r`eaN~S7xAb>(5*=R+B`RP;{qR2~2XZ%cG`Y z@u|{vMCW*h+*B7KVaGol0Ffv`oQvG#YxL^;8eCtTzkCK%K930S(AIR0MJHLys=t}Z zfCFGe2$T=i2}Qtj_VF0GN>J>_;s}8^)gviNKt(`W`IE=>?e>#@x4(n@o1^Vt<T`6>ol?HIViQdsV-7HZgs9}(l^>gX zi%7Uc(KB9L^FG`bv~$U@f$-?O-UaU;SPCwti0~C8d|E_+mJIj3%bC=IMn7 z=OS4Xit?Z0oY3E5y8KzRv~)4g3)OAU%<3AYvanDWi-K#8C!8ZuzCpR`DM2s~mtqet zes!K_S8?&tkY7IEx9O&sx7B_)1Hb?69#QGt2S9ymk3{=Z9I9Tct1YQ46II$2_TvWb z*hLOQbcynq%L<%E{3Wf$^GX8`|1Mkj{yd2x5yD#g`uVz1iX&7MQ~C7iK>z;v(BYgby?g->J@3Nps=q%UD#aO2@M3$N zI3+ZPu?&;(KD-aS3Chca2-??{u)i7c{|9{9+W$Fip96M>{okLCD)k@x{craF zgM7GS^O9d@D-3>B=fE)d8<_jt^Q)EUC@#h(=51m3Z3?UQL=pRFmW(jfflOZOlNa)8 zwtC*u*ySsY1q_h~R^~O3zlpayZ4WO*=>YVey?vZBRa*qmtAjP|hW7_`Ypv*q)>+<* z?}|Hz_5hiIRoY?Phw`jdzbE*(66I4q)I7;%rv2CJTmq>*Mpl2-d>!H$Y0OE&BbNq1gCt;2(J=Uy^ZMyYHZ8*RB^qf{O1QH z_gw#bIGI-BKL?|4^&cPPBji7yRv;=3#yABDUc_NDsV|Stiu*QM9 zkApxn7kZ%bqVzL!W-_8mB}#E`-!1_qo{wp*h`7;!eW)g@<8O9e?7T|lLAzdmsveiJD`Tc+Uo2l z?17ukU`c8A9MQADHEVWjrA=f!?)6WbK=mvWcW5f1!#)5cTq36Mlpr{==d`Pm>$o}vV93pchljcgfr z9gRT!uqyCO}%=G5lFpbA5v*_Yfa$qW&sezcn5JZ=Dx!(3WlPH%|wx`|?Gu zH_U+=8b^6;@a#!xr5^J|$T1z-4h8gwp2(uOCL}UK2t;~iI0q(`08Byg6s6RBvZ8$n zp$2rf0?j0!>p4a?x5p{cK?I%PQ1}9@Tb9-h%QB!^B;zwk(x^7>RqD4cyE_g@G#Kg< z1(0E8;#*rNq60b3;DS4{MML}79Z-G3)!x`Y>@L1&6f^W6X>LLz5Z<5OL~_F>q(#`b zF*QoZ*o3r_;m&x=)u75rd|~mX<+`dc4SVio9EH=?#ra!azNtRlHBB`W_3d=xem?u` z|7{&WJNEz4cxuQ04MyY9xBdSiKHUGad;f3b3o6c)E&sI=i26?NR{#o&s{GmG>ei)X zDYosMU56t!cr6K(GPXD2E0v^lS9JV$70tpV^?gieoG!SaH^toX58ym`2e$-dIhvy! zz!aFx<9U%thag&Hf49keQipO!&F$kKz-zih`Ma1PAjsfF;Ssp}^+LGnEwpwIQ&%-| zYkzsnod~{{xT;e1%V_<3Y*or`GAmwuht+F8seP_gaSq%EL6#!w!)*`n9OuHTSVz## zH(W|-d7VSOOn)ua65+H9*`Gy-Xo1l@q)`4bYi)r5tunfO8t3NvQokDMmrPAh2em>` zysmf(%fq|^Tp(Ho4(+)f1Bw5EUdF4~KGky~DH^-*@UN=vnblo~M{`siNt{>Lix|z~ zx=?WFYa%ZC1V+Z>@9^yJD5Ql*E3W$$T&y+VXL(4Z_tHf%x6>G_D>gQemjJw&8zS1VHZF) z%7q!gznp38=!nyq_*LWDg=wXlR9^+QOzG(5#n8gYmHc7tq{ZXf-lCC4Br= z)|!4HOHDVj1a|2E<8j~C|3}0AxBNd3@^R#URCgH(fJ}pr@T#az&b?45CF`773skKP z0$`Y9LcltUINzWsrbOwLoVmRA!;VVktx_;O}x_9!L-Y zQ0Jstz`6pjn-iVR0nB2VBIpck`UiJ$8l3@g3F%;kD2yP5Oiqd_LfX-$r2?udLynsW zV$+iN!yH9K^eUQVIoiZ{E#jmwzFTJ?*z^Ms2m-ABkqm}qCpn-%iInf6*(D@Io{*~_ zbBw9^v*?aeJT(f+gL4V#33v>Ijioi~viA!TI*K&{a0otv*<=)SIeV)B^N~SmXkH)pcdW$b zdehi~*LfnxqBw5-BRM-h{?q2{Pn-Y!r%gv=ACn+YR9hLu!kYt4;^hBmfd~m9>1jcEGbIJsnMLL&doKn9)tA*=> z*&f{AqgiM{;y;l;5^=?gkFkRX?q`%3uFh)9=F&lgc<=xONZ>9Kg+)?Mcb2sl?V5Um(;4;+m19|8|s zxeh!H7VVzMJRQ4tgdtvK38Kiv^-mP}?Z{_~(j@&$i7SmRmpS(@c@ovu{!`aPU!*Z@ zdJMGd{>NZaiT{}PzTN+LkdMRuQ}$hkBce*tsk_0T;D#+&!VLltL@0q<6ahAl4b8mD zUE|hPUI`)4&Wy^84F!D1$x->V!?2fGW&^3=9DKlA^$sbN9vk z6{eRtA}FQ*Hd6NM{p>IQn>zq^`TvHaO8uAd_}l%D2l;$m{y$@5*xLnYZ4M20hlg|o z-iHscnfotWdf`MT^s z&Rw5l`f&hGt51ObXBm7P`{&zyC72y%Uo?Bcjh3^r*l5rTtij;_76SF&j6)8#&VVx; z>@c#b(DpH_94PC|r5*MThoNi=Z)IZ4xPAJk zo%#PKgG&Ct-naZu5A)&o|2OgKOxyv96U3zXlNB45aEZ>uWiXz}?%)d1b)EtU2%b}r z;s~9q%&BGFfCER)eT{e6TcpbX6ls+1&^7?UPp@AGWqzc`JV##eKYNeDHNQrF06<4x&_ij6)XD4$(s23g zeU>AUW?Mh8RYlplMgnN|!5LGfaef9~q}tD-n`f2mEiyBrcx*x{YH&Ks!c}gYyhHI~ zNzXvvkki&YE@2*h);ux*Uv?e^2KI`&n$mn4^(?_RC|6f&I{!*@Su=Z|F>%G5vBe&M zK&+N8GJ}CxuL}JE)WtQ9Q@;?_OlovBfZ9bNbd4=XX3VHIlvWk&fHw?8m-ky zu_=<(3S?>ySIJBd;#Bz~47thVnH)8T=b{2xB|!gACT`6EQ3YaJ?qm128jW4;pR*dv zZSUb$WBU!Z<6d?5x8^D(Xd5lK&tGni#kS{CYrN1bl+{Jna)~urU^PqX-d5AYs2T#( zJ!l%*UU+|shPI@4=@}1g|24M%d7x%{+yDP+lK;OywCn%%r~PmC|3iG5+5ft1pi2a@ zoEbwRco#@fQdt0!WB7jocr2@$@~>AIQ|%-h(q)(8E?pwg8U%|3&tSs0%^Cq4P5KpjT0hQ$i7p4r`_(E1O%BQb=I$y!4O! z&jyF(tf@xgdy^?NsJh1yL~L(?l+B?u#9?{TNot0vGPd_VSh{Msdw?AD+{@O{SpG|u z?F-2N-gs!||L^xF-_HLZb$z+~kP;|!f#M3NMPn63YICG4euRQK5|Gv13f9QVu zD+-`%y#C+8JdM-EJ|2Kw{@>nkWUv46xc6=SKg6fS`u|OE0Dv>RreICj-#Jba_CJM- zx`kgbk8FPf7d7tRD~xH~8h1j|m2`eYX!~$Kf*dW-`=8=80zoJLpZ|&e{M|>ggoE+q zOr%f#?fmN1i&xLjz*X5R5Fv^}iX!m%!v~;yk7XVZk?`a22xMHfVYsDej71)In&Whl zY(b6~`AjH9fMNhQIF72LNI=Yw-*OzSMJ+~@ZsHuLE0ogi!Jp%Fj=_@BjGP@GM>r(i zSxi&7in}3R9hX)8kC*sehvMTkm)R7iQAc9wFf1Ldr5@D#bqJ+zp9lN6O>vG69)SzarQp|#YY@dbIp{88dd&Y7=6@jzW6SjUxn)Me`j0{h+%cA&$`Tzk&dDt^bRk&tE-%_VV@f?kc(u z9QEseJec;a`2YTB`mO%Y!+airizQ4KD8Y-r%<{h;931=w@)P|hQrqgBbWgj3QSjHl z9K*jJJbLs9{BAt>+he7TEMmG`&$u2!^EHw@1+$DZRt9r)tiL(zcDn|oL-2Ue8}vK< zL8pIuc))Nm>ez}s_(5JR1(7)O6?aqMdL{&+HNL{3b|8j)kx{_ya? z*XN+fLi z{`Rf@4xIgMI>+Yl%;WcRD0op@F&_Pv{;AdHp5EudetqtrwCi*K#NX%ssi)8V)4ltAV)nUz>g=;*WT{R8f>#Jc z@tj{gqC9sFSm(+2gs*y)saai)_jc#R*PUi#W_5=mLOa9musgN7bfR~u@0-SQ-sFVx z>Fc!=)4duo-JkmU+YE_o`X*Lir&?cowwR{*R+{k;5XA2YA&{dKZ+J3=95daL4M3SW zmF6%`y&anPIyBk4Lu0E$6K99~lgDOlbkc6ojZW$o-PqU3@!p*rS)Cl~ot!r8+1>t061r$F}iQXq>_u?&g6u0-~RUcuy3?e^B}EXD5BCc~VZ_TuNui^O}B z9-cw>DWH4lpX^0T_0%=bUIWc@e~ISlpikr6Tj8`e^itjIcZR)&9o$RGdOGM+&i2;L zEY)nRb#QQMyFEmSWM0x1K&DB<72@%{ISO;cx{l`{L^&#Lox6V zg-?as+wWz$y+-;_*rr7WX}DC{gfak=IK4w&^UvqB+TUko(mT}Y^?EE!-W;AZ8!a^< z!;?{si^Auj*xPQf{1eU&$_bGI-3~tk3&w>a-~>e=#CeWFnrvn7+iBXvlR8b?x4rJ$ zd&?u$*L&}E&e+r2Y;P|+*z$XAFr~SrX6V zkRMqQFwgM{{3y=bMc1e8HsRsaYZIS%=JsUYxjixG_QagqensjM%oGp&PS`vm1Sn1y zAWi{6`6dpT6_nKYo=!ZIce3x~P0h(WF()=!@lIf89hF`@7d@lcYYcs5wVG)m-z$}NSD!K9t)H=KA?zo~}- zru#C$q&qgpz|8=Kc+%~0i#MW34#f&);&PCQ5SWaMVtn9ge)}?8KuzP4?BECZ>d* z7}`_6p|@frSQa%!es|dDV%J1Fr_@Z6~{NC8hx0+cvXbg z@>Q5^!tbTX8MfSwhTh$1;*rFYeI@bOG{Pr_B-X}36SvAe-1^LxvB#ty?`u+z zO_O?TnAH7Ig)h0+7pybDZ^U%BaFvKDX=zFhxhd)6^Oh$1P?+cirL?lexyRCdel+gx zd3-cBH{o%2qK{=og=SMPj^)p@O!T|gQp4zZHH@)mD;@8P94UQK1}*~rKH zZscQgBOeuwDF)-DolqE@)CdLlra#_y z(;u6g{@B>`9fQF{9*iQM5ep^&CNU%giG82D5D-{mLU}x_J~m<;+HDGh6R+QP?Ai3k z`)>LpdmMVsaZoEaPAR{&ApIuj^4AM7{p{QJ=Sy>7^nsw;3=ugTEv4UyR~H<4hGVqv za15Itd{GQUGFR*F2cVN@d z3Tztcfld8Ruc5ziFlpxy9Zb9q(V;KgX}D*&6Mu7Rb@D{-WWxieLCet0fj=~J=!+i0bp~GRT;8`j)(TnmnWXHg5Vt5^AVS#)O{T-?d^8cG(eeaxV8&D! zL3I3{*kk_Fp#VN?xuk}5OUkWd5BHAE8d|YgLp?UDZm6v#HEhXG!#aL)Yq`VEjm_#= z9UbW%?ODr8q;wOWTee#oi5ZR?U(N!S|}k-fk@84N2uR&g!*+OfM(O*HQHH)Ks^OkdRP4=DYj}G4@Jy|_{(shlf-J|II6^?) zwicZamn$5BIgG_|8eCJHp?npKItpSW#_cSc{@82L3_Sr{!+is|hFwd6J=KSy>aS*& z-3I1NrbxCB77fi2TqSXeKr{pEJRtxsydm8~Pejyk--swH7=NfmM9E&b$?$2Bdn=Ka z4mouWX0hay%Rt-B)_J1J4Jt`HYG(lUM_vPP=<$RO_w|GhyOzeND~$f@JC!>SLVaVM zZRzpv`#t_ck7snauV-}FwRARJW%J+LvG&cD{`0;+6l>`5OAhz-OAbxH`8uiiXX|@aY5ls{Odr}7bPDicOb2R$qX!v5$ z`<~J0?>id3ZhvUf(Q86S&u7>5_O|PKmR;A=?7H5m2=Mig;$APky^WflWz_UEqh<#w z?&<06t#bEFmAj{@-1U^WRo>oyDzEfQ^i9pBSL(ftmJ=^6ZpF2?uj1M>71v&=xH2*( zUNYQ@Yj0o0wPz}>y;5XmvBBg1D+^gMb{ zZ$CY#;M0*w%diX>~pSQ^=&Tc?WSeQ zNOp0nc(4yOQ)}N7kTg=t;2w364c;NZqxNlQ1woYX%bntmHh!1#tD9Qv{^@Be`|R}8 zW1dZY+wOGlZFg#IyHk7HbwoM2OtjN>=g+6Ur5mt;IROhqfe3?jhKvYQKI->czWmLeMZLa&D|sN&^_{r;_v_^=881jgCc$?I zL^%DP@&kj%TSN~5UQ>YQGKH15OD;(;-CL=dno7;oR%$9eV(%x2BA)$_Uu|5cYl5Pp zciewptT>dyS%QGkVvch*9=;yBl%?su%F@(SP^OliROz1V6HYv_<=V|n*$vt5n1p$p zx&7l)kG?bASKpbM`p(qScN~)@4k|WTYDez)=yfSZ(|r}Asi_!EEyak_>n6kH0pq{# zOUB3~V_Y|EQue?!#gtzcdKnWcIGkTU5nshJX3{9jafk?Gbsjzy6UO_Ieh1-n+A6cp z>C}_hXX?=zr~B%RQ&VT0S~_Dx=iq6(@PJbh9bmYWvpB82EGLc*Pnzyv~{Gsr@S7zd~~;F5CSekG5sKy##LA z?oYAWFpFeEVwn-97?3zZA?t*gk5=I!r(;ia$kb!wO!u{MrlyTEwQQW~U@qYX@r{&e zLXd}5UP8Jo^0bKkbsi^3)xzVK#f#mU4@NslFdjN{W8~}foV>y*PgYH_CWGv7SE?>n z^2lXtV%ixP;~E3Qr|a#d>P@=+kv%iIs@E%mHFP$;LWJh)kcy-ioY~_v7NOi)fNVKb zB`Zg<+V$Gq=Q{OW=Mp_|jEQ)#=b)HT69SZTSc)wQ=alumxITP$LOPIkmRN>Mh+$$K zZdOCn z_3ZrVFVF5N`EP^z597hW&i^~=kH6*reTdH^@Ir>|^LpL~Kdn;{mzKn{9OhfTv)<%u zbRi?Ub~U(;`Lz#_VD6w`n{xRSoM)L(o#ppA<~t(yv)BKk4>5y<6V&sV2=14nBgbvOL5`UV#>T1izx3 zX{X@h!N-pF`Dpyd{^Af{6xXwOKlm^m9PqU3F#!<#jFJ_2DThVeRxImQ-2D9F8eIH* zesu$0T!UAyZ@@3l&R^Yto7dpSXW+%F>znhJFP}XHPhVU;ySRDzUmWALxSx4&&;ggC zghjYS;T=~@fB$10hj$&eL?~FS;|P&bG?ntGi}S_t3Z`qA9RI)kjcfMCp9a0>{GH=o zzw{ zuaihv)iEX95pjpMU9ruSi3&oPf|>BlcY&muSu`4*Oq9CbSP>Hk~;z$VL+{Ul_;tVR39#PQ2MuTT;X23cU znjnhX>tTop5hX#o;00|!;7>RgKC(ESUa|^oU>-A^;tWJb#~IcO{$)%U z#nK^EFpKoOXx&umhY~KLGL6()wKs*|jnOZ?&GUGngpa!eiT7j|ImS1z1DVrdZ!raSuef=|IIX~vExQs326j9aBZi9dg;T3$xAt-1KA^ivm znv5Lq#Dfk>*_)9Kx(j~ewS+KTY7@uoUV`WmALm>W#0U{-tFj!0DB{(bn~-)bPTQ)a zJ$oM$eoaW8$H|Fjzt|&iqihC%-e>#(Cg!%rj3;R&jFHuXN8mP&-sS|})<~vqoGx-i zNQ1QqQy?2_UQAmk`OwIV#SSz~wbii{N!;2ad5816I9)uAb90c71AS*=Fl9>+#koAW zmTMAcC`FOHL!u$(mIVPXM9n^apGI&6%rfz^+Uw z#Cd_qmgPF+dy?b@u9kAVc(0)p&vLw?Fi!4)RSHlVs}#ybf)_%`B+HoRo9B9Ng74z? zY@!ggVv~ZpU2LL3-;YfSOg5Y7knf323S2GOqdR}lD9 zoFJ1U1Gxf%GqwR91?q$_I17$9S$eGA4a!H%k_*lP1}iuUQp`6G^*$933oxAHFQvf< zWv0>iA4miPs9_VF#g8F{5~1u*#sa@yzUunB(=E<4&Arwjo)PieG7gub$fD#e_NFrF zW^$`E4K^PxY0PT)_-JU`yI>ZhJ&YozwF(B9p*iCTn)8+v3+!TLLAva6<}7`w)*581 zO=gg&kn0vY?F9pmXKE)C*xG0)4kV@bB*eZvtxO?vh>y}pK`DbMi485zb_46K3CdI9 z^|qzhMb0#O8pDLh)AE#ImHlO?uBCqZn6DLH5upPQMNv?h20)eQG{HB zyW!bT2LD@D9v}5i$HUVRoXsFQ?M>0?Xx5((=FtERA~Xp{^Fgl<$FtLEZ#13`2cuyK zPtdGCiDoBZG@FL?)Nt&KqTHdQyxyQZXWJOJw^$2h8Y-KsTooM1nqm^dMD(PX*uN+i z{wou8Q3N3P8Rzjo*t-d{dce7SQNk%L%UUMUJvV+vv4HKzEV@PN<`^4I3$D?CH$dz{ z=H#J4x2Je$Hs}uraCS0+)5&aldK!iB^mH7a_M#D*ji;0GygwXFrla1;e0n+_kNPtd zPNu#2d@u+@G(2fQmSQBPtTCIVmX~Cs$K-GaN0o6|9v-+*YG|3qT=SA}jh1bqUB-8s zcU!fT%BdU%iZXE0pfc}Q`e+b>QCJ=(%0p$Ki8fzn=jHlk}4y+ z6Kn)2biga$;thBhWJ)bZy$lG9JQVLV4hbkjkx3I`Wn%p*xi7_o9X+QxP7;*w7|NQ~ zPIZghqgpyf4Y*X4%Vd?uD)$aS^f-cOg;Rp4jnVI2lM$G*cdEVpzIT}14V(0;ENQS$ zhjPT@Y8gpPRrm;Q`wYjcHBYvR=O98PX2xHJBT{{N6O$OHKgWa#z?bogJG&*IA$Kwh z_}BarglG+xqB%%JdkZG!F%NHez*skfIgN#g*Th~LCu$(HPJ%1_RiM3Ehk>l~1@b{J zN7Dkng71NRvkv$=g&P(i?$%tT`EpiwkP`t*B_ooGJa>P{P zI8rtOQ%J8=k)_8{W*>4Vl|iL&0$j^UxJFJuuhXX}K@?SAFF|*~Q_i9c1Q6Bvxu>DB zf*jg*(Tl*-d9TW?rK&Ag2+j?z;`q67e*rT%i<6kf$XdbyjH2M|_rDzlQI0eA7hlvD zJ z&_swBYB`g^+3(_Ea2D{4l)+KJnJ+jC`oX8a9R&ozJX|7D%!@jB15aOFvsq!?AxDKy zsY0$qeoKJ{tl$>ph~Q*{KuQvf@79^}?Bi5~^=n=Yg6KMv+#99Dp@_=0`cy?3Pz-{L zWKAf_e~NQL0}#)-o8?t;i~#s9&6knU^tYHUe-(P$D)dXvl<0gmPN zFD}N4)J)RL;P>yARdrffoARxWJTZyW#j*4YbYLbfez2+T$cD#{gy)=@r*w(b&xf*) zE-%q9Fizcccfn0XX}aduca*F+1Lud}=D*Lto0|*p;~}^_zrOzM=^6O`!w1m4lIhiX zjNhkE--C;?0so+M^HYvj@*4o%u9^$}du4l94{x%>rzfCv!-G)d`_49t1kYg7ov)LG zEsjDhuh}k8O5+^yXlkaWGfQ4=pAuS3q!6kyjoz#YLYM-qnkeBUs$doedXjVwnXxp_ zj*P12>l=cM=Tg^{wVzN*^H}_PjA(ewS`yF!E0|@BtQVK8b&iO9l|ARO=JRt`ddu>1`xdW7mfk|@Pz-K8;^MYI zS@G7%xjIi0{7(5Qxl0$lXDc$Mo;Kdp+Y~R_wz2VsvRc*o z`c5m8F`#UWb{d*x!+q_{6^zsG6`Zb4YL`8dcE?ZgdldZ=M^S>_!5k5X8Bz#sth6YY zZVRJ(#om>#x>2;U35(IRVa=8jcttzptluqJ1S(hKvD=Pc{_sWYA?SQaayHe<(38F zP^?@V|H6`>(&b%Bkl`p5+vs}E)Sn&0UO^;cvbT=S;1{M8@VA9_CE6*eEsodXRFnfG zM{NDD{}2tk-R@x*yx@9Rjuysn%5ffbO+D7K;8)LuWTWmnciB^+>7wBr4O4(1*~;)Nu1>L~0p9UAi#Jy%h|=#UQ9Sv)V(gGKkH8q-6l|9%!BOGU=708!Ot)*0xR9El#o2i@Ok3kyK8v zI1^EIcs1^gqv2@SL(w$sN2B2!Mg5a#7WMnn>1;Yd;cPMwhto;FKb(c5el#3Ka4_tJ zquv0HPR8S11SuOp8fe8(?yv;R<}P_q0op~%$}q(m+n;c*Qd-DHd`@DygIHkNtK?Sa zDj-V(s5NOgLf5K}vd8HlBNu8Jzd=BW4rae|TopnQCNXzlI+uWfro{@7?{x(5X1FW( zb}WWjIE3TLY!LQO$8a(d1+{8jNSB z;pk*G>@}lGEeXR1yK6z{jX!UDYzMJ|$ z%lily35-`R`|#ZN}pNr{PNce)7sKxm4l!;&O=l& z4n)8ff2NM}c@{SgoumDYX$q+bf#-UPa^dAloAn^%rwEncM%nw{xO!uR4$5d*X$+XE zLf3Gj-yZ*kk@gnP-_j*|D_;ET?NQ;Sq8NPN`CguS5FPq#P0jh#?htr~?w<90fzpdD zM=;`na1O3i%RQd!ovMU^0tTbQlyxr_692>Egwxa0=W!8*48_FYc~J~QbtXrDtP!C_ zkF+&GclFIEdgL-vB`(pxO!QO0elh3XPsRwH+anNdQ@DylakG=eIF$ukRH%~iLQx0i z_Q;4;DPBgo!^I<~P=`eD3W?ey*3PQ3M`qs1Nx{5G=9N?5v$81Vk^J-L%Oj9&!XtoI z8QngO^CM|p9+if_lTB!d%(o^r0 z7^vzdwAzZcofXWgI=;5~mE$PKTtwU}vA3IoFD+a-({$t{H(?CHWgf23p#57ggx;SA zoQbXgz@U2Lss($A+4xoBW9|9CwmKygqWf4TwUtMHI%)hwFhZL~3{r?BF|(4AeF%A^ z>Js}Y^4&*?&}NToD76@>9{+#h4HPG(?gbYFp7kcT!JVs(Gc-)re130L7jOM^I2MZX z{#xsVlhA6F6i5i7ms+}X$C^A>UU#mn=(*L!QFXY)?^2QEnb(bTq7s{NW9Gju3u-^i z8Yt;27**2nMHYku-PgS?G=jf|<)M-D#aD@j%Umo4gWUU)5gKYMMN?)!aO)E$ysoqy ze!<+Tl_9;;>68ZQEDKClik-=750gl^oG3 zeH5+y*Ms(+b1tpWD#IdkgB&*(Zr2Q|iTaABk(2t>PNJxx>kq*D%GRzV_v>H0iqNll z;`6olmibpW@A*3Y7g_O=*spc!Kl`4_Jzg%!aCE-=ilNzR&#Q$hbxww(m%dwn42pSw zuku#=D}Wk^YkwAm+YiB5t~Ua4_nfhNE8pq&JFSe;kJMlL4CcrUMwx=dd@Mz!3JMa5kR~;H1~D-g&Q3RYXbT zG3KkOE|ONZ#53eoaxU3ZYbraPCVpfJ$sOO_SHN{YQu`#p&_C`E*Hm=P88zj%JV zb=DE2DaSMa(pAlU1iw_zGY91kI9+u-=CJje=dJMkC7-Y$L5-pj<9N~4r92wDw2fo$So9sTQN6h{8r$t%&sq>FL4qP1xwxj zl6r{+)zuICbT+uTxMbs3RM!;4$D8r=k13|o*Hs*KRpzE(VBZK`p$NuJn6rR%zuZ}X zt*~c_un~WjJ@pU5!*Xbe_MTbP9J71lQ5&qYD_?|5rEv8P(Y1WMgF_{h`{hpww8EVV zStH&gMh6^F9+WQ?(tGAgeWdPK!TjdA=^1|*FPQ?8d?fZ{$8ma5H3|2QR zpVeEpReMuMv zI8`hx0mmZM5%FAg5~RwMizxS5merg1#RgEk3yOpZ>h!fT%x?%PbchUR>qN*K*}k|M zDK|;J2MUZ`@FN0{UwPziNy-a$XnB6v&VbzKB&&O`lL+t&g**&l6O&lp zREOzyhNG=Ou4Yj??U#u<=W!zU(3zezCKajgYGJgzan0fGxNhyeZ7qrL-L@8-=)G#~?*gVcVd#Q)dqkDH6jTRz>lZ=PP>c7d?z*bmaW%iy~dKyY($Sug^7 zx zWqN;I{&8c~#}(!=lUo34Cr&%$U=>Hp6+?^^;CtjK*s*F9{DupM`0u?In^56KDB9Xk zs@GSfLjK~?I8N53q|8-E&SbdjVe$X-(p*LNq(?C=x2U1c?9#$hxyF&#vk=^5Wu`_OJu9_?T_x35HRpu+@$;9CbGR z<3~k~h{L~CI<#W;-~#!=HBGgRdlDg)W+R^nS&^gs#niyRCptDDu@yBM-sLf+DD6H# z-#h)9-g{H5y+|XrJt45f@0xe7TtCV(j9htBZ<+NY_xhh;lFVRucY|Nz1$mu5%X6IH zKJ38YL}~}syat83$}1u0EkCy$0*A;;ACyq#u`0zGPVi!ToiUT~qNv1BB~O)Y@V&85 z?FKb=e8|MODexV_;djd75b7jY1n=-$oHs>!7e}H+&oxjhLGPKKLHAb6F&n2*yosYV zOqfY>CuA2ADQgIYMWMf8c((fYCl(YiOB8Cws5p?W*2Yn#Oc7} z2#x6Wx`W=J-#hJ(lv{h)kKk#)KNwHpbOOVZ!SrO-L!-%H9t|Sc8=w=2U^pC|!uc?q z58!w(Jq<^*@bq*(?$1wlQzrb{|IW3s|4;b1>VGRg+r1S3-dX><*BecHcKz?+u=lP0 z_d|R-ozB5Bj?mcw03ASa$P3;dJSu&b%+%S$=-t7=Uy?Yz1IrxEp9Jnw{l{ + +### [papermerge-0.0.7](https://github.com/truecharts/apps/compare/papermerge-0.0.6...papermerge-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [papermerge-0.0.6](https://github.com/truecharts/apps/compare/papermerge-0.0.5...papermerge-0.0.6) (2021-12-19) diff --git a/stable/pidgin/0.0.5/CONFIG.md b/stable/papermerge/0.0.7/CONFIG.md similarity index 100% rename from stable/pidgin/0.0.5/CONFIG.md rename to stable/papermerge/0.0.7/CONFIG.md diff --git a/stable/papermerge/0.0.6/Chart.lock b/stable/papermerge/0.0.7/Chart.lock similarity index 84% rename from stable/papermerge/0.0.6/Chart.lock rename to stable/papermerge/0.0.7/Chart.lock index 1ddd6a217ff..e7b9c5d9ed6 100644 --- a/stable/papermerge/0.0.6/Chart.lock +++ b/stable/papermerge/0.0.7/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org version: 1.0.39 digest: sha256:d10952001cc4d167c5ee9351c9c3cebd09963fdf3b3c7155e74a54c40fa7ef6c -generated: "2021-12-19T18:42:40.264091825Z" +generated: "2021-12-19T23:29:16.233130178Z" diff --git a/stable/papermerge/0.0.6/Chart.yaml b/stable/papermerge/0.0.7/Chart.yaml similarity index 98% rename from stable/papermerge/0.0.6/Chart.yaml rename to stable/papermerge/0.0.7/Chart.yaml index 3fd2a0d01fd..5393c8b8af6 100644 --- a/stable/papermerge/0.0.6/Chart.yaml +++ b/stable/papermerge/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: papermerge -version: 0.0.6 +version: 0.0.7 appVersion: "2.0.1" description: Papermerge is an open source document management system (DMS) primarily designed for archiving and retrieving your digital documents. type: application diff --git a/stable/papermerge/0.0.6/README.md b/stable/papermerge/0.0.7/README.md similarity index 100% rename from stable/papermerge/0.0.6/README.md rename to stable/papermerge/0.0.7/README.md diff --git a/stable/papermerge/0.0.6/app-readme.md b/stable/papermerge/0.0.7/app-readme.md similarity index 100% rename from stable/papermerge/0.0.6/app-readme.md rename to stable/papermerge/0.0.7/app-readme.md diff --git a/stable/pidgin/0.0.5/charts/common-8.9.24.tgz b/stable/papermerge/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/pidgin/0.0.5/charts/common-8.9.24.tgz rename to stable/papermerge/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/papermerge/0.0.7/charts/redis-1.0.39.tgz b/stable/papermerge/0.0.7/charts/redis-1.0.39.tgz new file mode 100644 index 0000000000000000000000000000000000000000..16aae70b684e14d43e60730d45156cd656ee38c9 GIT binary patch literal 65304 zcma%?V{m3qu<+xJjg2?9ZQHhO+Z!jlNj5g0m``kPoIJ5@+kE$bZ{6?j`7kxr=Ty&3 zP4(&SU(XQ7!eWB`_k7WS(V0lAGMh;&aLW7eaG0`bGMlS$*yyV9a4KnPaw=%q+nP9< z`>3lp2}oPmJAj>cz4>MhEpoqqR#$F&bZq6gJ2M37b1#DbP)eP#mt1G^LCVvIjHA>{IXXS=6&)nk(DlFp~@ z%oi=r9)#rejQ|Ilg<{kkHqww8ed_5c4&{aUF@Pz`vn^-;ZpxJ9CmH`OL{>z{dMWs@ z3jrvDyB`MG<}t~bwInv72rSDzt%JaLtGiId+V7IlD->q=sZ=P11dkRn>2;o?TrN=; zhW}_6ZsQ<|E5rLTcn{*#uYk~}Z-bF5j#OwJE6mjZGOlA(#a1jJ3J@YAhQ1s)xS8`j ze;~?)4EvEgaERmy$I)izJG^B~Rigjh2b>Uj$WYbE@b5_65Rip@6QG)bg@PXUq%?%SkG)I3UA2*pPVXBp_*)RMeBFiQvZqaN!ZciSj=_{C z!&M$aSK8yV1ghE)V?X%t-w?I64V#EG&UE50THH&HE7!q~}fvxWSqP&;IGh zFcJ5oIRoUkZZix{k8g7!;bP2~4}C|58b% z!JM0wkRcC6^RNjfv%PfXgZ(igHYoN1LEDkoim+b*s31*b*9q*It9?&ZYX8g_gl#DX ztI__dppLmaGfMp%_^~x?rgR;3IaPf>lMWRPU?^iRXFlW>^2}BP0Y^6&z0A9A3+I9( z=6|CvAjf;Q;g?i@u<5qCr|V$dHN-Q;-6us! zNx^9GG%ds^L&0y>sjmqlVc`C3IrD>Z=AvSUlCuJK(SI9{bQ_rrbMnNWxRXRej%Cby zb#}mc6kYLP%taqXu@8Pi5jpO`Ht-b%M4PVl;9T9iIDj5n>D%sCi6=7KMK4G9{ zG{+~-tfNS7Yfxoz7i!5z@{y-n+;f*mIa1Oc?Jr_L%z3bf^3R9{sTv$*M!YqXTZYo0 zmR~5Xnnh0;fA^K4sCx*VPj^e(`=Jw0=#Cg+qemXfGNWjm9ERKgj&S*54N; zS!#&t67&va`_8=S5;MTeqKQtI81W~5z}ZSzXw}5Lqv+1OnF_{ImucXO{F*X+l}&UG zh@|s^bAS0u_atkb|K%;{b3kC5bSpzurzZ3*)o&zVw_XP%ux+2l4U}oiQ9r_^wC*p! z;#0g`Lgv~hat(UFd8$gZ^KBWw06eDWHCa>P+AU(h(a4|x$bm$orYJxzhpP){+o-ZwLugA{bfDRMqDd7Gv7Rt85=FcmF!N#}wT#wy-r-esALo z1<#r*4Y6W|u~;eMmY$?~+&RjFwEcM7LUH9_V!?wEH37-mgo35=c_g zCS?18a7FkQ(aw(eV&1=YUMoH(2?V{#JQQ3zUn4z%{85*Ai?c-tuRIg5(;55r5V4N5 zrgM_Zhx%Q3kf1G{N7`dqtV_e1OV|+TH;~&#_5x)DKl)d&y^j8_R};o1wG=2tJ8V!~ zK}>acl#VEsw#pDlZkiK4{7q*yo~kc5bJbCb_|^N%PtUM7@bEW%0g+`{oT{(rsWQ4s z(p$0i2GdsQeyPVVfnh|qU(Mso2BfPo0jm85OI-v-{CP9?d*@DZIw;E=R!r!d7;$n! zKB})Yzi2!Qf!k}B$6|^j--gMSaU;x-ku2#~20csRSaM<)*i2u2=+sPO0ubB^fB6k0 z72>@drDLhd#>|lt|4Hs>%*DXfs>nq%L9?0kKgM}n7303PL0vTw-%t;(Cz7YIhtK+b z1oc+#tp^;l3ic3X)p(fe&PH0zVo{hkV5%l3q@xVsS+nRtN1IakYp@yrjfRkh4K?uJ z4;v--fdp?3h2}ZF$3G7X$tIbaRA#j2F6c-VT8Mtpd=SlQ)kM_!=3_jpaHlX>DXUFw zTOM}{SWUX#z^N81rW>%kRl4FLZJJg)9xRT_8@sd_7W8xApP+yOf z{B5@_>~*5+0@_!D&_n$s`{=1!2mhzCHvIE7@!jBG))9tsgwPjq;^W!ybJ`z@v@3Aaj-_WvG9> zp!D?0&0fLry$rTB+o^Kx0>YY{*Vku4pm# z(Lo+G(XHI__v%5X^;veijUFBARf*+)jioZ~7VGcOwCj$)`XLh<&2IK?MmPIrDofXO zL=mkbv-c>HJd-osx%)|eql=k~QW-jH3B*kfnKt98f}HPWyxY72UAz|^l@Cog**Gos zL5fpMwBKlI-}ldV2P((Y;!!}H&6c`TZ{3wW?F)U2U*FC%u|m^`@ZXGA`-*a$h|@h2 zMkF1N^y==I|K@IgqDped3`hlct-N@`s2?G%$PDexm7?Fb2vtMn&9*@0ay+i}N7^oS zPChcihG6I`_#vNvzcAg?KLVn(-zy$ya~`=Ncr z=u@4%633OZ$)Nb#7sREU8A%`<^(gmzULCwd@cmU0hfH%YHn$3N9G*Y;wd^@Dk4V1c zEk3ZbjelusAF1z2{A0hL#e=|c-y4Rj4^1X@;7MPYkYI%?`Obx%v2(bF=Q+adB#Ob{ zGK5%p{8M_;-R0|PfW&K;*DL#obtH^@sucWanUN4V;@c7N6d6-~s8egekVtFghuc(R zs53Lc%Aej(g;8R}-&>F&A6Y%$3AJ;k-vON=WTT$qMGxI&bwjDjkS!d*My34I+;zY|zyJL5^XcAs99||= z8OHxGh7v-C2_hnt$svlQ0Ax5zJyCq5f8y;V=P(Dkc`6jU{o5unC5il}G7wc0>xv~`C_ER;RB3#aODJn(#hYMEVMs!^wg$uh?g&bgr# z@s(p?<|&dz49~CfiWw4h73F9ayvy*1z^jMiA;(fKuCsp94#j<}%oSBo%<@d&da9#d zhx-AV%nBQ`-DCQ7>$s!mDlS{8dz-U%Q}tYpaIqfxctndW$K4hee9?3keC^81<>b|B zO$Xs5DPti{l?i4Eg2qP+tj9CAV<;wL*R^W_$iXx$|yggs?IY-KGw@RVw3^+s%3ZjdLH zf&ghvyj@=Cj~>iD0FDb1E{SX;#O2)gFN$}t#3 zT0Cas8FNRr$54XZ&dG?7C>m zxUkd4pC_^9?HZC7HJBvV=1fu^mA5rU_FO`*z=yS)AYWdP|7pPnH#I>%5^LOcUsePh zng}tNB+%w`%U_HdQm|IzK&n#FGuCQ?PF=t*!^DfS71$jARv^Q8d@Tz#CDMx2*5A_nT6Lro#a z#%T>UL{Xb8yE2%dRFY0{M1TJZHLxI{ALoXRos@KI*RHX73E?W3NgpD4y1%tfX@~x& z@tl@)3?1U9Y+@Q4m5N;pA(idJnhVE73*8k%!zSrb^>Su~WA=Kzi)+B1ZS!XPWoHW4 z=Dg`%vV~n$L^~dET7xz@{AYc3`)N(u>PbVPdM#*iB&lW>K(7$f54GqGOXu+f<%iVA z(GR$L)QmQ^;ptl_nsLT(=fyMaqHA-UtE_ZT*+eX}U&n|kDu+AwGhv6fe$Gmg9_0qi zZHv(RqIyo2|4rxY%1P3}Oykb5Q-7}^Ev?#SB3|l8dbfE?Y>r48bY$ICF;y+z#02h4 z{cRkTHoD%SEYtB)ayB-bE5oqiK(987pBUXXji>iTnT6TwjWtN}fkH!@ty0Yv71WoSpSUu~q$~O-3FgCOE49@RU zS8x|xEu-ONozTZdO}FqN{wRDM0OR0Q!AXIouS+VFWM30z0%DZ7OBwF)3-h|^ zHlu2`psKqeP5-eAMqdKE(>F6z$iXl~tcZ|qtqU01WIPkJ&$Ll-1cAI6tVg|t`@IF9 zZrYhXO>*eZ^E!Q98*>Kokfws@lymvM;8FxXk3RUf%+tCWtYy|^@Oan^;?9fYWQdxE zVu#oT=GaF>G1?maUD74UWmC@^?{lvr;X+$sOwjn zc*|q@2-?t)^v}7y_|~0(3N>@zUDv6b725gA;w0(i>+sE_yeGl5waa=)uGzuips8;Z zbs<685}PAk{HNyFu9PUmyxg*oU)nC1R)3i1kihx&B@Gv;GPE)V7$f&avbLi#v&|yW zj&vIS?JQoswrDfHRPh+2yVEGf%5V`zHwb3E7Y+u;d}0oSdO5sNCr5>DE7~ zs-c(7tp8^*5}u{V_la3Ba}iH5zx|TV-gHGLTUT!S+V?O&XZl;rrwCW5j_flEJG^hp zzpa}`W*;UteEU4ojeDbU4>S2a`MLO_we*GmdEPAp`JKdtjP2|aPG+9HIEMCRl%n8W zxU`Ke<5eopt5$U@X~IH#s)U`4@JaYOLe-=2t;E!z3 zA%KdgTP9p^bgz05H8$7fttH}|Uen#aTTAmEvxbeWnYl*Yse-TBUQ|h;Rd>nGHesyf zIro;^omSnmpOORvdN} zddAClao|X)-t7|m+oJlU_B_*b;w#Iu`bahN1RJw+9`~Ap@+U-)jC%UmFQj#dYt!vd zTv8U1M%K?Sh$&Uy2pduGOAH*zf6&x_H_*j_s&9jtt?w33yFHZmyi$#lUdm8Ce$0YLzZEQDD*%kThkeWY*fAK3vk^_1BAF)NHY`b&v_=d{gcL_euIz7+M0Q z`*-Z!v=nLUoMn;%HYxteWoG(eQ+#YT4#e7%^}5o{Z5z_?$L|~Sx-?uxYM+ro8sFGo zv~s}<#n(aGTUZ)eN4wf!@<=D>=6G{u`skV(DkΞ8le``S7q~Qv3kw&YCd>&-hcf zAIalbZeJ4vP!fLiU}|1I&P0O!MXcMFN$`^ubmxASYeYJOH%i%7%qV@OI?gVabF*dp za%jk|(rvi2nL2ikZK(O6kp-spV-JLZ${@1(5 z@3(n5HtE+n8(-&`5Mfv6vhB|w$g#4G9cqJ3cf-UzfXtDY?ZdNh4yCn*ggGm2xnnkr zN@GqcozJ9pT&n8yT)80GV*o%BI+Sh*&gm<_lol*`YJo}{T`tM&U}SPKi3 zvE_ppQVlL7tgvxCOW*g~J(m8n(4(Q1j9ysvE+US`U(mDCl-DuRC zlQW8!llk3b6!25c<;r_!tIXs^RV(WJtLehv;zZwDe%|LEvShJdIp;2DQTkV+r{Q`x zZBE7^C|HD(R=mn4{H!oU(oQk3x88+i!o9)@_K;QNLD7jQ^BN6AQ#$?1f!SD*gP<6A^@1;zpvt<`W9ZH#w5wjB{S+omIq6crf*O zFT0^)+Exq<*0BcNn^mZ}mLewl5lH@%A9nwFHz8=FtvE-i@<{soNquBx(1knZ zr*kTNnY7Lj5I(xp6;BneN$pv6?4?J{3Z34;&=grAT0W1pyy@OTq*#GZHafFdbu6zj z1x~GanIT{lpo^^j9dnqi?rwNpdZJSlq3BOHBZ_ztkzRbd10|_pc%~ zH<2YDX*sc@6}ZZ#2Fk6Yul9LqEMFdDzxsnZut)Vo_r_<{h9cfnqVI*^g((mRMKd|i#8Bje^z=>x47$RN%0{g4EC#1kxf=s$il=cYFCTJt zG$o?>TGhN?fos+=Q-1=nrufHn523s|jU%wZj@qp|&&tEe0x89dqPZ#NRv^Z5j)kdf zysM7T>U3P8r4`ZE2V9}ce^f4Q(=}I)?r@v{t`bjIM2hB&t0m8|fgFof*4fvo|Da}t zvBZqCkZjAsMzTNDjJJRPa>w1xl55MuWbu$W-WG(0z01B%1G|_3EAW0i_v6)!Iem%7 z(N;ZYHe{t9V4;iZb-cM8ay0d<&o;wH7AL{X?e6sXeL`gdR{G57N2_^Rs`S>~hlO~l z42NRrO4S)PBSZQM=}N{S3Qcu5&nYWkllT%H9!0EBM%k!4k5X)yhpzeKhsd+DK{zEa zfi5{CZQ1iq_f%tOP*lL;8|me(rc3VlMw~-pE|GlB#0gr}56^)s9#D++=|E5M(18kD zPT6#FrcL5P;8Zq|;kDGoZiS84P5CKgNsHEG_TSRn6-EbDiMvxlrd3k8n5oqy_JX+M z`wU_OKKWX!nfPuTOFhztX_E7#BTE%i?2@tFh6<}$tBeFjj4Xx@)ywBoE6bR9*wWnw z)x-l3{DARIIVV;>{G0KO&76-0=iqL`U`1J3cSep1cmd>9w39|#BjtBU zsfXdYmxJkEH&gTVZ9dDif530yShw{DdEfS!kWwYVVIv<)$~YnbS90B59bA{kM1Xh^ z^WL>(pgI!?ot&r$KUbqdX1YE-jwItz#-wTFdSw;#mfO+epcnNK^g1wda(G#0S+6c9 zrB#<702=i4;voc^u44ae9jB?MAFGCOY3`dg{m%3qwMCb@6jZotVU^ZT^!_xENSzCJ zyuXwSnlNu}NU}E8@7h)MZ{{Mk02)-|saZxgY9(aoEBsEE*Q(TtA7`ys#jZ*AS*WjG z&IjU1;+}+W+RT^Tk7hkiAdqz{fA)2A$w;MUqHrDR=+BpxQttGpnepkfV^w+%j#(Dq ze|!sH$v>5*RY3os`(7x6FPgY9o*beRYE@bd9D)I^)_!fO4JHkBpXhE1~>?Pxkr zxce#Z$H+Jg<=vVKu5PGHN7$yene>uHOI-^P`h#k3l#fb4R=(}$2vQJxvf|P&V)1O7 zs|<((SY<)P)VB4y5kMxLeQn0MrOD*XResPmFAg3xV)mI@kyraA^v_3a;M#sgu#1hs zPiblwv`ExF1z1v(a zlm@{G3HU$9JADb35sk{XgSuBPsq;;=X&&5;qyjtLRA{nz`EE(wItta$a)YMKp9hf# z#5-Qseb?7*O5i<=WqmZw^?q)koa3(*6v1oF%_Fcf^egZ;4CLB&eOZ@-%Fch*@?L7l z-RcDT^U{DO!2}U5mR&m6Y^aDLpi0xu?8>*~z*=dbxFBEn1Bg5PcIZF~ul1>irUli? zI!zBiZ>Y|{r+GXt@b-Yl)%LUJDlW!>b4(ctC5o+7r!aDgION;CBp2yWsLHIZ^kKHi z9$dS0uCh`>Iy&6|{AH8ZcFDTBxr+2c-TANg~A}+|3_(nGZ(cF`R1Sir<<1 zZ6fJaoZ5UeXnkC2yNMF@((}gUKy{ZqEzdQg0`z9%a#-q3!6hno{fQ8frR_c^#V2h$ zT1ka|l}f&!Tub-O7~r-iFGdon$>GmR(wfDe@Bh3qKL}-rK3}&Uo-Dr3nI_c9a%^Z6 z>0jx|m+$-g_VOhM7joHybtz@oL?mHgvv)Vir+VQ z*a_6|E}V71igd`M_!-xD`WU?=2bQDzZGtrk#Mj|E#1jd9&~D8H>GKZ;-BxfthlF8p z@o~*(zTFe5Pv)2wrj)Q>B%cXVKb=UPOgA;!e`&1O=Z3S>?h zAxCfX=EZSJo6dQy#PWD1Yj8pDB)_OI2-ZKmpJ)EzR|4c9)LSiioGc$Y*7CF;W%tU{gr zr}OJ)=d1UGpr)r=W~7e4hNazmHVMH87Hqp1v&*qvdwcg{`^8L$PViWI9P+E#*k2+e zel;dkpTS4i#~$|635f+4a4^Uh_d~X;>j|LpA2eA0f8YfRezq7S1?~g)VEKd`2@X&o zK3Q->pbKw)^9=U<#IQ|~o=#>?saJZMUh7lyboYo^^GyV$`vu|oFXX$l{Wl3Zf3SyY=mz#znb7GK&>L89o2p==!fm%g*R6Gu)8cL z>5bm-yGOl?w(tqkS8Rit{?%xJ{d&W}_-MzWkfjN7>IT-6dk(p_q0ToNDPzdCVS_qq z<=1;|xtdDYs7L)T?ffnPcsQ&NTJAG@dN>s0>>hNLVJ5Z1JW*SQ%^!*BoBGu&rLcKh zlaw`;wdr9zJxDm2QAC-c<;=uEDu6o&b85kPdmUg1LGBc1F|Dbt*=g;*^7Kqw!}swl z8+}*7f9i=KYngqbC?~^U;;Bn~4-eW~HDHiZ2XiRrUu9U+VOt{E###+tFfyPooXvMR zb8UzqXBsw(yPx0FfJydclz!}c-XCT*0B|p!MM$l{du=ZOq|a-^r6IMXQ^l40_tnS` z+i4x~xb#|!CmfCXRVicJt8;BW(#L(;;#KelqTaccwQ=|fm!9r2Bq5X_(t=1R4~VS*UpFFWKIjd}unZ|^7fioBc@<7zeqdwBhB z&Ob7!4Z8XLA75|Q?k>DWW#Mf*$T>~9VpgiM$4r-E?M20QZr`z(#59f&@GKi{J$w&s zBZ`825T%Ubca8-HPH+`L&fUrpMIlUaJJ!Yw|2nxl_lTud+(xtmAx1<4A!jTE%WT>I z36JC~xR1xpxUB^uLVY9V{uBC_BTB6^4xB7`_Y8gA+jTw^CUx`EFjZ3>6dR5`5p36v zgLk{rF#R{4Vf@a>|Ba^}QRM$mq!YhG{ePl=Q#hp5@C56LJCJ_z#j_A7lD+s{k$Z4Y ze-vxMCW((_!8fpmaR(mmcv5 zfZC*T=kmO+d=x=$zPWC-{G~#-n|Il{NB8_kfW0wSA`bdL1$qAzfN%Yu0#Mm~|8It&r~fUbS^O$062{?j z29>F(^><`Q+c+0>%d7ne%CAXVCh`SqaE%V_-`<$Wb8srNd%wIfmA4Q`OGa^Tj{lI7 zlzW@jF_<&J2|oBoBExwKEKx3-D7*-jSMA9u$Yzoy51DeuQBM6TX;N80$5lp@7#GJu|hksvTpXUf4ix%!PfrhkL&ChltYAHT{myhf#ErC(3cF=$SqRG({3k+5R|-*wh+tMVYSmDV_1Y~qLNocGY6 za$`9;r2f@uoH#ccWqDEsO+B7i0~hbYeVCM~=psJEANFozytRx>sPf57zHG9hgV5lQ z5M}qRI3+yo$y5rG5hdU0_LJ#6B29?qdo$dj<+5nOZWTU{c!L{DNC@ zSpH>YuNAsyA)3_w%fsf`aUSf*)SS2psM_t}6j=B%q$jK@90LhIAYha&M%g`d!l1~; zArfKfC1%X!-66{=Vm@EET($sQ1JM_|5Vt+ik#{kh9}As{S}0QUzxm^5SY1Ww$qiu5 z4Xcc&9xSx9_GV$<0yE{tJAqx?>#5kHW$B}F zhkm2LcAvp5!QX;{OZ>z*FE$OAI=$!i7c^-sfPJ3IeCv!m3a1}6 zFI=bTcT!F;XHQwFgx7quYYyhmYj0VWNzsX*7*3!SLPQdVm<`hjcL3)S4_;0Ia}m>( z=AAM~Nx*E!aew$ZbpyfMSrQ^gC>fdOe6PpUs`!PjZV*J|gUA-lHp_6) z#wmWi^_T-)+eqmIZT9pJGn^C{m<%J`$%e}Oqc{OKM?Wfwf$nmlW@JoqI`bEEIk?EL z#Xr$98v_X?JmTXEQzuE4vW}J+N7Nlxk}TJ{rb83rkL&7oG8?$jV3-uJ2on}IK*kag zg;LIN?E&_L;Pp-RbcpKhbm%LwSE?)Vo%yS=dqeQ!6;@&EkhmJ|%QcBEFW>qnQQyj# zND$MbBGXhY<9ty=WoTNOQ_W_#@7=xe8{=sT=DJr}b{CJ}y4I!vVYfJFQ(rK!vh3)a zk`ic3=B<{v@_66*&7eNr3w6sQwFMeMi zP;N+&GYNXwlM<>-E*gD80QQ(VpJeSf>+Z||M2`(}V+4I3@ni{V7yXrm57W4x&S%re zt>m`p_~|K6AlWrmM?~yFkEDXc+|dVdmZ}<_-wnEFH9Rc5s@&5SVx3`h`Ai_Yfn6EZ z0R>kXmCY+22`R2O##g{>{&}9eoA5kbiaLVG1{g0Ihq3katb6PjI%Rzc>Lfen03apz zV`_P|!d+Q|+@dLsoMBO?L6_jG1og~XlQr9Dhas5vH6~ zJ2hAqEetP(d9l321WOvVq5@F4pBIGjG*_LqLp=ng#2@K-$K(|MQ-L~5w}iT1LZgE& z?rpIuH{0N{M zGd%n0_VSmAx69k@=JZxJu(S~2=Hao!oC4a8nhLgg?mqEWAti~HVQ*+cweS0;vLXYG5BC)gFAh&iZ{?65*w zT=SZnKr%!*QuP!>V^M@NJSa*ER_3}WIA|!f7%Yvysj>+%9$2E%!J<(Gj>eq!1*f2C zI6F{8wfg3n#^ghV=TYIRUzKHoQPGl^)UK5Z-QbXI_`g+5YvO}!fE@ENFP`k-&#DVC zxgPgbMJ#9OJ^da+Rc4>{vlWS1>q`=L`s-HP)i2-CEs8^Y24kxGh7b9gXa>{9hJEkK zxZ?k}aq_P9^-%8;tbKaPa|2SAWY~#F9axt0I58uG zwH7m(!{nJl*O%{8*TY8nNZ?JMGCw5vm+CQwIAlKeK6+z2ow+}0^0_?!o$@9FP#0Ew zq2xY)Wf^<3_w{+4zgkeLyiN~SUds|qch##88GzlN8E6T|!|%&2~$fV=Q-FqD0Q zre>lHtk%;E3loEXF4k+!r4BW&YYjz`-}JEFL2$M}{eG1r@&r%#N5;+t1gty>Z&r73 zWM=*BcFng61JLJji6ezvCOuP>GkaK6WJZf6gGerlB2CQHI(JGm4Ro&!Tt}NUzJ)Ar z$P#*zwhbBAqZHy=H~_n{;#oU3>NVs-QVc&SI7QJi6fB?pep2*DoJFywHW8bs|5|Au z)LLBcW{S?NQz95x0^oGuI45Bq9eX{ott2eYVOE*D#6@_cZ2gh4nD6W*5iy0+H&C~` zyM3AvTNzM{z^nW4)Xs6W4D(2~*+VocHvMhwG}PgtulZBGubE(tIoob6tjl3@?eMp~ z+c2ke|J*6%FKVUYzR#7JzcZhkE;Y!u{7`lmD^2TYW{vJ!%4XYyPo3ZGD+OwC2l4z2 z+pB^X{S4Le{d&qCpKos`59V65q=sv^47+&v+tiI@j;+5|PVTh)BGXEroK+mKpb5#M z%lVbFB+=!@YC1Mk?lrU41G|(+&Sb84gQxYftFv_ZaLY3dqwZ(m?b%X-#Egeudq|pg zTD5NYbke5N`mfM+7q`9OytM+;dYkvW)S{T;w>b3q@KpI~+G+M*F^nMV#;cTiGc^V4 z$#$r|W~g=G2mTO#Fa;)8sC@ASlAFy9!Z%`?msOO>(9R=9gQ;OiKxe5pB#_`1%G=7U zL)|vvo35rdEethQ<-3F?#)Rp;tzu6#WIS;}Aq%0ON;MxvJcQMNoev^`qiFb$qG(O;`@up)%eGNLH02E}kEgqN%=Ck*)Mkrt_W^t$73WCMkR6s@Eoa zY}4jo4PpVR%vl`f2OxUWhLckBxRW^S!NvbD;!-Lz$f(hf#+d6s83XV$%Q7RXz=S1c zl*Na6v~xC9V0iJrA3Dof#eVg6=RtY@?t;hNlxmkD)1sm$)y)8 z!o=l52B)KbQs7#*myIOI;-4ooBu>xBfcZdW^1>z7pUE=e_A4IBg1chOBFN?daP&#L za8j=S5N@c3hTtsR+>p(Y#~_wDMp4cbhyqDOQj|ATJu1oy%kYF@D%IbcfM3wiEc+5@ z4B0EXYN#zS#*iIho4MeOTa4s;y;;jQGJ(YR$(=It?sh)J z-HP!;^uW#W%=Dz+pkRs&SJ;IG`!t}Vz)iM2&)0OD5VXd!ta)@{iE2corc*N=Gop@# zg@Gik&c*&qK_=N^VA|XOT)R(s-aG~gOD~l|jyJWuh6cV4J^WFNulG#9az%23utOxV z5nw1CC5c6=+io2VWg`wPEFMt?0Zk*#$q|(gkWB>0rc3i~3=&o{sBbi3u;&}AL<&b@ zT8}W(M9`{Y%1A=d)r%rQXoQbVGm9IDS5V`T!hClyWwbB4tl7vvQ?Gab3l)JFqR5aR zja^SoQbLW6OUwFWT3G>$8gHo3M3%M*c9ClqNw2J<5&=RlksJa}WI&nTKuZE37lRC} zfE;C(2Y?x!G@ z#)X<_A<@7*O`+0PC=17+{odoZ$txInp)%bh$6VMRrVtD9i$1u3hJ^M+x)=`)jUxTH zf~KOR07Gmhm{CuiOTo-n%6sE;S@D68Z$P||UWbi z)xt)b!#vtL@h7V4$l>AeBlYoV>6_fX5^){%8K6 zEhGLm{)F1xg3`3zj-(d9JCNYknz5vZ$GL4Kw-H%^<;5-x? z9?&qGDq6;M)$ZZAgJ~@o)6;+iFuu})MlQ*c1iL%ZvT^0Fhk4q;52m|onOIqC1@got1xnYIFdjMII>|jZ{yt#l8jZD2Z>Ws-+eXGeD3>ocgX~x zg41zW`%L6J8^SfY^=o5Esxw1HDRIDXLlLH`l(fF)k?4-aH#W`O26gr_YX(qkDYKo1 zUM6RbsRkfFhqAI?EO^?Vx8lLdE|mYa0!$oS82sl6YRk`xEcKR_mH~qPTWJDT`v?d4 zc2cr7_hT!WHYAD95#H7_B5#;Y8x;Of2jDluu;*KHqpRBP7Bzqaz+Gx*(+(%+d-D)k z{%MvL(`g$C6s@{2WOD|#K008;co_eVTF=~E3rY-)g1XQ2x^PIik_-ha01HB|Ly~`2 z%JFyj*@sb<6|U|4Hny#`Gx6)yP$+ni6|#04@Y{P`7q9E=SMIYJ$d75F!(xY#6)t8 zBARu{^cfo+U^E}HLAIAu?S%_4ey9$!LcyyjvBX8wwP>EDq< z?c2-xzjI%hzGRi)9(qV}uO_3}(C`VE`IVEF-iE%_6`VcS?Z$>yI~=id&D?bD^qnz3 zs`5mR{w(R@$Q9-_rEe2@#8Hq|7~y0Y;J8+Lka!v3@QUL%XRrC)v$D1u#h7dpGW}&< z_7o{AMYUV+#^ES-K!1do?#kQrztt7o)XL54IzEz)ZVO&dCr5#{~pyn+KI-2F)Q8*~x4JoN{ z#kgdk{9(-p1p@sYHqGq2PxE74P!}7r@{vcG(?HkU^FF;QZ)-2^ve7(UBv@^*LPuQ( z0j*5gaUeNG$mLVT<%i?nmy?bboNrWA@x^mXN=%y`T*Sct9!}fg0L`;=+LP>*`!TAWe4*9JbhsFt(|$PaQg9#6km)f_ zY3h#b?(fD1M}qs3oV$)~aa!GN)56B)CNkG7jveXgcaCr6F^$l*if8BjaJU--gUr`) zE~ek@JKp=$qCAir{WXB|3wuwsjLA4SOixc++1);V-naMfDa=-%GH+-$4I|5KAUz>h>IFu*x#bA8}qAO+L@M|wQKeFa>)Hle45Jh7=!OV znow|nXd69Z-pb>+f!98cwBIf=Oa|qb72|)XJ8PS9at8yvWBR zo|dek0^gEH9)ec_+^jUXsynF;Xwxf6@X+kUbt*L8?h=eV`YEL#(9s6|N09l zU?@W9uSkTT!GP9b=$RYGJH;d5RUheTfg+$LLQqRAuX0Bzv9f>>TQRS!KxuxO%Jvw8 zW8JARg4-Fu8xiJiL&BTJs}3O9E)Ghc5B?!(2Q1-sjv&F3j}H@VTWx!2t=JzTHDXD& zbMAraOigFG^Y?QcQ+1sImr(inmwV%1a%@qJm9vUzinK@z?sGuc<(rS?52!0o_#EX^ z(Qbc%h0eF)BAzkLpZUjJvbrvEa?iUGHY;{_?qa*%&xRO42Ef*J^FV?D57Pq~U=>f3kL9Tug`kK^JP5}~YtQ)|8v zudRU}tKo5Hs$rm1wdj<+I4-AwmKCL;p@VLOJj{suwrrke_m9oOE2oi1{i|W*7X?QY zT(o7Q#S>wBE4t-#?7zHQbA}%u_%MO|d^X4LY9(^HAdFlFU4ZYt3)S3fP1>J!3!3Z! zpK;qI>M5Ex%^Kh$BD92$_K@1OBlFh6nSw!B<{G0&r?Q!wFBSeUhH?}C-AMjp`^{zB z{HsnH{%08mZ8`SOc5ru6+urH?;uGu?3VHK?*wcnOLdL4m0YXo&3ArK$Q1zG!_{(dj z6}z{EX-aq@8{q&_!V2bf)WE=ssi(&MM?j-#ilZP5zDdtB(1WLt!gA1>RH-Qp&?fv) z*O1YQW%(w>Lg~HB)3}!U@JPKJ)?aQhMyjvg(y`m>ba6Vma`1`o?(=ZEanSchMa%0Q z@V@_$;r{yWY_t+oXy{#Z*<*Pf%t zlB=*b7LAst365~oDWn)Doo1#qhy1hCqWoZW9L5b0d2VYjXugdjG|@&cs4xe^(A8f0 z!A$cfBt$}<`bWBIRT*uw`cL($N>ot@OwnHo`*6#m3wZ??i@8X8<(*5_nP-|vWIs>9 zJnr--fAnZxMRq&4y#=brzGQP$%6h6WG%iTG>)InN6iQs?SYEtLR7ijXeII9H0w#>2 zdWauch{NnOMinmauxkapAe<)06R7EsCdf7Ikqnzz>vfR+ftPV#wsNkd|7}3twSgY$ zJ%Y7Vub)l-ffqaNqRZ$Ch~EAW!hc0BBE%iu7(nI_0ri*VvClb(K*@s$~pG$=b%CZ{U$$2bM02(jxx!= zZUVO@47mxuFsJeP8U>!vR54W+Ry?ku28!U2Ys~&10DwS$zrQd#+p1#e($8xQJuAA! z0c9192;nt>jIleSVa2*{2-IZ=bsoyv^f2$HhOk41Cl)Rz6Qr`TUbd(TT$O{eE^2jy zWG>MiI_ArgbJW`UxwqzU)w9XMqN=^mr9-Lcw`&g5HIh&=!`np?nnJ7*NeF66+d$$4 zprwmBxbq_f>SVYmD`0*>!=W~mcsX;~tR>0YIz$*f-Tf&HymlB88)@Xm{)l0_kVQ}s zz!e{xBPxcyulU#)k)$Z~h$N-{rd_#guunBZwIDDkQe}fs(~vC!WNJ#9sA5ewEK>n8 zQD9wd%`w!HME$^aqoIvSz)&*#M=yrvtSiycXT=7;mCtGhvCbhj33Rw3kOOVPE>-g5 z{fmd`y5hKRyY%sk7Z)c-PoKO&=TBdW2Pf$A*|V$n>dWWn?_NoJdyltom#(DX-meI# zCwr&+mrqZhh*!sZ>g&Ddm#@!{kt`obM;BKY$M78`TV5( zmur?U6Y7aZA}Xlj%H4*0MIa5KAJ`2<@d(q{tRR40-YO{~?4l8;T?Fe85?OxKMNP>14>hC+l3ulZzsRC{Ea zgLkz$k{)Sibxa}FusS5E^>$kUXkFC>>V=z$i`Gw99BXS-K$xyv&{d;a#8FGu#CB>PK{9&_Dn{2I{=>whopiqy^OX7%pXqgn-@%vI4PA zkc@PVR+6z4Vgp_%h}PAa7I7?_{capNp;*nfAuo#BJlhtB%21siL{!%>e{nz}o0#5c zcO^EAgQw?4aXY|CtjLLws^!P0{Z$2cG8bBmHE<0746t1ht^ln|p!)7?d zVMGHvyiVnNY|Q57-uXqE?6=I6x?65jiA~Fk!W*7F7Ylc!(8bsM#2+n z5vekeRb2;A*3x5>w~uC9U+qD=5uvF_)MOC>B!QMhRDpIPLKGDl0$qVfmbG?7RDyOR zLPZ(?l8h9nx9o{Z&`v~1NR~83Q2;`+*p7%w(9T5YvZ?~4K-8Xy1<+a|?vhm(l+Eo? z;Ke>O?`AffCPZV(r_O@JluPVxc3yl&)Y_=(i1fl6Gxaa2l7{qYjdSnoz=N?n45&HA zQE{*F>>1l@WDF0??ZY>Q=vJl3LrIp~R9S$it1{_v*T%(T^)?L!Nmlil@wTi`Tg0lK z2h>|ps4Zd*$;wK^Nukz=6&@$jl>{M>Ei;_&(SZACu^VXMKpq^aFD}n{jze zHiB&#skSj;z07vt6a6%)AQXPZH(2=9ycV(@@e)A|VU|`q@o8XV=f?IN8kHJ^#LSnB zU9)1Ac7k3?ip#o?4v8Z?W=i+@`SCEoLAlDhQp-?Z8$&{al)#(V2?g5}G(}P*v4p$6 z*fQi3?3#gngDbg%O~Z7<{pG<`rj_pkxjee2YF<~Xb1QP*584B~K zW>=M8r#c0+t4;wOtBYOxW2@%P0M@Foc>`wv-737bUDLY_TQ#x-vu?G`n_7ZtR&6HQ z6M=qX(^~-oAk|e@S$1hPvr|TyTu+##5P7~$W{&0Qi6bcUP*;(z!bPsP9;yuy89NL! z5*1Y!m9>bhK(zrP6DgEm;((BsBvBH(cV<1dWuz7y75Rjjb67wgikh@YRx8N$NMKT zzLK9HK(el@4JyftcB@2zKx|k^QnX_wDv+91qJru`Y#C(XOmQ5#>>M>jipawf{@PMY zQHMO!!A9PVKyb*ILZ-)F?6J)$u(!BY8bj5d?Mn{{70;r^?v(pbHwx~AN$f%drO9(^E%d(=0;>?`w4!@yWV(A&o zu9w78==wWi9tr216x8M8!ghJ=n>Z@$pBu5`(8zYf)RdltOq3LF+iwbGEzx5HWJMa@ z-rl0&I1RFs4vrAo5f#RMNCZDN9GfIMp6QVTJMql<*EslICDUr7@IX-!3+h(~*kwvnVV9(!VU%`EfCK@L zq|z=+d(gEk9U$`nq7H^m0kFLx0wL1$28IYLw+ww0#9?HAWL=ff$IcW3AeYUMWd&=O z5B-=rPlg{YFCcVi8x!JqvB~J0Qx65G%Ef!&?O|73ap|*#ZIMRF>n92*6(;PW zgmC0WbVP%{A#id-1IzJlD{p~r4133AYbA?A#fG9tx=d8fFeHe80aRHsO1Wiu$d6Rp5RI8sZY5>Wt!x(rNJLR6%t1u&qNW{R3Vm+y5m zC_4~6p}~lL2clL7oQOj0RaNk|>;_bnUcW<6tDX-A8XIJNkiu&Zq!Ate2_~h^yy?=ENx!zY& zaNk{W^6IJh^!eG@^Al0tKRJDR_5AJI^Y_P>(sTKpg!V4B-z6(4xbH4GJ3o>xj?nXq z*Kb~n?+!2D%5O#G>BZI47bnu|7w_eJ2=}*&g8S~0OXdCBV{~@#>h;;)v;CJZ-khGi zeE#IcyXT@Ly_KHbLj=T?6x4Rfs%S<^!I)iLwzCULf{NBE@)0ZFIQkANy(Ich`hAH4 zdo8mlES}hVvwCk<@6GDHS-m%Fxi@Pm!|Xj-y(jA{^<**kY_A3MT0pM_^jbi#1+3Bn zYPn^v0`w}tSF8eLlB04nMZK`f?s2Z4cs?m$FcKU2RycL~R=DrX^6P6Z+{~Y;i)r0MPk_{=)2Q3DkY*sXUaRJTFu> zz4r3#RtYhT71>cJ*se)GvLUl<*R;(?nmTunuo=i&jaOA^G4J_i8^2CgG+EqShP4dW z1`pTGP_KUma30r+OZPSNLO61XH?iH(Pi%6?dc*m&09U(|ugP#iuthUI;03-H;E1NE ze)92%J|dnQQ8!{i0d4cq`C|w~rEq+%Gm6eL9RVK7D%|!m?-E}$A9iugnO=cwQ!~AY zT3+)QX$7v@sfG!mVOXhxJZ2I=-xU>AnoX>R0Luh&SY9Lx>9~ksd zOZlGyeU)pNc$10e_G)skCiiOceXGe!*4|%0PhQ^oUQzB9UdrkR^ zU&OylJgmDasmhXAk>*wWY&RuAp5lH3R}klLZStmMj#^zmtN%Q%rc!N`TpvVTH7*Rvi6j?Jw4N*yxbp=pV z9FObRjJut$*h=LcJ3<1AW?&5hMNxHRAwx0|&5YMMz6S(Fr&V97ufVG~-GqL`YlY^Ec& zQh9Ah%=y0y$tTmmvU%uiH1AJs3D}f?3N*~sj^+aswu4(@Bu>28jVi4~1bI z6o-%p!_EfcoZfql1M2*auZ1|W9iBO=^I#*8=ui?(K%k|oIuT85K|mo9RYNu))uBQV z!jM$z(;L9sM7OW1CNn#rsLPE>E5NM2WAD-k`)T0QX^I**!af@|paT{)90?US?i)fb znK3SjgOG+w-JH>7QJtGJ$`Jko0jNO$MIL1i2DFBQf!u_*)JPg*geGGmMrbB)$jBD_ z>rohxG-Ha8Q7ia3BIEr3eD?N3WV@F4fnY!KlD~%Jr-0r(fESblJkM4Z>D54)D z;Uk~c%ujG|9nX@Seo$Bk=qbg zmvbQb(rJDWqy*9RBnSe$tSWN5lORQ)6>O}KwlDpYccTBx-rN7TZ6gWe`?LQFJWBT4 zxEo3&MZNjC+@0g3P1?lq+D_8;?miAgLK4pu$r7X-ZMNUP{rTXP;HyYUcGIr-*={Tn z7z}{HU}i9w!I?E>^d$Q+iXJK3!g%PYT-LjHKcBw+;lrCZXK#LbasBFJ|HI(@Pv`I7 z{PO(ykJh{4{YT~6h`~b-$?55td3xF(zPrAB_2botw}W>dM%ULLp7+mwdHwy%?;apf z*+vX%RqpbPlcr8HPFlmsFso^AEdEC}Fwg{Mo7&${Zl1Kam1)C)*iTNsM*bGi`8xfgcmbKFmmUv54|*(X*d2HXSx4|!rQQX zW26~|F|_gq^*!)=qT1d;p6iX03-$3)vuTeAA2WJ;6kQv0wKlgVH-Xb`r7mfH`v z69c^MeS2R0zya!Rsn?SC(Cp{K)$D`3iFSZu90$=-9%K;unYkXqJ!7DcC!^lQ+2u=Z z+_entc`}=!NE1;9vWB5Oz}ij>GR91b>NgaFWcf|L>l@dwVGsevFbdx5jce`+h2n*b zrWN;uz-U_pYLmXUfHU3}fi2SW8oDuTl>V0$tQTO>XLniZl5OU5k8UWtC2JX(*5DpE zOU=GC(ud_)flJD5<8#k0UX4#oYdmb^bFWsYo-CS?R#7M5Jm5Qdzh~+_KFnHt7ic(! z_N_LB7&+RM@wtHWIqfcTW2CvhMkmF*v4e1ZgOe$aBiEnPw>NVXYqp|CJ$&1nPs)oC z=8ch|Yv!QjY`n7U_B30#hQDG&|8uecT`41JVA;EmFUykw?thwrUTrzSRw9 zUbn>+XSK$`$nzDbcn2fT7DgV7Y&%$nx&e{cc~gey3Y?rn$fCYG!>T z)15$%_K43HQ#l(i+dl3ORbr5WR9aw{ua+04dFUb=3y%KSyk@7A2zvbmbn`ng16 z6uFv2W9)k?aOMVZX1&iu17j8Cd&Zz=+dfgAg|>n40ho=1;g}1^BqH#47aGfJKr&#{$OU?BQ!yi(GZ$_YdAF=Wa?;O&BnuF zAC2MAp298oPE*kL$#+a+|9pqT+=1`3@vTv79Qe+kgYOihTs|z{F^y6F=&xPn-T97f zP2dI~j^PS;ndp(O(-ktCCEq$h=>1fs;j)(vPZ8+26WN1%kwqrSl2`zmv zFw3J;?FaOI@}2Qu|9pqT+=1_mTJxP66YzoW{JwmrFeE{Qy0<9uk;gCEFakO|eR*zT z=hq*8e6@P0vmG;AU9=#vWu4aAn#f$j!v)lDzY`w#0zutUU{%sBa{+~9{{~rh}obqkexnM8nB=I&p@R;Z%wBG!25=TZBRsZRb~Uk0@;GV`AC5IT{Vd zL*1EL#$akq27}RP42`~Fo1@9VH2brmVNb{Q5LyF$Jn0Vy2D0`zDEElMu2;&9Nlzb@ zg?!iz#y)Pko8p#wdAN>kU_7+^IDGT|{ME(Bq4oOvv(u|ztRMbv{xJCQ#ZTwIoDcdh zK7PD^`Eer#4?QGrN3Xx@zd3*P?sPPGXMOzT!_3Xqad?vquBdks@S}#5ck0W*Q{EgKvn$aO1ex4tyWk@l91H zzbdr05wodni;L;QzF|(FF*S#lHJuHu$-tP5CuV=pxB8~(46PoHY<|hGYd?Bpjhjj5 zJGQZtKg-P8wDdo&!4kY!KC!|`lVuK4c=b8Dr?(nVXi zXV}9ToS4(m2=y&TA5W}Fe};xmpNR7Im1#-dvX!%8T4RU6Q2mL~ zJ}{K5vm4?QH;KaXC%eA%}yzx(m*`lsu+&;S1Sj~}nz{PfGmtFxcZUp&A6A=!vQ ztx)J0-BO`YA8EtUAn$)V+!5x1K8Jyi{Me;atKGTrLYu+Fi#69L zyOA6CDM{}WXdSsAWaDnKbnQhKIZ5xYqn9h_p~!{32w_BKr57es&$Ssn_FkM`zclpA ztJBQt-x*RJiag)(T@ZN=B^V#wVKE}QW$1JuQqu(;pWeu8D4Po6fk^!-NT-8)~J&-pwlUd=$Z{>yf=T)8h7ED%U*v%+8Uz zpJzd2qpmw$+Fp>bAyi?w2=@lVk$TqEzHZ$Lj~)AOe=CjiZj3d<97}IYdDJ@Y_Pe^a zb%Il>h}yP{f`@^R534rcKkj1X;TZrj?p;%Ko&r7dT1q8Wp+HQMtm?s!Rcum|&L z4%U6#%N^|TUhbg&UhX!5+Xs6}99;sd+CrtQE0ILDn6K8b#zy&Ctgo}JHHlDoJ8P1x zv4b_q7!O-n4(bCZ?7Ic3sli14jY+8mk`u~~SHNKZ9JBB_sjA5g=TBKlI z%#e+#hcjKx_`J5Oy0-(2EFRm`ZgdZv&Aa$l!!ewCh#6-G7I-p+_H7tMF_;ArSdl4b zC63GQh;IvR%T-8v*=iBW3cIYq(PWD?C@LL1cn%&sd-34eyWw>3!%u%d{qgGh?dkJh ztl`TKXP0k34$T*@KK}gb`ue+z5TY@;-P;a-nu{zsJ4yN8OUZCI8v~Oc~l1?LgNMx9UwZ|}{ zeKqdyR@Jvq|AklC)Etd0*oSC1F%6@SjF~lp{r(URZGAF@_Qak|tqF9R7y;VC+&VgH zzs+^|OpP6+7HcqQdu>&z^w28at6wh8-o5=e_-Xk1mtTH5y*hjG!aO_wXuf#!UH|9P z7iagc;%&rWw`+pBZW{Vl*94WC|B~A?5vKbCb8=6Ny4fyg8a;j7)2*J_a(hfG?zTTO zIL4@T0*$od?g-FZQ`;cGD(+_!67;a;CM2qF6@-A-ZI{qY*4QNoL4R1xp4zz5LvwS> zyng$`hx4B=e;y8=TYo?M;q}?`pWnTF{o$7n{U6`|{Q3dXrEbDtn^2~vp^r4HStwIp zcGtV*Lvuh_|DgTda#^zyg&2APcKsN6o;ydrjS5~9>l>zN;NJD=n|D_tE3u`-Jlz4v z*1Oq&sBA5EGgf}L=30b#W#xC-?M9<}QA;+6!y+WYU@|U`qfl32Yj!#swTUIA*4Tla z8pD!g)Qu}WG&_C$^Y?GQd->z{*5KvO&wm(QU;O>;n~#_8K3-h^^8Drd;R9Si-H5@i z!tu~B2)F9D7mj7kngtg_>>FC8XP2()!$CfBu+=sCTK{2vg7hKR+V#oK&Ng{id-MsC zpp6}!ZAxIZ_dGWAfiW-|oy3rWd$NQ`vf0)aA_3G{Lqs;>xu3)yS-gyt1?SD)XWLYG zTci7*G2=-Ik8u52P|6}qL+eil{d~x~Vb}N@nMZ?e_uS2Um;6Zf3g4kAVRuvPFb6U0 zkT>?+?S;2<9N9g3GokvJQ(dW4LSz|40s^93>gU<%C70z^ghwD+&nI?15Jhz9A1ve~88{0$K18Rnn zt)%?E;dW4JC_Qn|sw%#~!JY2lPIqvpJDmF;&i%iFbN_=o-N6-N|7R^5w*P}K-NBdc z;7fPdQ~#uU>R|)9#|`A*NcSgoq^pw|4qkKzFS>&l-NB3Q;6?Y+`)hD;6JxN|G6Y_okP;HL(;N_Ny~z{>z7fBKGFumg009n zvAP4z*eQJlLEU$uin5Dv&m5T|KiGys?c5H9D~{2##-?FTdWNpk|Co6jIUCNhHrC$( zo$+8qL2ZXjv37fhOmnDP;|8aBv|JtdRT3hf?Ir%)bMYcGZ9371tdW&zsaciE#lue( zq7cRlhG!JqVbr_4c%vC(Q(38-O154cMqjhcej$$cu8V`<3T+!m;)IND)LP=sJE3# zPuIsyR}C*)wQ80@;>QO)^Pp!o(lhz}2W<*5I^5ei+}rt6-`n9y6)MashYV1M3{Zy* zQ03qc8K4dspmxsyRl|P|`Jd{D<&gjBkpJlqkpC%!7~eUEQ>(+N)#22t&FVNDTOE$A z4#!pxbZk|#3=ij4hjXhvoLkjU*x}&naBy`vxT;t-DDtY$A#}|c8iPXe*g@AEcMWaG zEd;x05>qdj<1WF1BAs9q;hv9NZ^~|u7)B2|PJ}QuoZ2DuwVZaOMaY9Oa;&S*AIFWFm~rYjFSjyD-^jiuJh;HQx2VWgR{SDH-r#& zxOPLTH(6@XcW!A9!=-XT(;gVmndvhJnga)+v1Lz3rad*M#&kAv#(mSU#^nc?JHV?% zcZp(1K+?X4fzxwb97panp*E$ni_`NSwj(!;F>N`;t7XNl7Oi1umSN+AxKwJid*0WJl7U68rB4g$|!K-bs4hyJ|xo$Dd(8ZAS49&MG;1hVfM|@ z&>Wk6-5iYR+q-8eZMUzwrOIlLjQ*f+O$~iEaUep-MEYc+n|-2C>LX+t#u!-;PSAJ^ zN4jMgqmeZk*-Ge-;?3_P@*>Uw_|v?K*%qD>}d|6WL8?#5jVSJ3z2LLP|Qb2skA zFzS+j`DQ|viapgwW6QDzmNT~P$!uyGvq2x)Xf&9N2D6D_j0ey#bxAGv0=*VvGjEmd0{kX-_H` zAA@aGFkZb*q;0+>ITOdS`h(%bGzR(%j%Tys7#ULoTBE*Wj7PTJpE;vZ)`qx$@YT|3 z#Wpb+t9H%0Qd@=y7-(igvkWU+wGdL5)`L^=!Kt``Q}NNa-_C=n>%(aM?YBoqjAV}f z3C;uXA!`x>vmo&mL;2A^PqaFuWt z>ceYU^j}@q^Z)9@zVR2sG6tjJP`3v9Uvy)j5Bq-s`hJ?Pe-a$S=r8)tZRI=n2YF!V zen1g+1OEi9%p(|v@+WgXJaQ1T%h7k=B|h~Y1D-pLV6>*O;;*9wQJTR=i(rXPKnZh+ zqXcm(gJFn!afDEB32}^~EcG3^HfczD2CQHVBiv=65{x45!%m?lz0uIp_0eE(bc@z^ zLFC|*BMqdD9ccnnjlMY20B`0tnIhTMZ~pz6(KUu$UDLlgqDLjr^-)BDp(S*^6X5!@ z;6GEqWJ5awfQT6<>Hq+cL|%%1t^zC0F^Jb8IuYm{tpqOP?xbs455)w^*8d86L}1<< z1E^j9hHmyvGr#`(rg2#R5Ai$#ng-s5$p3J04seKUcjnr_4*Z!rPa=A-a`XuNr-P{b zC@Fk}5SSt_xH}3$a!Z^o^l2GvUY?j;EG6m`-eKJnid^F$fdS17YB~_WB6WUl;Vp33xp_ z58{gmVbY-^3hkpCq3;tIIc-P%&W+HVRIDEN6n4WQmoOVZQwMrwboDNi(F{wBci(W} z#4yak2#$u(9-E`_R7cj(oH?cgbrX#tf_C4Uz**m(nQ&l^Cbl)TCzIL0n2j6Z&}yi| zC|DA4vF%8Udes9hAvYXnQGPS5%qW{(t80ki9rvd;LXJ6v!~S?`8iq3*OowQ!I~MHs z9o=y3u{j+ZXxP`C!3d4V{i!w4p{?745t>;I+HN(vK8o=o2;#P*E9zB`u7uohbVd2i zu&SBGKp!}LtFI$xWE+mvpCQK>J5$FnMx*Iyi0tWbX7@)!!{|?K%W(RZ1I@l}Te=CY z@nF!P?ds7z_3q#r^KrEU2VoSgP}Fv0)0)*|OK)Cr@C}DosnQ5yhJ^cF!|dvkC7VXy zgwwGFN5ko8GI4A;nGEcS?pSC#7!3zAqi+sJmOh@1CWC=xOp!et>9d(>+BWKso3-DH zjG-60K59GEtXB0fpE9ToN0>p|1SdbPR@W5cYUz_fe`3Mu6rzbfLKACh%n08_rh|sI zH8XVs4yKclZVg6#)9TxBjHbrWnT~B|IJA%$+YT8qKIy9`AZkv`qu`S&g>y`tJfo;#mCK~A@6WX&G)TcveL&LGB zvylmhx=~8Lh314|48T~a&JdbE2T!(qb zOJ|^va>$R}2+=aYK{MBP>BIpEK&|QGtFzNLFHgV>dKeuY5mhY;JP$<@F7n~jLwv!C zuiYcSKR72;dCOyw76n9W>eBBYpyxUupqeQLFd_(sUa(#wKYj`vh?aqmQ4E3z;26ee zmUtME&4DRiY2nPsIS%b1^Z@kzAZFK+K;Tn6(mFi_WKXtr1k_q@TpXW(|N0*WpX-V^ zSRy{~j{pEv*J5w!pDHf9V{ih#{8rIB4^ENS1}v+vYoE4kR_(}nvYeub5VC`?8zBdT zfrHud_gov|6JXR3P!i4~=pcaO2*zl>rbWLCBJe^YgP)Ql4sFI&w2x2V<(~4w2n1vZYea zpM77+lKF-wcp)db=D4OZ`AlmbHDq65;2ed4 zb6UcpN)~hJQa*a5G}fdAx^hbq%(4Pr^G%k^G)JqP!DOH+sGK?ufZ$aSx&I);>4A&D z0jEhEU>kZU$_Xa_=D3*dPXB%cc^TKI#36Srw&M|^iRLIiA!L)T7|t7)u74?66nI3r z)DnKqzSDIHDgaWHsH_{N&#^|$bYXo=FIu^4ERJ>rR3{yq=1X5*zpuV2FS%=j(kKItOID^ zij2?%Vzdm2-Y6}=olbU$Avp6A9HZzm@EDg@em{48$Mxrx10PMHErcZ7*^7bi!${lB*@ZLV<*-u&^_(Nm2X4T@c-}y-4mC zROtZ=6rpaN4JNI*k>oO^E2xXbY;pg=tAv4bg*;@(K_n#`IWP<4E!nXQz`T&grjLSB z>Ym5}CJZ8oK!lcLym*(1Ku_wht@)b#V*6rgB}CLL%nG}-9(&WOit8(NXpQ%n$!4T? zVGt%B;{%w;jWM`$;|1+Bmjc&8!j!I!uLskmg7pGTOAKzWR zI04JGMsJw~k;A+D7P>w_{>qI4pGt)*7`c>Iy5O3#M?oQ^hgWMqhM$GHc5?IxoF0Sg zUrxaL>oYO{$E>v%C*YeeUqJT~c?e?EJtyq;x8J@wdIZj75h?=!LV&C9qF^b11JLbu zkC4BjJ$OV^M2-{dJ|9uS{AW?Hlx!S71?V$ehGfhhfsb^gK*TT*I}1@5m%&q}6tlvl zeFhWUxt<56h!xVHvvhre$93q*!MuL?_TtUy^~;+Nr*GcBJOQ1OZnBzWFR8+v;{AlI zagM|>#pp$F=ikA|0jC$QNoBIc#Tn#nGDVS(VuZVH&~pMC(;IlW$6|qK4ve7&!%zg_ z=qag;VR+GMV@nsX5u%0 za{=SU30((WKX4Ekg`*=et3v)`CZo47r1e>Caga*BXiFGsTr|}9dMgxVuVpa}oKZ#v z!pIFGH(mqVgO~~1jys#7h>&zl*fAyUDKpYwdx4yU2#BKI8L4(on*fghOA?`xzG!yj z#;y%LA#r+MaEHa3ClUqZ%rb>aaXpehC0KZOOD0!ypg%`ZkYFuEqzXFvOeWNg!6Lv^ z03~D}lMPV35L(N}1@gI&Lq44|E)SOQ77=w0Fz9a7>oWD^~Z@ zkpe_+4YZ*b3jgn@)jPnQW!iQzt4P^fr=q2@T11NL9!W&$=&99(q84%;BGjkm!==}5w zP}}4YTXSbhH8LAc6ohGt-kc8sREc+8DVdx<;U(ll;#O(8OXEb__AnNE=0YTL|KN+c}M~vBXAy2#AP)*HzS!j zQD&vAgPuD>_S*JPRnKGr)f&N#@6cZZ*LUMHQ5sXB89)pimpVJaXbs#LEpZpTg!Up^ zTIjk9xI(}s?BdP`w}?u0L@~|5AfK4D;Gh^qOV?*z2qFhXUGNHdidX{dbOCgavPf3+ zM6s{fjXP9UsjgpjSf;Q_alMFwDJq--X<8Eo#H1Ecm&qa$U*)~$u8@x~)(EA#^e-I4 zC{98xB+cXAaow5!lo24s>J0}4!VkHn3iy1E$njl@S|&-<8~uj#-yO7%xPf zvZi|-ZZ;-Dr1&K*LS$T+lqrZBs|r}&teP3ME(i5`#)TiEh9U=i5+g}x;weLuwXq01 z2MdV&m`rR$rLe0g2T;sUxIjQ5LGK0f;Q9*Lf$!iGVCej7h$5HnI=T0;yF@_}%MSzo zeg<7HiO}^TLYN>-zNEHx2fAC)x?E=E#4bPI3$;t=2Xb#i?%846GrgAs|Jn%titP!l z$(`>d<;0FvpnE2D4*NjpZ3tZ*v^|q~8R&fwd7hX}{{9h>C|wMe2>KWh)gEF1!4iIU zm&uY~HTbr#KQjh8QIkkrN=5`rkc42$tb=Y$R|PI#QPm4)s2?3Mi4|tfXtSa?om&`# zyM=2rgXhd8OCwO;WQFr@Fi^k(o_$eR)WBWj#xe4{qB$lf)`^J`qUIYLDIYZ$x;>(+ zdI5AaqQ)nYjc|{MkSnA2NGb@LaZD5rjs>+(Nrv&-cZh0>z#_P7-jVbyOjw1TD*u&F zM4kFXjUJ!AgPu2q_U(1>CYa-Q{>vx|qEElmFo;ub-uMg7CV}gxl*X+6z($NT_KUp!sOUa|O|?2g!NPjMPpr%I(+z-6OHklC6?7bC@F!?e zzOATmM3uzu()C~@O#0stlKe)1*@*QCJ%M)p!d_N9{NXi9wzRbFTX-wZK8X9gnc09OK1?n3+^i|qvBREwV+=6sbz zPsqm0zrN#kLvZCTLk~T96F_GQJ?PsgI(`bs&*%K-Q(^CXeeo2W2M)RjqFC9;^!NadfNvVX70AJ=CWTjN<+lgxPJDqNr`VnuD>=3ghCybJEg({m+roYNc?;%QTVh z(xSVGcN|W&cqhD5nu~X02r}$c`t{WEQeJge`Hq9B;-#XMdzbIz;MNIv^0+k+ZrRY6 zUO8atI*xY-BczV!ckXB8yd_@{{Zzn{(snRowOJX#W8w&+nR}~#xgBG6Kpa9F3D-%O z!~xmdZOD`@di+g&$}oVwB4(xjNGeRi1Yj5HPqTRQ8Nn?3W?L7%B1(fpfz4TaEj}b-lobUMjQXkqTkFNRc7{QfZWYO7)KvvkMq6 zx}X_KKw7SQnRm>BNcRedNUub|Q(};Se}4vyu3>3<0n#!iPMo@abCoBTE_fcq3+}#0y(9^HWRyi_AdCX) z(h9S)!{#IQu)+uZkMP!>}*b_K3jWgL~ z-(Nik4x*y_Zc?>^ZBepjEmR8D&3bxY$mLou#ZY>sHjw+3vfB#&48%7ep!Wc(C4W|K z3F+~qEgcUxNdFSSGWlQDW;ZT!*L1Q~Gq*LtrYk<#x@D3A1t5z72gVSH08lx8EPc&M zJyI|uZp?z<1WaL6M`=4#S;INxUQ`thNGU$@h>bhW7I4j+S<{0y+^s#jZcGqrOQh3P zbg@?HtL-V>r-nGr`Umi;3Z2Wl(pnA=n-697(QP4Q1q{%@0iRV29evpAg#Zl^xLXQQ>+F1nBQc>0$ z)}{)BsZp9r>fAf!4zjDO5lZMq2!KAjm{O?iL3jByopkPwBEOS`m(fm?lO9p%jKH9c zuY)AgC`bi|_uQ0c2mb$xkdM@O@hJn~Q&+hT3;|B28guUPu^>yS6FBLD6}EBeR~)g3 zP4teVTsmYbHJnVT`oPg*iz^C3IOh)K8Mb&z?-;xd)Q~5FLB=`KeVdvX11{22IhkFL zTLuo2ODHwMPq`}=pFTFP4vPK{2inRw&S3OX3^j%!7MCS7f(2%#aVWcX0xl7BK1Obg z-VxC??f&%w0mztRFq1fnUXYCk;q)k>a%`~s4|D=1lgan41kQ{K0aaocMG_{;$-sc!5? z$|$!PWI3|5J;#lX>;3x(3eHJZ_ln?VpS z!x;uoE>GWTQ)u6kd6G9Pj>U@MK&AH?n_>Z&%rvQs<(UuPljwK4s#wEWRznY^uH1hh z_VGDw{R11ZPhf^1snF&?G^JOT!z zv_AxCtYG8?bG#*OtYFk5)eqG1z|_H*9$JP0jakgcrgo-D=`E)@UWQ-c1oPSb^G)u< zE&V9*PpTB*21`Fm`~zJyrwbX4f?u`|W&oxd>5>P=*lp?wI3i-!PdzE6IcT+E@&#_H z(n@rHDiL#w0x45e_`32?gp-SdR*GONju)vi5~677VoY^==F4v{f;*oDf>O}Foa~sn4PI~I+eOP9gY^7xj4%&k}PxC{2eKm zS$rB0urLknO2Dkg`zK=o_dv|Q8!_`+Ln#ecTAFD=Z7D*B)sUTHS^NW=`jr0OpTX}1 zHB&K@9Gi&`9At=WYUSC%79n^GvpKL|qyw3A6lonkk*|QTbTI>kW$MZ&W`$p_H4$Z_ zg094|RTI(@WyNXfCi=>pG8Mfe6%$&D1~bAF3Q4Dl)@L8idAHICG=E_Fy>Id@opFA& zzInQN$Mg$y*6j&8aLs4E&^cTDZRBu3RU9 z9+{b2W_Ca!J8)0fZ7g5qMk90-PtZC3HRdXb7=}XlJ+{svhJM=rV+)~x) z(IfCK0`%AbcrK2WFselPO2R@b%4=zcj~D2Q{oSH{^Lv;5%A9f73j{-rztgCbA0PE| zLKn;ePX^o$d>lv6rC~{1ZDK4Smg~@TXc5<{>}AcG)K|DQ}PfMe1FlQ7dou3pg9Rt}& zE*d0}&rdxUVk8}3xYUOHIC9zB9*XTA^JgQY6^4ZEzrGNTkgSjh*|wKZUC?nfj(`>i zlm=03YZM2Ka6I~_1{vnP<0GXXa$eo=1aypv*)@jauF*AgopAw)DdS`s=m?iKJ6Lwa zySux)Zsz?_#waGP_KIUG409w=>2*^^0pf!m_W7{fvb25kv*i#ZskJ{2f+2oUO;bnEC|EL z%$Ep*DDjC3tpsD^aUDH3jy*&`OGKUmoY)J}_*>U^$@F%`p|BIkb79dBrCQ>%zOqrA z1)dk&(U7-~fJfNHQvjX+O>oQ{=^+L_B0L>NYZge9M>}QeMdYo)G@`EOa2BHoe3Opx zH(eUyh|CDvckM7a0hX@oOKx0T(j*+??_C-nhRvc<)W{Va=x<$41lK%vI@t|aY*=;z zivdO}6hV(H4UH(lq$rk-xHA5eL(lWM&qJ-R6?7aPjc-HC(!=Y+#W`=j3tqZo+4tJ;Rbyt|QsJcw5q6=4Z07ZWRV>z!xcp&@#0{K~#W1hJgr1?Rp+bDCfgkdNG zwz6d*E@Be46T*eesOCmER%lAG$5GfEuNQ8_f|{v95px;$)+~6g;202m@5V}&BEr~- z)Il9F~Xz8~I6FRbq2q(gYD6O;B@;JN{j;`D;$QLAe zQ{EdEiI>Ur=yOPubGX9n8?r=tk_RL3$#rfb3_l58oI&Y|r$`V&U+xl~$_~@O6{#O} zeuL<4+>x^Zdnm(Es9ic4=YqQkAyo~pQe@s~p%Y-3ebZ3hmSF@kF*`&|K#px1i$ZBf zDe&mgy+oy;fFm?JsY`gUMO2DR1L}`7N(JZ-4SmGuKnb}}paWkjI%WHPmJDv+fznHS8N z*#|G&P=*)qf?KzRpjIz0iT3NHC5dBGQ3*7clqBp@F=;ihbbs>{dE9)W(5<&v>wJ(!u&ehzD z^FGuF34EW6BTb0D&Em)<3%@TL!=pz>Jen*{kKR}?U3&M12xY8Eg29ZMaQ#>Wb#YLL zd?K>B2oq2|wtt$!SQc2f&iGuKR#DtKlG2wmwIk%E}`J|F`rP_=}geNMdu zg^}yC2po$vUv3z%xL1rGxW5#SG(_}$k@q!Co|=_Nx<}vke*5j{%NOZ0)L{j>ix75z z_8ZxP$yav#{QQbw`{heT|5G<8qMY$j06@XLY@*o6 zf`3X&g*w(0Kqf761r()>0?Ob3)EvrH0MarFfIbI+;>fktVJ;`S`n1eqI5cj!x#Y*? zLR9BJQ^lDlF$@#=hBa`yLJ^!JrI8Jzy9p!GCFDEm&)Oc=B$VE=lgsp$(GLA=fLErg z;)ljLjrjZbX1ZU|vtj>-p4V=#FMBrZ|N6kxv-`g>91IWp|ARbq|L3`U<7gcQVy`c5 z+01}Wm4B-DMu;l>L_4LbzsC+_Wm>o?B*MK&#Lteh9bo~e-2S2GsoQ_=Tkt*4#Lf-) z(05dYg~zr2wx`Mrx&4dg;^Z4v3ET)R`SF1eV``xhRrN}R_(x_f8`i(P5U~pv*s%T$ z)9B~c|7bL@4(tCR9=iT7=}OLpf|H9u1g#Q&C5#PJE?`MARm+%#I#*)iL8Xn%%8Q^s zN8mB3@Dw~wFXx;*lR`rJGArDqr3uS zJ9gEC4p7=4KLE+M+s!~qapYLu5WGm^1$;Yd#SR;#OdlmrIx2++I`8NNGjJX7#BuGI z%%YsWe3QqyAd><`E~{}j&#{x3t_-6Q`u&0${t8;wT&1OI=B zr`G;Mm|E5XM9r;~Ca&c5xe}`nKP_rw_K}pcFJJ?o41?owx zY((Oc7!T)|;gxalGhBMruq1C(kNPVFP^Cy$T-hl_vkpl$(58Y%HJ%EV!nhP67TE5U zi{l_#^8g--3a_+RR+a&l>98mgG>!QiWoqgsrz`5dDVeJw125>BgI5R!fWmNBHCHy| zT`~;WCdb)H&y0N-IH$!iuNn6oFvWnArQIEdXq-nQkMWxvDK|m3fUcVPvQ%zJsU!@X zl1V%W3HSDF+W%z)+#Ljf4f}uJ8s*P_bW&hQsAXPjtgG`&vX6x z`_N&Zl|h?9*8@-JLYaZic@P5#R`lwetWNWAlSQN~peKLD$DOo^*tk}*r>3s$eRXGN{++Q(LM;H2VwMINEqE9{|Sfkoz4I^%76WW{l^*(5Axqb zJk+?Y+W%kkn+mnoe^4dFaeApY{ikU#8(RLw?Fq&1FJ9%W{(@dBZ2tVSV(}Mn%Iy7) zh}TrK?u=_AHulE;@uhO%4AyVN8Yc@5z5Ik@B|1!?5`{Bud5E|#2)LE zgFb`oI2UMV)3Hohn}sH6t91}JVw9763Nx6FVHq*hVZQkY2u1O$z;jU4QQ9dTwmc!A zDDJXbdCJ*OX_xARu=4YvBhIVhB=QRZ-SWw3d1SW@d@5ajDeHO6dB24)NP zq_yKu>C_aEU~4?=I!2&=}p*`kuePJVCZXSQxxiD7&upoDWSHrO4$md-G=h4 z2Em;x!Ym-8GvuG^b%?mwr@T06-M7u{Aw_RM%9ZW?wvtg# zGFQV}we#iP9hf)pf9dOZkNzKhYhdR2ziuA*|ARb~|6d_H@EsztDNevd+7p7D7eI&S z;)`=Z@+w)r;wGCh2JjocC9#s+S%oz~y{te(_I1+$6Y5q`#k$z$l-7~wKP8Jg#W0Qa zSBn|xvWRro$>X^SeHt@3D@vE5w+j7cc;zD+v=}x~wfUfl8qHA4Un*~bnyA_wHBn;& zYR?nbb5j4zB@9(m%Iv?wc~RZkbWi~_^>?p#8eiF22lS$kIt@Z{YTH5L$GNhzvO}G+ zftmsIYgt)JgPq(FYqcJ)7A%Yc;NGP~fY{Vv#;L2Oy|mme%_(uYJD|SBOwrmlGhnKZ z`SQrHlf4R5kMm{^N;n1jEnpo@p+9ClI?~;6hp5PtD*>>RZ9w;|MOb}Hpzc0``+(=8KyqU-~Srwhx;E7@)YiW zT%^JNcy1Y*tYF*QAavg=KMV?2_QnGsabj@s;Y>BJs+rG=HcC=j?v78;ui%Mv5TWSM z?~D!87svc4hgMV58|TkG9xLrCXGjD&Eq_8pAr{IvzU@(LDR1UyM+fDHK5eZ1N=u!R zcAK94u#wF$(7b`S#{o9z^3~j1Jlg&|B-p%{}1xCivIyUPuU+n zq^WH7>Ilk&+!7NpCB~d(ShWJv?=XpJm=fyQq*#NQ37H4eybL__6*-Pl#Ir7=6`oCv z97d~JXzlM=;MPT$G|vqAO#cw3?rH-k2S_CH-KOuk>pQMLKg?pgW}?7DJP-^F-S49y z32R3FNCbsZ*G=mqk%Tb^(x%4YU1h8t6v+)hv-Xj5bsAY+973CWe_kRFL5#ZR;&q8z zZTa8|T+=co<7!q)GJiZhal`)46!RS=fDQYdVIUPr2^B`v01i zo|pee*5I)IALJ?6e?+pRE$uzhkX+{gEP}8%_5T%--xUjxc$M?76ZBf)U&lWywi^Lw zn|L3hZbh_@)JHheY;zxB(V3<`!r9*4Q+yCP!P(}Tnu*ftZ9PAa6wgm_E{!w9x``<3 zygjc3Np5oXtf9rcv*!k4EI4~g9PY{2Q$fAZWSy(0sHeJm=7#k5bM=%xICy$)^EBK4 zA=A3H6azNN|D*i*k7?-r!~O3Ec@+6y)vsIY0a@pTqU|nQqRTU8*Xs=#6G5r|Aa>`% z)>%*_j;k>7caODOVob<2Qn1;S+IkvYyxy|{vT6ONZW7z;02|i7)i;g2|6hMFI;{VP zc(#cDaK&k2-w~iPE;+o&4IrU(;wv&C?<;~t9pF9k zqOUXvL?(8@E|DPK`7e-%?lBUCx|AA(f=Fm{S1kfUG>h)ADPlx7gi-9$EHNB*X}kwn zs&WSFfqr?wKn#3?K5x0)>*F^RmR(htg_1xImCNoBc_E#(ReI!nErgVmXXSi`R(7mv z>1B0Q$|L1{zL{|6nw&nrvQ=@hq*hr0WdO7S!Kis31Ryzp>UaU3@8)gbpiJsLjnsX@ znof%-DGoZ92s$4lH%9NMhtDziC-^l9)G#n<*!~RYY}$VD5Uvg9Db8K&{v*@gWHR~Q z?Uc1r=J?5=G4oIdJOO1sNn|2Bb1#@euLB+zd}seGrug6Gsh9tmZ+=g?tI@kru3j|M z2sX+8rjd*PVfKfXevtnk;$iZ?5dGsoMD@>I&k6h^5%ym!;T~{(ek~NGR{VZ8T+QR2P-`-BG;jfYU&^r02U0Zy>G#5jypTl$RslsR#&tP z<8`L@{Dibg*K;t_3`?msJa-EqgZ&@$C_hl!2&ZDe>JP6vd7e-LVB7PmhNo4^u7fzP>iA_;py~l9LxQcIVb)9SgLY)T*}C3WeYow z5=KXDriq1D%Ymd>!<*0~y*HHkKyg&zaoytPDR{gHaID6T;?QY6?aDL0CrqQDmAfok zuzsviC#P1{7dajsf=5So=D6Y@t?63W7~ZLFEhxdAc32BlfB)Wc(7)=ljr`Arjm8H8 zoBV%9qkR0A{y;y-{}1xW^S_LUkWXCA&jDQ@qp0>EuudW-%bce?l;4kNmg^JH$rud9 z*Vp7@H$q{6-8hKW;J4pSY6`}14u1Qs!(d({p2vc5zNGe{3myt z){l_CIyq9d2cDC=e$x?!^2TRTo0*X0FRC=L!kS_($`t1On5X$xKeO5yW6YOK^cQKe z?p)CG6Q1IHO`Gbm>a!qH=BzZIdZ+53vh3zS>6nN*d?;_9g2yX5kj1{=mUMWfcCy?w zM0fdUc;@l}Q4qwvF2;+V>)b>b zGCO!OWuN)GFEw{;ir7d~Expa5+HG69Ei}(|`9C*j zKZ(!`MaZ{Ze-7quoC-I`IVBLdejF$VD9mi$;&i9n;{FgjL~B`(ZGum`K&AMI(x z|3##|ZH#|S;y+t?`M+-%2mk*Ec_jarp&NHK{>ea&rKUgewaoA*zHKo3Ws5a2`ekcm zO@6IyegN1ogj3gZV^=s#LB|nZQW`jad3|&G;_d76qZal-CH&!U%5 z{pWE1<3XM(|1UL???XC&r9pkGUB3#Ug3BGhWEbwm>#J;=yJw%TbZlxpzFG<6jn=;i z0!`&V9%^-u@}Fhp?|=36!6E+pgFI6HlTpRl6t}eb%E01E`0VNhTo#7B(qwx^A-;v- z_V=_j(O|}A+sa}q+LfrU;nF(+|70gRRB;y);3AI08;^SZ-GuZsaiWiP{&60KcJ?Ft zLS=DqW-TR@;^PyQ{?}<>i_CiP}Kh=Coa+d#kURm zf3{c?{Xbh{NBzHrQm^cDe?+BTlEl80dUZVRU#Z{Vbt92!>~q7mt1j7@pY>2|r+hIZ z6?6)YEuu4`7>87F7paDsbsQ;viV$?(`QG{j#E}~6ZcERc2EI78^ZUoKfBdUIE%$#p z!+W&<7^8kZ{*O62#Q%Gkr^^1LCYgFj`%jv0s)hPkZvRm=+Wp&q%EX*|w*RDK)B47r zRLiUH`lUr0^*K$FRp=-Olj&&sy7gthyk%ndTYs`2tNXg@m)q&@{leeY+G|Vx-`@GB zf&IU47VQ6)dAR@aAWyCT4uJyb_a6VDKN{xwe}6DI z=>HG$6z+fSdi-0$CDYSi{;}-vmw(!D_M0iyNf&p8@bh2^jW&|GMgwmg|D! zd>{8R_`{OHALd5i*k<&rsWgbdlQQ%K+f6Wv=yE@wTyRYn^k5zWl)U*3>m1p;di}Rb)_t&pZSVZ;Qw$g;p>p5|EG&Pc-t@^hIL zNPgU42g;ReVhPGsX=4i-497WZ5PP$;Jt$R5u3lc8UY=gRyUbV&{%_}CGAf#k{*X4K zA78(DbM^7{_1UY;3{yA2O7n?D%_mvA(Y@GGtcJD}tK61S?BvbMpU&RAfAR9g`OE8% z?=FA5x_N!^!77kb5q@s$|NM5ShGRF(ja}nW*-XrT6!Q#Zo9q8dhMIeN>g7Kk z`+v)O|Ki!?|1m1ae}-iq^uGsrYV*IsT=rM!2`BuwFx+eISCM2Q7e0Wq+*#szB0tDx z8?=_c)9@CCqIL>ODOJcZ+s$5LNaZP>5x-lW=R&=buYT_q??hx#`deVr(*rSLptg{ayo4VP4w?amY1B!R{xsuE0B=PPd93Z^)-B!0j=K zE*p$O3*>cLHV!@TM1VWa7%{6hkY@WwL;f$)4sGQCUeEsx-74JwHw^O-|L;Mb*8Kl9 zPaJh0++U^`+6V9Fz*=&CH80lAd_SLL>nq^;>ZlZXzWTKR$5#-197gUEM(Zn{>+9qh zm@76=kpiq>aFq!vSoNHl^)Zi2dzEHuuA0mI2<7l8j8yh}&4`ttP#n0DLJeBT&w8OX zk->}%WgZ?)=}~gQKbyLaXa11G%kLqsI05H?9v^4s)WugZoO-2ePqlr?taPFRzsMlq zEFI@AB7=fM$Y`U(``H26iaalEk`Ds~}&d9RmWGtJ_ z!?JD)mOG4ob^DbA-=ewVnCCcc$@CwSx68~6$x1hkS2@KNVac%|vr@N+Y8u34jU5;I zn^$K_d=g68U|NSWLZ$?9(WycOQup4kP5~;YH=Q_wXy)F^KBv^wb%S0MBr#3v6-VnZ zaQzr}6xTPbd{EO$-JvNxh!NKRrp+kx%$reXzHmxWugSGg-9(0d^|VFqnf04l{%vM- zs`tMP_fvMISWIo~6~gsNt`~bsYS>~`05m|8n4TyZ`y~)rnI}3;2?@}^Nkl{KQpL0+ z?|&w^V2XSS6Wh>3XGo+^1E7%KAjjU+|K$YNPVBK1r-Wg5+|M?mIaJFUd)&Q5^mwX! ziB>LIu%%qroq=wOP9=(T2$XViFv=Ng$&AV$QR1amV?G0`lHq4FmbOlF)0RxaB96m! zT50}SHGHCSB*JpjDzhhV_ejCMOxo3oH9{`DmdLc({JI&UDCCJQ#p0P{8uFEtc>N+i zDn?3G`a2^jm*AA4TsG#RI2oa1P9sW|62407k}u@GliJrb9n_aEDJQ&$(9HeZVZh1f zGOz{A0GLAi7WvLe=H+H2fXLCDuc&TNVxS9k0Zr*#tO|giET<@9)zjpNg??ltn;b^x zo7=}JVQp+GKV(%)u$>j{kNY&V|Ai}i%is@9^8f1j_+Pqd9pb+~$kW>XcOedeV;1-2 z%!BUoUaW!PN=XM*VyaWaA1GlX>TPuumbyGFP-&~n9t3C3gdc}#8vACZ%Ke!3I21pK z!4vdrdC88}$tB1a$QF%R;!ACl`9Vl~BMlrulo1Yct(F%{p%LYa=}o01mp^AJSE@vF z>No|FY&$|Rbp4j6I!YILeW9!@khkpOMNgdjYaw+o>zsgFgu=2w+qF0fBMK6<@f)?`QJl5t@nR%pmHBOKBuzUU0+oXciHjt zYG$k5{zz3uf3Gb+(|&OmSHD(5%1bbKWm9cav5M0mRtnQpW``dhWlpJht^J%%u|JNF zYkf;NMOH`v>M-nTR?V^U{H7@O#N79~4YD9&e37xmo@BhZv=;y}sydDETIU&U5HN-$qeAUU{-rDvEK)zRMtAR=my>EjoK0!P(5U(>oUF z0A)Uvj#NqIx;9lDuc%ab3H`Y^4yyWkQnhZYpjDE%mYu3ilTp{HdKl*4HubI)U2a#!_*V)Tx znjN?MsB%|2uKG;2kz>BrJ!Hp0bW+A4*r$qBn*GezWVJtP)!I~Ns9Nrlt-Yxi!>Vld z8}`#mA@Zf~uyg8ti;;z)!O0XOanS}!#v|_tx?$;#D7IdO*RHbf@;Qwv*t;7BA2YIOd=Mu$9lI?^41>@?L5s}aJ4 zB{L_-O=FhraBj@9PSd1DM@-hS6u%fv(n*k(3l&GIEz)6_5XpM7-{}asI z2*=gF(+a@7*v9`Ao(=q8TwKFF%KBlu#9#c`!2hk$U|6{SIXImEKgd(Y!R1|FHszhv zo(SpF^NV+s`NwMTgQ zW1=SBxM3&lBk!DL^_6~eb(mD4wp*nw!QY3{QS9)90^5rmc-}0(uu5@-tD;&WD@&(_=bV#3p zCv5j&g^romUnR^s6;+KPLbuNHTQQl*DDwy|)-PU#DX)B7qL4l2CkJf#E`s2eK=gv( zHVHvzWpqGCUgGVj?RL@{owQ$ygE#3|*0VcDXR@R!8_Ji@O3UR3vdDmVuPJv>Aghbv zSzR5`h`4G{93OSfJmD;$Sd87|ReO|?6LSb{0jGw%xHW{Xh5SlTzUP=`oHcr7u;plG zj;6A(AemNUe%VmYvyrX95p2*3d5{FmCC z(-z#eqQLXGxhjIbbLxc)c%Cf5Ky|JWNaPIA8QZh;wr69Tam~qE&vM^{$2c3j%(o=+ z3O5{1dcD7{PX4-L{&)ff)+hu2m`}^b@ILjbP`&)`xznDFqPTZM{{O0VxNX;J#!o4`Wu>OCyo(gqbW+eV((!TD z)2Q9(b|`|Z6KQV>*RPIC{i?Y8OF?HNWC>T$_1Fz_qCD^{x@k%~f!Tlif5rdpcR)we zG`iEa4nF-jbKy(-@&y#{im3-dt+puU8<6$Qi9Ia0pxDD*o9`y&13}NG?H|#a4a7e| z99+eb>(A5p(wR+$K)glkI*5_Gf-!0e^2a|Y{C^Mh zi1VMwMJogdJMGONS9!^tyEE5@F#;~;k>8RCIn{?hIUcPzyf)a&O1yrb5Z1X&aQp(H z@GJ<|iq$OL)r9{n!-Bwi7gFgzv%&p{*34T%oQ-e9C~ZtSN2@)(2_uA&AE(~`nyNC2 zA8b7Hd@^$|a+IA0#@xXzT7w`n4fO-B>4#4a>njysTVw0 z1aAQCC{ThuRwjN>h~qAZZoL3HT^u5QfxD6UHFt{RewMDAevG0Sv=Khz5-4qnMztap zZ^yX1GP<_!c5UCD5nWouT&GR`Z{Yf%^AvQpfL&onZ8`=myZ<||$;RtH6X>cP1K8;Q zXX*w2KjV=9?Li)vW6AS^JMd#NMchWlGrk1O4(cGkTeBXF0Av?-GXO z2ECQh$=bIuTCPxZ7A!*=fA8Ont}*G9SmQR1Xg3?mfnzX5G0Zess%kQZzd-h_91I+@ z_SWr&BMtVc<<5GWbtw}i@3?*h`K^N}DGQx?kTAD@8uNdCJ!2aS;3odB7ybVX^WgvY zAdf2l@%zf{L_cxHK^C8ge?m#7CWR;c&O>8X9-EZh1X9^d_lyAPo`#{|@AQ->%-wii zDX}|?RjNX36yYqP59i3yraY;bI19Q;gOU~5?3K7VwZq63hCwUEZ$r}5G(U4mUDwAk z^lg;wnd)YC;I4nxr!oI$baWr_U#!t6FaPVK(ZT=YK_1GdUVaWC&#_9cas)FLzJ<(u zC3{jCi{dK4;vb!>UKIITDvGPehg{U8j88`isAu4byxUyzS*Q){Q^uF$xboges+G{~ zf$}}sih!7L3n^)uo|i|7Z-Zf<{^>5SlG)7t3_4n;TnaxrqY-lelo-qs&s&3E6X>}! zmuwVaNGGIw^bs-Ww0un3Ad`c^6xlGr2;g9er~=2hI-ACsi#&&2Ir7}48zYCM%XKk$ zGF{UtesO+9%DVoXCTKkF9=)D{i0uFj2+!e(IW^FCF3$x#MIgZhPYfVMo?}~2GO3f0 zLNkqg@k9`NqO}6JBE1!grqDpPQW}??daY++G`(FWRYbN1S+!;>5%86$kT~IoTy`Yn zP05_E8CHr)XB(K~|6}iMyW7T*g~9#oUx8(MPRBi#tasVIlX)JulTK%EI`P_0_qn(4 zoERb@iDQaj6Oa;3lKt&_@J0e4K#_{$$;=adNGuVoDgcE-RiRKN^<2wWpmkJ}IP&jO zGtE(!@c8;a2OxMGw3jccSGHJ}D(iU|;&n=yNMI7Az9++8MCK& zwc;eGgb*J3pr&S0$qMTh36hHY6b%7+9VW&NS)8Ff*@6%MmMiFK(oZl)MD|a9jo=SbVPTS9XDh>U>S{ z0;MQtD=))@E^bD?_e973+0WzP(x#%144(NAL2O zBAY55odK$d3G9NPyjr2CF)+C_j{^?p_y@onf(%FJWiY|Zm{5_B%lusoeR*9{fA%yE zX^~Q;Y-Luxcc9S#mSK(#&_Zz*ldQc|-pEum!8FBuY zt8k(lLn?l%jHdXx(LidtWm3ZTjim;-@h~QERvpC(S{r=L7-}zrKpo+j!)r zolNR{Y>uw8N!yWzO<32DsoBt%@4FeMx{(CivX14%nMeCVj^;c#X?4Tbxc20>$JrbtvrQJIF70Z z(8&Fe#DsG9(qmNwO}olhguNCxD4~FrJ)fv~q@6m@Ueu5!yWWJzHe!>N7=kwx(>T^A1WW%GuOtJ&@?) z)Y${i>|{8)wkF6iD(;Rw*%yk%apzgae&NOKSf>`nR5*aNW4^MXYxLFBfk6)ps(JVK zr;p!qet!98*V0hUT+=U!8;wA}H}%pM;?*opMJR`G=fWiMFt*yKbyga#o#bSNt@kZqc7YR`;S!YX7TNKK23R+%}Y7H-u zIkl*nSr+3u1dqX8oJKFW6QE4rVz$viJ+537eFFNu!H7xALPk2F7)e@Hub&8g-y=n& zbzzd9)eP3WdNHk=4Y!^$MlF)_kgDDF+QbQvPg67K=&) zhLUDB5dOO<8*CY9Y}J(?cN&m}L;(R?Z$SyivtLP6W;a@5f>9I{P^vboYZ+Jk%S!T4 zyCNp~1E~1ac$FpS^4E*NNh$~^kIxOVO<3g*FT9^GcYs@BLN6g*nkl)v1kp>BuVP+s zkz8|F9zbT(VAs19X{;!yMN*RKZNJw#HRo+p7WcnV5oixNfsF~R>=Qd^6Jxc5Fh?fz zMihSdyz7|_;{S?6@Z+~k$;?Xb>TcnxK{()!_}}4hYUh6*4JY67e>}*iw*EU^BC7&C z`(=gKsV-x{-|OG;qeI=C2r6 zSV6o0TEnML2OXK-*c##k0OA!~$ot>2=P=3Q6un@-cXO0s5>uRS!KY7Wo<7eT{f!;EcV8VQsg5FF3q^q4FI^}Q1of1+@S!T0Bec^=|C zMkZ#St_%{9`ReJ zTfAlypR#_w`ssQz0_PVm$^YV=6hkReVzCwY_6U5p%(zF(W^j#K#(Yu^eEKBnFl4K) zkVvAi0#O+qtUmauu0r|rsh<8Fh>PAa9uQiM=*gMx)B565EE!NN`AwDzxN?ycl%JWi z>vNr%a?(3d22Q&;tbx@v>IX(SCjOYLXXZosLkXbL!a@E0=t}>NpLY76ybz4?R`)>a z^}l|vKN{Hi-=>4{H~sG+J|D!Lq#LH!!8irQ467?g5r|X!W~+8F$*;#Ta2E=i(Bd?~ zu)BT;U%sVYQeK)o<5#Cu)Pt>{Jhsv~XxVbDWqQDP!gn2Qyw+K^}V8>OlUG}hR`yq+I{#?qnqrq6%86;zL27t{dFJI-5+gs z+=5@BY@w`Guq5#uh1*d1FN&|951BG;E)~Yk3K7B>s@R;ghrg81&a|Oz4_sqL2Y8K- zU9Jt3ZqAGy`||mVr;^{eH_=!EHP)7~j7o6NuU@~oe0#qj?*rP0BKyW;uNyK)FnXOP z+bfJI)5XY^P_*KjnD-TCKzkbT`su=~WWof2;(36wPic|lI zwpVCgzQ$L7@q78MR;j1#kpV-P&~_i?N0q|yy~{{y z8}IHW-1<#U>qjN>N`ZG$dEFHoXD|v%H#{=HWD+fE&~Tr~N3y@_n;tM|u#?f;!PyoB zYYeJ;mP{rQT#9T*Btv05-*SY<0tB-TQM!q9oUYi2sDLq7rO4uoTXv&#<1nZ0*s>Cp z1`PA12$}fq&U#QR!tXW}gULLtGl$7^K;`I$<+7BM zZb9}N>DCvNZq%+(J&BPIP1h`tqFfWl9Z>vKN@7C}m+v^mug)vLDe*fVd2eFbDd$bb zaSn?o?-C=wS$`YaUIua=@t`K5lHR$r`eaN~S7xAb>(5*=R+B`RP;{qR2~2XZ%cG`Y z@u|{vMCW*h+*B7KVaGol0Ffv`oQvG#YxL^;8eCtTzkCK%K930S(AIR0MJHLys=t}Z zfCFGe2$T=i2}Qtj_VF0GN>J>_;s}8^)gviNKt(`W`IE=>?e>#@x4(n@o1^Vt<T`6>ol?HIViQdsV-7HZgs9}(l^>gX zi%7Uc(KB9L^FG`bv~$U@f$-?O-UaU;SPCwti0~C8d|E_+mJIj3%bC=IMn7 z=OS4Xit?Z0oY3E5y8KzRv~)4g3)OAU%<3AYvanDWi-K#8C!8ZuzCpR`DM2s~mtqet zes!K_S8?&tkY7IEx9O&sx7B_)1Hb?69#QGt2S9ymk3{=Z9I9Tct1YQ46II$2_TvWb z*hLOQbcynq%L<%E{3Wf$^GX8`|1Mkj{yd2x5yD#g`uVz1iX&7MQ~C7iK>z;v(BYgby?g->J@3Nps=q%UD#aO2@M3$N zI3+ZPu?&;(KD-aS3Chca2-??{u)i7c{|9{9+W$Fip96M>{okLCD)k@x{craF zgM7GS^O9d@D-3>B=fE)d8<_jt^Q)EUC@#h(=51m3Z3?UQL=pRFmW(jfflOZOlNa)8 zwtC*u*ySsY1q_h~R^~O3zlpayZ4WO*=>YVey?vZBRa*qmtAjP|hW7_`Ypv*q)>+<* z?}|Hz_5hiIRoY?Phw`jdzbE*(66I4q)I7;%rv2CJTmq>*Mpl2-d>!H$Y0OE&BbNq1gCt;2(J=Uy^ZMyYHZ8*RB^qf{O1QH z_gw#bIGI-BKL?|4^&cPPBji7yRv;=3#yABDUc_NDsV|Stiu*QM9 zkApxn7kZ%bqVzL!W-_8mB}#E`-!1_qo{wp*h`7;!eW)g@<8O9e?7T|lLAzdmsveiJD`Tc+Uo2l z?17ukU`c8A9MQADHEVWjrA=f!?)6WbK=mvWcW5f1!#)5cTq36Mlpr{==d`Pm>$o}vV93pchljcgfr z9gRT!uqyCO}%=G5lFpbA5v*_Yfa$qW&sezcn5JZ=Dx!(3WlPH%|wx`|?Gu zH_U+=8b^6;@a#!xr5^J|$T1z-4h8gwp2(uOCL}UK2t;~iI0q(`08Byg6s6RBvZ8$n zp$2rf0?j0!>p4a?x5p{cK?I%PQ1}9@Tb9-h%QB!^B;zwk(x^7>RqD4cyE_g@G#Kg< z1(0E8;#*rNq60b3;DS4{MML}79Z-G3)!x`Y>@L1&6f^W6X>LLz5Z<5OL~_F>q(#`b zF*QoZ*o3r_;m&x=)u75rd|~mX<+`dc4SVio9EH=?#ra!azNtRlHBB`W_3d=xem?u` z|7{&WJNEz4cxuQ04MyY9xBdSiKHUGad;f3b3o6c)E&sI=i26?NR{#o&s{GmG>ei)X zDYosMU56t!cr6K(GPXD2E0v^lS9JV$70tpV^?gieoG!SaH^toX58ym`2e$-dIhvy! zz!aFx<9U%thag&Hf49keQipO!&F$kKz-zih`Ma1PAjsfF;Ssp}^+LGnEwpwIQ&%-| zYkzsnod~{{xT;e1%V_<3Y*or`GAmwuht+F8seP_gaSq%EL6#!w!)*`n9OuHTSVz## zH(W|-d7VSOOn)ua65+H9*`Gy-Xo1l@q)`4bYi)r5tunfO8t3NvQokDMmrPAh2em>` zysmf(%fq|^Tp(Ho4(+)f1Bw5EUdF4~KGky~DH^-*@UN=vnblo~M{`siNt{>Lix|z~ zx=?WFYa%ZC1V+Z>@9^yJD5Ql*E3W$$T&y+VXL(4Z_tHf%x6>G_D>gQemjJw&8zS1VHZF) z%7q!gznp38=!nyq_*LWDg=wXlR9^+QOzG(5#n8gYmHc7tq{ZXf-lCC4Br= z)|!4HOHDVj1a|2E<8j~C|3}0AxBNd3@^R#URCgH(fJ}pr@T#az&b?45CF`773skKP z0$`Y9LcltUINzWsrbOwLoVmRA!;VVktx_;O}x_9!L-Y zQ0Jstz`6pjn-iVR0nB2VBIpck`UiJ$8l3@g3F%;kD2yP5Oiqd_LfX-$r2?udLynsW zV$+iN!yH9K^eUQVIoiZ{E#jmwzFTJ?*z^Ms2m-ABkqm}qCpn-%iInf6*(D@Io{*~_ zbBw9^v*?aeJT(f+gL4V#33v>Ijioi~viA!TI*K&{a0otv*<=)SIeV)B^N~SmXkH)pcdW$b zdehi~*LfnxqBw5-BRM-h{?q2{Pn-Y!r%gv=ACn+YR9hLu!kYt4;^hBmfd~m9>1jcEGbIJsnMLL&doKn9)tA*=> z*&f{AqgiM{;y;l;5^=?gkFkRX?q`%3uFh)9=F&lgc<=xONZ>9Kg+)?Mcb2sl?V5Um(;4;+m19|8|s zxeh!H7VVzMJRQ4tgdtvK38Kiv^-mP}?Z{_~(j@&$i7SmRmpS(@c@ovu{!`aPU!*Z@ zdJMGd{>NZaiT{}PzTN+LkdMRuQ}$hkBce*tsk_0T;D#+&!VLltL@0q<6ahAl4b8mD zUE|hPUI`)4&Wy^84F!D1$x->V!?2fGW&^3=9DKlA^$sbN9vk z6{eRtA}FQ*Hd6NM{p>IQn>zq^`TvHaO8uAd_}l%D2l;$m{y$@5*xLnYZ4M20hlg|o z-iHscnfotWdf`MT^s z&Rw5l`f&hGt51ObXBm7P`{&zyC72y%Uo?Bcjh3^r*l5rTtij;_76SF&j6)8#&VVx; z>@c#b(DpH_94PC|r5*MThoNi=Z)IZ4xPAJk zo%#PKgG&Ct-naZu5A)&o|2OgKOxyv96U3zXlNB45aEZ>uWiXz}?%)d1b)EtU2%b}r z;s~9q%&BGFfCER)eT{e6TcpbX6ls+1&^7?UPp@AGWqzc`JV##eKYNeDHNQrF06<4x&_ij6)XD4$(s23g zeU>AUW?Mh8RYlplMgnN|!5LGfaef9~q}tD-n`f2mEiyBrcx*x{YH&Ks!c}gYyhHI~ zNzXvvkki&YE@2*h);ux*Uv?e^2KI`&n$mn4^(?_RC|6f&I{!*@Su=Z|F>%G5vBe&M zK&+N8GJ}CxuL}JE)WtQ9Q@;?_OlovBfZ9bNbd4=XX3VHIlvWk&fHw?8m-ky zu_=<(3S?>ySIJBd;#Bz~47thVnH)8T=b{2xB|!gACT`6EQ3YaJ?qm128jW4;pR*dv zZSUb$WBU!Z<6d?5x8^D(Xd5lK&tGni#kS{CYrN1bl+{Jna)~urU^PqX-d5AYs2T#( zJ!l%*UU+|shPI@4=@}1g|24M%d7x%{+yDP+lK;OywCn%%r~PmC|3iG5+5ft1pi2a@ zoEbwRco#@fQdt0!WB7jocr2@$@~>AIQ|%-h(q)(8E?pwg8U%|3&tSs0%^Cq4P5KpjT0hQ$i7p4r`_(E1O%BQb=I$y!4O! z&jyF(tf@xgdy^?NsJh1yL~L(?l+B?u#9?{TNot0vGPd_VSh{Msdw?AD+{@O{SpG|u z?F-2N-gs!||L^xF-_HLZb$z+~kP;|!f#M3NMPn63YICG4euRQK5|Gv13f9QVu zD+-`%y#C+8JdM-EJ|2Kw{@>nkWUv46xc6=SKg6fS`u|OE0Dv>RreICj-#Jba_CJM- zx`kgbk8FPf7d7tRD~xH~8h1j|m2`eYX!~$Kf*dW-`=8=80zoJLpZ|&e{M|>ggoE+q zOr%f#?fmN1i&xLjz*X5R5Fv^}iX!m%!v~;yk7XVZk?`a22xMHfVYsDej71)In&Whl zY(b6~`AjH9fMNhQIF72LNI=Yw-*OzSMJ+~@ZsHuLE0ogi!Jp%Fj=_@BjGP@GM>r(i zSxi&7in}3R9hX)8kC*sehvMTkm)R7iQAc9wFf1Ldr5@D#bqJ+zp9lN6O>vG69)SzarQp|#YY@dbIp{88dd&Y7=6@jzW6SjUxn)Me`j0{h+%cA&$`Tzk&dDt^bRk&tE-%_VV@f?kc(u z9QEseJec;a`2YTB`mO%Y!+airizQ4KD8Y-r%<{h;931=w@)P|hQrqgBbWgj3QSjHl z9K*jJJbLs9{BAt>+he7TEMmG`&$u2!^EHw@1+$DZRt9r)tiL(zcDn|oL-2Ue8}vK< zL8pIuc))Nm>ez}s_(5JR1(7)O6?aqMdL{&+HNL{3b|8j)kx{_ya? z*XN+fLi z{`Rf@4xIgMI>+Yl%;WcRD0op@F&_Pv{;AdHp5EudetqtrwCi*K#NX%ssi)8V)4ltAV)nUz>g=;*WT{R8f>#Jc z@tj{gqC9sFSm(+2gs*y)saai)_jc#R*PUi#W_5=mLOa9musgN7bfR~u@0-SQ-sFVx z>Fc!=)4duo-JkmU+YE_o`X*Lir&?cowwR{*R+{k;5XA2YA&{dKZ+J3=95daL4M3SW zmF6%`y&anPIyBk4Lu0E$6K99~lgDOlbkc6ojZW$o-PqU3@!p*rS)Cl~ot!r8+1>t061r$F}iQXq>_u?&g6u0-~RUcuy3?e^B}EXD5BCc~VZ_TuNui^O}B z9-cw>DWH4lpX^0T_0%=bUIWc@e~ISlpikr6Tj8`e^itjIcZR)&9o$RGdOGM+&i2;L zEY)nRb#QQMyFEmSWM0x1K&DB<72@%{ISO;cx{l`{L^&#Lox6V zg-?as+wWz$y+-;_*rr7WX}DC{gfak=IK4w&^UvqB+TUko(mT}Y^?EE!-W;AZ8!a^< z!;?{si^Auj*xPQf{1eU&$_bGI-3~tk3&w>a-~>e=#CeWFnrvn7+iBXvlR8b?x4rJ$ zd&?u$*L&}E&e+r2Y;P|+*z$XAFr~SrX6V zkRMqQFwgM{{3y=bMc1e8HsRsaYZIS%=JsUYxjixG_QagqensjM%oGp&PS`vm1Sn1y zAWi{6`6dpT6_nKYo=!ZIce3x~P0h(WF()=!@lIf89hF`@7d@lcYYcs5wVG)m-z$}NSD!K9t)H=KA?zo~}- zru#C$q&qgpz|8=Kc+%~0i#MW34#f&);&PCQ5SWaMVtn9ge)}?8KuzP4?BECZ>d* z7}`_6p|@frSQa%!es|dDV%J1Fr_@Z6~{NC8hx0+cvXbg z@>Q5^!tbTX8MfSwhTh$1;*rFYeI@bOG{Pr_B-X}36SvAe-1^LxvB#ty?`u+z zO_O?TnAH7Ig)h0+7pybDZ^U%BaFvKDX=zFhxhd)6^Oh$1P?+cirL?lexyRCdel+gx zd3-cBH{o%2qK{=og=SMPj^)p@O!T|gQp4zZHH@)mD;@8P94UQK1}*~rKH zZscQgBOeuwDF)-DolqE@)CdLlra#_y z(;u6g{@B>`9fQF{9*iQM5ep^&CNU%giG82D5D-{mLU}x_J~m<;+HDGh6R+QP?Ai3k z`)>LpdmMVsaZoEaPAR{&ApIuj^4AM7{p{QJ=Sy>7^nsw;3=ugTEv4UyR~H<4hGVqv za15Itd{GQUGFR*F2cVN@d z3Tztcfld8Ruc5ziFlpxy9Zb9q(V;KgX}D*&6Mu7Rb@D{-WWxieLCet0fj=~J=!+i0bp~GRT;8`j)(TnmnWXHg5Vt5^AVS#)O{T-?d^8cG(eeaxV8&D! zL3I3{*kk_Fp#VN?xuk}5OUkWd5BHAE8d|YgLp?UDZm6v#HEhXG!#aL)Yq`VEjm_#= z9UbW%?ODr8q;wOWTee#oi5ZR?U(N!S|}k-fk@84N2uR&g!*+OfM(O*HQHH)Ks^OkdRP4=DYj}G4@Jy|_{(shlf-J|II6^?) zwicZamn$5BIgG_|8eCJHp?npKItpSW#_cSc{@82L3_Sr{!+is|hFwd6J=KSy>aS*& z-3I1NrbxCB77fi2TqSXeKr{pEJRtxsydm8~Pejyk--swH7=NfmM9E&b$?$2Bdn=Ka z4mouWX0hay%Rt-B)_J1J4Jt`HYG(lUM_vPP=<$RO_w|GhyOzeND~$f@JC!>SLVaVM zZRzpv`#t_ck7snauV-}FwRARJW%J+LvG&cD{`0;+6l>`5OAhz-OAbxH`8uiiXX|@aY5ls{Odr}7bPDicOb2R$qX!v5$ z`<~J0?>id3ZhvUf(Q86S&u7>5_O|PKmR;A=?7H5m2=Mig;$APky^WflWz_UEqh<#w z?&<06t#bEFmAj{@-1U^WRo>oyDzEfQ^i9pBSL(ftmJ=^6ZpF2?uj1M>71v&=xH2*( zUNYQ@Yj0o0wPz}>y;5XmvBBg1D+^gMb{ zZ$CY#;M0*w%diX>~pSQ^=&Tc?WSeQ zNOp0nc(4yOQ)}N7kTg=t;2w364c;NZqxNlQ1woYX%bntmHh!1#tD9Qv{^@Be`|R}8 zW1dZY+wOGlZFg#IyHk7HbwoM2OtjN>=g+6Ur5mt;IROhqfe3?jhKvYQKI->czWmLeMZLa&D|sN&^_{r;_v_^=881jgCc$?I zL^%DP@&kj%TSN~5UQ>YQGKH15OD;(;-CL=dno7;oR%$9eV(%x2BA)$_Uu|5cYl5Pp zciewptT>dyS%QGkVvch*9=;yBl%?su%F@(SP^OliROz1V6HYv_<=V|n*$vt5n1p$p zx&7l)kG?bASKpbM`p(qScN~)@4k|WTYDez)=yfSZ(|r}Asi_!EEyak_>n6kH0pq{# zOUB3~V_Y|EQue?!#gtzcdKnWcIGkTU5nshJX3{9jafk?Gbsjzy6UO_Ieh1-n+A6cp z>C}_hXX?=zr~B%RQ&VT0S~_Dx=iq6(@PJbh9bmYWvpB82EGLc*Pnzyv~{Gsr@S7zd~~;F5CSekG5sKy##LA z?oYAWFpFeEVwn-97?3zZA?t*gk5=I!r(;ia$kb!wO!u{MrlyTEwQQW~U@qYX@r{&e zLXd}5UP8Jo^0bKkbsi^3)xzVK#f#mU4@NslFdjN{W8~}foV>y*PgYH_CWGv7SE?>n z^2lXtV%ixP;~E3Qr|a#d>P@=+kv%iIs@E%mHFP$;LWJh)kcy-ioY~_v7NOi)fNVKb zB`Zg<+V$Gq=Q{OW=Mp_|jEQ)#=b)HT69SZTSc)wQ=alumxITP$LOPIkmRN>Mh+$$K zZdOCn z_3ZrVFVF5N`EP^z597hW&i^~=kH6*reTdH^@Ir>|^LpL~Kdn;{mzKn{9OhfTv)<%u zbRi?Ub~U(;`Lz#_VD6w`n{xRSoM)L(o#ppA<~t(yv)BKk4>5y<6V&sV2=14nBgbvOL5`UV#>T1izx3 zX{X@h!N-pF`Dpyd{^Af{6xXwOKlm^m9PqU3F#!<#jFJ_2DThVeRxImQ-2D9F8eIH* zesu$0T!UAyZ@@3l&R^Yto7dpSXW+%F>znhJFP}XHPhVU;ySRDzUmWALxSx4&&;ggC zghjYS;T=~@fB$10hj$&eL?~FS;|P&bG?ntGi}S_t3Z`qA9RI)kjcfMCp9a0>{GH=o zzw{ zuaihv)iEX95pjpMU9ruSi3&oPf|>BlcY&muSu`4*Oq9CbSP>Hk~;z$VL+{Ul_;tVR39#PQ2MuTT;X23cU znjnhX>tTop5hX#o;00|!;7>RgKC(ESUa|^oU>-A^;tWJb#~IcO{$)%U z#nK^EFpKoOXx&umhY~KLGL6()wKs*|jnOZ?&GUGngpa!eiT7j|ImS1z1DVrdZ!raSuef=|IIX~vExQs326j9aBZi9dg;T3$xAt-1KA^ivm znv5Lq#Dfk>*_)9Kx(j~ewS+KTY7@uoUV`WmALm>W#0U{-tFj!0DB{(bn~-)bPTQ)a zJ$oM$eoaW8$H|Fjzt|&iqihC%-e>#(Cg!%rj3;R&jFHuXN8mP&-sS|})<~vqoGx-i zNQ1QqQy?2_UQAmk`OwIV#SSz~wbii{N!;2ad5816I9)uAb90c71AS*=Fl9>+#koAW zmTMAcC`FOHL!u$(mIVPXM9n^apGI&6%rfz^+Uw z#Cd_qmgPF+dy?b@u9kAVc(0)p&vLw?Fi!4)RSHlVs}#ybf)_%`B+HoRo9B9Ng74z? zY@!ggVv~ZpU2LL3-;YfSOg5Y7knf323S2GOqdR}lD9 zoFJ1U1Gxf%GqwR91?q$_I17$9S$eGA4a!H%k_*lP1}iuUQp`6G^*$933oxAHFQvf< zWv0>iA4miPs9_VF#g8F{5~1u*#sa@yzUunB(=E<4&Arwjo)PieG7gub$fD#e_NFrF zW^$`E4K^PxY0PT)_-JU`yI>ZhJ&YozwF(B9p*iCTn)8+v3+!TLLAva6<}7`w)*581 zO=gg&kn0vY?F9pmXKE)C*xG0)4kV@bB*eZvtxO?vh>y}pK`DbMi485zb_46K3CdI9 z^|qzhMb0#O8pDLh)AE#ImHlO?uBCqZn6DLH5upPQMNv?h20)eQG{HB zyW!bT2LD@D9v}5i$HUVRoXsFQ?M>0?Xx5((=FtERA~Xp{^Fgl<$FtLEZ#13`2cuyK zPtdGCiDoBZG@FL?)Nt&KqTHdQyxyQZXWJOJw^$2h8Y-KsTooM1nqm^dMD(PX*uN+i z{wou8Q3N3P8Rzjo*t-d{dce7SQNk%L%UUMUJvV+vv4HKzEV@PN<`^4I3$D?CH$dz{ z=H#J4x2Je$Hs}uraCS0+)5&aldK!iB^mH7a_M#D*ji;0GygwXFrla1;e0n+_kNPtd zPNu#2d@u+@G(2fQmSQBPtTCIVmX~Cs$K-GaN0o6|9v-+*YG|3qT=SA}jh1bqUB-8s zcU!fT%BdU%iZXE0pfc}Q`e+b>QCJ=(%0p$Ki8fzn=jHlk}4y+ z6Kn)2biga$;thBhWJ)bZy$lG9JQVLV4hbkjkx3I`Wn%p*xi7_o9X+QxP7;*w7|NQ~ zPIZghqgpyf4Y*X4%Vd?uD)$aS^f-cOg;Rp4jnVI2lM$G*cdEVpzIT}14V(0;ENQS$ zhjPT@Y8gpPRrm;Q`wYjcHBYvR=O98PX2xHJBT{{N6O$OHKgWa#z?bogJG&*IA$Kwh z_}BarglG+xqB%%JdkZG!F%NHez*skfIgN#g*Th~LCu$(HPJ%1_RiM3Ehk>l~1@b{J zN7Dkng71NRvkv$=g&P(i?$%tT`EpiwkP`t*B_ooGJa>P{P zI8rtOQ%J8=k)_8{W*>4Vl|iL&0$j^UxJFJuuhXX}K@?SAFF|*~Q_i9c1Q6Bvxu>DB zf*jg*(Tl*-d9TW?rK&Ag2+j?z;`q67e*rT%i<6kf$XdbyjH2M|_rDzlQI0eA7hlvD zJ z&_swBYB`g^+3(_Ea2D{4l)+KJnJ+jC`oX8a9R&ozJX|7D%!@jB15aOFvsq!?AxDKy zsY0$qeoKJ{tl$>ph~Q*{KuQvf@79^}?Bi5~^=n=Yg6KMv+#99Dp@_=0`cy?3Pz-{L zWKAf_e~NQL0}#)-o8?t;i~#s9&6knU^tYHUe-(P$D)dXvl<0gmPN zFD}N4)J)RL;P>yARdrffoARxWJTZyW#j*4YbYLbfez2+T$cD#{gy)=@r*w(b&xf*) zE-%q9Fizcccfn0XX}aduca*F+1Lud}=D*Lto0|*p;~}^_zrOzM=^6O`!w1m4lIhiX zjNhkE--C;?0so+M^HYvj@*4o%u9^$}du4l94{x%>rzfCv!-G)d`_49t1kYg7ov)LG zEsjDhuh}k8O5+^yXlkaWGfQ4=pAuS3q!6kyjoz#YLYM-qnkeBUs$doedXjVwnXxp_ zj*P12>l=cM=Tg^{wVzN*^H}_PjA(ewS`yF!E0|@BtQVK8b&iO9l|ARO=JRt`ddu>1`xdW7mfk|@Pz-K8;^MYI zS@G7%xjIi0{7(5Qxl0$lXDc$Mo;Kdp+Y~R_wz2VsvRc*o z`c5m8F`#UWb{d*x!+q_{6^zsG6`Zb4YL`8dcE?ZgdldZ=M^S>_!5k5X8Bz#sth6YY zZVRJ(#om>#x>2;U35(IRVa=8jcttzptluqJ1S(hKvD=Pc{_sWYA?SQaayHe<(38F zP^?@V|H6`>(&b%Bkl`p5+vs}E)Sn&0UO^;cvbT=S;1{M8@VA9_CE6*eEsodXRFnfG zM{NDD{}2tk-R@x*yx@9Rjuysn%5ffbO+D7K;8)LuWTWmnciB^+>7wBr4O4(1*~;)Nu1>L~0p9UAi#Jy%h|=#UQ9Sv)V(gGKkH8q-6l|9%!BOGU=708!Ot)*0xR9El#o2i@Ok3kyK8v zI1^EIcs1^gqv2@SL(w$sN2B2!Mg5a#7WMnn>1;Yd;cPMwhto;FKb(c5el#3Ka4_tJ zquv0HPR8S11SuOp8fe8(?yv;R<}P_q0op~%$}q(m+n;c*Qd-DHd`@DygIHkNtK?Sa zDj-V(s5NOgLf5K}vd8HlBNu8Jzd=BW4rae|TopnQCNXzlI+uWfro{@7?{x(5X1FW( zb}WWjIE3TLY!LQO$8a(d1+{8jNSB z;pk*G>@}lGEeXR1yK6z{jX!UDYzMJ|$ z%lily35-`R`|#ZN}pNr{PNce)7sKxm4l!;&O=l& z4n)8ff2NM}c@{SgoumDYX$q+bf#-UPa^dAloAn^%rwEncM%nw{xO!uR4$5d*X$+XE zLf3Gj-yZ*kk@gnP-_j*|D_;ET?NQ;Sq8NPN`CguS5FPq#P0jh#?htr~?w<90fzpdD zM=;`na1O3i%RQd!ovMU^0tTbQlyxr_692>Egwxa0=W!8*48_FYc~J~QbtXrDtP!C_ zkF+&GclFIEdgL-vB`(pxO!QO0elh3XPsRwH+anNdQ@DylakG=eIF$ukRH%~iLQx0i z_Q;4;DPBgo!^I<~P=`eD3W?ey*3PQ3M`qs1Nx{5G=9N?5v$81Vk^J-L%Oj9&!XtoI z8QngO^CM|p9+if_lTB!d%(o^r0 z7^vzdwAzZcofXWgI=;5~mE$PKTtwU}vA3IoFD+a-({$t{H(?CHWgf23p#57ggx;SA zoQbXgz@U2Lss($A+4xoBW9|9CwmKygqWf4TwUtMHI%)hwFhZL~3{r?BF|(4AeF%A^ z>Js}Y^4&*?&}NToD76@>9{+#h4HPG(?gbYFp7kcT!JVs(Gc-)re130L7jOM^I2MZX z{#xsVlhA6F6i5i7ms+}X$C^A>UU#mn=(*L!QFXY)?^2QEnb(bTq7s{NW9Gju3u-^i z8Yt;27**2nMHYku-PgS?G=jf|<)M-D#aD@j%Umo4gWUU)5gKYMMN?)!aO)E$ysoqy ze!<+Tl_9;;>68ZQEDKClik-=750gl^oG3 zeH5+y*Ms(+b1tpWD#IdkgB&*(Zr2Q|iTaABk(2t>PNJxx>kq*D%GRzV_v>H0iqNll z;`6olmibpW@A*3Y7g_O=*spc!Kl`4_Jzg%!aCE-=ilNzR&#Q$hbxww(m%dwn42pSw zuku#=D}Wk^YkwAm+YiB5t~Ua4_nfhNE8pq&JFSe;kJMlL4CcrUMwx=dd@Mz!3JMa5kR~;H1~D-g&Q3RYXbT zG3KkOE|ONZ#53eoaxU3ZYbraPCVpfJ$sOO_SHN{YQu`#p&_C`E*Hm=P88zj%JV zb=DE2DaSMa(pAlU1iw_zGY91kI9+u-=CJje=dJMkC7-Y$L5-pj<9N~4r92wDw2fo$So9sTQN6h{8r$t%&sq>FL4qP1xwxj zl6r{+)zuICbT+uTxMbs3RM!;4$D8r=k13|o*Hs*KRpzE(VBZK`p$NuJn6rR%zuZ}X zt*~c_un~WjJ@pU5!*Xbe_MTbP9J71lQ5&qYD_?|5rEv8P(Y1WMgF_{h`{hpww8EVV zStH&gMh6^F9+WQ?(tGAgeWdPK!TjdA=^1|*FPQ?8d?fZ{$8ma5H3|2QR zpVeEpReMuMv zI8`hx0mmZM5%FAg5~RwMizxS5merg1#RgEk3yOpZ>h!fT%x?%PbchUR>qN*K*}k|M zDK|;J2MUZ`@FN0{UwPziNy-a$XnB6v&VbzKB&&O`lL+t&g**&l6O&lp zREOzyhNG=Ou4Yj??U#u<=W!zU(3zezCKajgYGJgzan0fGxNhyeZ7qrL-L@8-=)G#~?*gVcVd#Q)dqkDH6jTRz>lZ=PP>c7d?z*bmaW%iy~dKyY($Sug^7 zx zWqN;I{&8c~#}(!=lUo34Cr&%$U=>Hp6+?^^;CtjK*s*F9{DupM`0u?In^56KDB9Xk zs@GSfLjK~?I8N53q|8-E&SbdjVe$X-(p*LNq(?C=x2U1c?9#$hxyF&#vk=^5Wu`_OJu9_?T_x35HRpu+@$;9CbGR z<3~k~h{L~CI<#W;-~#!=HBGgRdlDg)W+R^nS&^gs#niyRCptDDu@yBM-sLf+DD6H# z-#h)9-g{H5y+|XrJt45f@0xe7TtCV(j9htBZ<+NY_xhh;lFVRucY|Nz1$mu5%X6IH zKJ38YL}~}syat83$}1u0EkCy$0*A;;ACyq#u`0zGPVi!ToiUT~qNv1BB~O)Y@V&85 z?FKb=e8|MODexV_;djd75b7jY1n=-$oHs>!7e}H+&oxjhLGPKKLHAb6F&n2*yosYV zOqfY>CuA2ADQgIYMWMf8c((fYCl(YiOB8Cws5p?W*2Yn#Oc7} z2#x6Wx`W=J-#hJ(lv{h)kKk#)KNwHpbOOVZ!SrO-L!-%H9t|Sc8=w=2U^pC|!uc?q z58!w(Jq<^*@bq*(?$1wlQzrb{|IW3s|4;b1>VGRg+r1S3-dX><*BecHcKz?+u=lP0 z_d|R-ozB5Bj?mcw03ASa$P3;dJSu&b%+%S$=-t7=Uy?Yz1IrxEp9Jnw{l{ + +### [pgadmin-5.0.6](https://github.com/truecharts/apps/compare/pgadmin-5.0.5...pgadmin-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [pgadmin-5.0.5](https://github.com/truecharts/apps/compare/pgadmin-5.0.4...pgadmin-5.0.5) (2021-12-19) @@ -87,13 +97,3 @@ -### [pgadmin-4.0.18](https://github.com/truecharts/apps/compare/pgadmin-4.0.17...pgadmin-4.0.18) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [pgadmin-4.0.17](https://github.com/truecharts/apps/compare/pgadmin-4.0.16...pgadmin-4.0.17) (2021-12-04) diff --git a/stable/pihole/4.0.27/CONFIG.md b/stable/pgadmin/5.0.6/CONFIG.md similarity index 100% rename from stable/pihole/4.0.27/CONFIG.md rename to stable/pgadmin/5.0.6/CONFIG.md diff --git a/stable/pgadmin/5.0.6/Chart.lock b/stable/pgadmin/5.0.6/Chart.lock new file mode 100644 index 00000000000..35faf820e67 --- /dev/null +++ b/stable/pgadmin/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:29:25.006698598Z" diff --git a/stable/pgadmin/5.0.5/Chart.yaml b/stable/pgadmin/5.0.6/Chart.yaml similarity index 97% rename from stable/pgadmin/5.0.5/Chart.yaml rename to stable/pgadmin/5.0.6/Chart.yaml index 295b30bb3b6..20b26f5ad3b 100644 --- a/stable/pgadmin/5.0.5/Chart.yaml +++ b/stable/pgadmin/5.0.6/Chart.yaml @@ -21,7 +21,7 @@ name: pgadmin sources: - https://www.pgadmin.org/ type: application -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - management diff --git a/stable/pgadmin/5.0.5/README.md b/stable/pgadmin/5.0.6/README.md similarity index 100% rename from stable/pgadmin/5.0.5/README.md rename to stable/pgadmin/5.0.6/README.md diff --git a/stable/pgadmin/5.0.5/app-readme.md b/stable/pgadmin/5.0.6/app-readme.md similarity index 100% rename from stable/pgadmin/5.0.5/app-readme.md rename to stable/pgadmin/5.0.6/app-readme.md diff --git a/stable/pihole/4.0.27/charts/common-8.9.24.tgz b/stable/pgadmin/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/pihole/4.0.27/charts/common-8.9.24.tgz rename to stable/pgadmin/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/pgadmin/5.0.5/helm-values.md b/stable/pgadmin/5.0.6/helm-values.md similarity index 100% rename from stable/pgadmin/5.0.5/helm-values.md rename to stable/pgadmin/5.0.6/helm-values.md diff --git a/stable/pgadmin/5.0.5/ix_values.yaml b/stable/pgadmin/5.0.6/ix_values.yaml similarity index 100% rename from stable/pgadmin/5.0.5/ix_values.yaml rename to stable/pgadmin/5.0.6/ix_values.yaml diff --git a/stable/pgadmin/5.0.5/questions.yaml b/stable/pgadmin/5.0.6/questions.yaml similarity index 99% rename from stable/pgadmin/5.0.5/questions.yaml rename to stable/pgadmin/5.0.6/questions.yaml index 08ab8ca3f6b..47a17b030dc 100644 --- a/stable/pgadmin/5.0.5/questions.yaml +++ b/stable/pgadmin/5.0.6/questions.yaml @@ -369,7 +369,6 @@ questions: schema: type: int default: 10024 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/pgadmin/5.0.5/security.md b/stable/pgadmin/5.0.6/security.md similarity index 100% rename from stable/pgadmin/5.0.5/security.md rename to stable/pgadmin/5.0.6/security.md diff --git a/stable/phpldapadmin/4.0.25/templates/common.yaml b/stable/pgadmin/5.0.6/templates/common.yaml similarity index 100% rename from stable/phpldapadmin/4.0.25/templates/common.yaml rename to stable/pgadmin/5.0.6/templates/common.yaml diff --git a/stable/pihole/4.0.27/values.yaml b/stable/pgadmin/5.0.6/values.yaml similarity index 100% rename from stable/pihole/4.0.27/values.yaml rename to stable/pgadmin/5.0.6/values.yaml diff --git a/stable/photoprism/7.0.7/Chart.lock b/stable/photoprism/7.0.7/Chart.lock deleted file mode 100644 index b5f9f43fa54..00000000000 --- a/stable/photoprism/7.0.7/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:42:56.279314395Z" diff --git a/stable/photoprism/7.0.7/questions.yaml b/stable/photoprism/7.0.7/questions.yaml deleted file mode 100644 index bccef615590..00000000000 --- a/stable/photoprism/7.0.7/questions.yaml +++ /dev/null @@ -1,1912 +0,0 @@ -groups: - - name: "Container Image" - description: "Image to be used for container" - - name: "Controller" - description: "Configure workload deployment" - - name: "Container Configuration" - description: "additional container configuration" - - name: "App Configuration" - description: "App specific config options" - - name: "Networking and Services" - description: "Configure Network and Services for container" - - name: "Storage and Persistence" - description: "Persist and share data that is separate from the container" - - name: "Ingress" - description: "Ingress Configuration" - - name: "Security and Permissions" - description: "Configure security context and permissions" - - name: "Resources and Devices" - description: "Specify resources/devices to be allocated to workload" - - name: "Middlewares" - description: "Traefik Middlewares" - - name: "Metrics" - description: "Metrics" - - name: "Addons" - description: "Addon Configuration" - - name: "Advanced" - description: "Advanced Configuration" -portals: - web_portal: - protocols: - - "$kubernetes-resource_configmap_portal_protocol" - host: - - "$kubernetes-resource_configmap_portal_host" - ports: - - "$kubernetes-resource_configmap_portal_port" -questions: - - variable: portal - group: "Container Image" - label: "Configure Portal Button" - schema: - type: dict - hidden: true - attrs: - - variable: enabled - label: "Enable" - description: "enable the portal button" - schema: - hidden: true - editable: false - type: boolean - default: true - - variable: global - label: "global settings" - group: "Controller" - schema: - type: dict - hidden: true - attrs: - - variable: isSCALE - label: "flag this is SCALE" - schema: - type: boolean - default: true - hidden: true - - variable: controller - group: "Controller" - label: "" - schema: - type: dict - attrs: - - variable: advanced - label: "Show Advanced Controller Settings" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: type - description: "Please specify type of workload to deploy" - label: "(Advanced) Controller Type" - schema: - type: string - default: "deployment" - required: true - enum: - - value: "deployment" - description: "Deployment" - - value: "statefulset" - description: "Statefulset" - - value: "daemonset" - description: "Daemonset" - - variable: replicas - description: "Number of desired pod replicas" - label: "Desired Replicas" - schema: - type: int - default: 1 - required: true - - variable: strategy - description: "Please specify type of workload to deploy" - label: "(Advanced) Update Strategy" - schema: - type: string - default: "Recreate" - required: true - enum: - - value: "Recreate" - description: "Recreate: Kill existing pods before creating new ones" - - value: "RollingUpdate" - description: "RollingUpdate: Create new pods and then kill old ones" - - value: "OnDelete" - description: "(Legacy) OnDelete: ignore .spec.template changes" - - variable: expert - label: "Show Expert Configuration Options" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: extraArgs - label: "Extra Args" - schema: - type: list - default: [] - items: - - variable: argItem - label: "Arg" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: labelsList - label: "Controller Labels" - schema: - type: list - default: [] - items: - - variable: labelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: annotationsList - label: " Controller Annotations" - schema: - type: list - default: [] - items: - - variable: annotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: secret - group: "Container Configuration" - label: "Image Secrets" - schema: - type: dict - attrs: - - variable: PHOTOPRISM_ADMIN_PASSWORD - label: "PHOTOPRISM_ADMIN_PASSWORD (First Install Only)" - description: "Initial admin password. **BE SURE TO CHANGE THIS!**" - schema: - type: string - required: true - private: true - default: "REPLACETHIS" - - variable: env - group: "Container Configuration" - label: "Image Environment" - schema: - type: dict - attrs: - - variable: TZ - label: "Timezone" - schema: - type: string - default: "Etc/UTC" - $ref: - - "definitions/timezone" - - variable: UMASK - label: "UMASK" - description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" - schema: - type: string - default: "002" - - variable: PUID - label: "PUID" - description: "Sets the userID inside the container" - schema: - type: int - default: 568 - - variable: PHOTOPRISM_ORIGINALS_PATH - label: "PHOTOPRISM_ORIGINALS_PATH" - description: "Photoprism originals path" - schema: - type: string - default: "/photoprism/originals" - - variable: PHOTOPRISM_IMPORT_PATH - label: "PHOTOPRISM_IMPORT_PATH" - description: "Photoprism import path" - schema: - type: string - default: "/photoprism/import" - - variable: PHOTOPRISM_TEMP_PATH - label: "PHOTOPRISM_TEMP_PATH" - description: "Photoprism temp path" - schema: - hidden: true - editable: false - type: string - default: "/photoprism/temp" - - variable: PHOTOPRISM_STORAGE_PATH - label: "PHOTOPRISM_STORAGE_PATH" - description: "Photoprism storage path" - schema: - hidden: true - editable: false - type: string - default: "/assets/storage" - - variable: PHOTOPRISM_SIDECAR_PATH - label: "PHOTOPRISM_SIDECAR_PATH" - description: "Photoprism sidecar path" - schema: - hidden: true - editable: false - type: string - default: "/assets/sidecar" - - variable: PHOTOPRISM_CACHE_PATH - label: "PHOTOPRISM_CACHE_PATH" - description: "Photoprism cache path" - schema: - hidden: true - editable: false - type: string - default: "/assets/cache" - - variable: PHOTOPRISM_CONFIG_PATH - label: "PHOTOPRISM_CONFIG_PATH" - description: "Photoprism config path" - schema: - hidden: true - editable: false - type: string - default: "/assets/config" - - variable: PROTOPRISM_BACKUP_PATH - label: "PROTOPRISM_BACKUP_PATH" - description: "Photoprism backup path" - schema: - hidden: true - editable: false - type: string - default: "/assets/backup" - - variable: PHOTOPRISM_PUBLIC - label: "PHOTOPRISM_PUBLIC" - description: "Disable authentication / password protection" - schema: - type: boolean - default: false - - variable: envList - label: "Image environment" - group: "Container Configuration" - schema: - type: list - default: [] - items: - - variable: envItem - label: "Environment Variable" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: expertpodconf - group: "Container Configuration" - label: "Show Expert Config" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: termination - group: "Container Configuration" - label: "Termination settings" - schema: - type: dict - attrs: - - variable: gracePeriodSeconds - label: "Grace Period Seconds" - schema: - type: int - default: 10 - - variable: podLabelsList - group: "Container Configuration" - label: "Pod Labels" - schema: - type: list - default: [] - items: - - variable: podLabelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: podAnnotationsList - group: "Container Configuration" - label: "Pod Annotations" - schema: - type: list - default: [] - items: - - variable: podAnnotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: service - group: "Networking and Services" - label: "Configure Service(s)" - schema: - type: dict - attrs: - - variable: main - label: "Main Service" - description: "The Primary service on which the healthcheck runs, often the webUI" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable the service" - schema: - type: boolean - default: true - hidden: true - - variable: type - label: "Service Type" - description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" - schema: - type: string - default: "Simple" - enum: - - value: "Simple" - description: "Simple" - - value: "ClusterIP" - description: "ClusterIP" - - value: "NodePort" - description: "NodePort (Advanced)" - - value: "LoadBalancer" - description: "LoadBalancer (Advanced)" - - variable: loadBalancerIP - label: "LoadBalancer IP" - description: "LoadBalancerIP" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: string - default: "" - - variable: externalIPs - label: "External IP's" - description: "External IP's" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: list - default: [] - items: - - variable: externalIP - label: "External IP" - schema: - type: string - - variable: ports - label: "Service's Port(s) Configuration" - schema: - type: dict - attrs: - - variable: main - label: "Main Service Port Configuration" - schema: - type: dict - attrs: - - variable: port - label: "Port" - description: "This port exposes the container port on the service" - schema: - type: int - default: 2342 - editable: true - required: true - - variable: advanced - label: "Show Advanced settings" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: protocol - label: "Port Type" - schema: - type: string - default: "HTTP" - enum: - - value: HTTP - description: "HTTP" - - value: "HTTPS" - description: "HTTPS" - - value: TCP - description: "TCP" - - value: "UDP" - description: "UDP" - - variable: nodePort - label: "Node Port (Optional)" - description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" - schema: - type: int - min: 9000 - max: 65535 - - variable: targetPort - label: "Target Port" - description: "The internal(!) port on the container the Application runs on" - schema: - type: int - default: 2342 - - - variable: serviceexpert - group: "Networking and Services" - label: "Show Expert Config" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: hostNetwork - group: "Networking and Services" - label: "Host-Networking (Complicated)" - schema: - type: boolean - default: false - - - variable: dnsPolicy - group: "Networking and Services" - label: "dnsPolicy" - schema: - type: string - default: "" - enum: - - value: "" - description: "Default" - - value: "ClusterFirst" - description: "ClusterFirst" - - value: "ClusterFirstWithHostNet" - description: "ClusterFirstWithHostNet" - - value: "None" - description: "None" - - - variable: dnsConfig - label: "DNS Configuration" - group: "Networking and Services" - description: "Specify custom DNS configuration which will be applied to the pod" - schema: - type: dict - attrs: - - variable: nameservers - label: "Nameservers" - schema: - default: [] - type: list - items: - - variable: nameserver - label: "Nameserver" - schema: - type: string - - variable: options - label: "options" - schema: - default: [] - type: list - items: - - variable: option - label: "Option Entry" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: searches - label: "Searches" - schema: - default: [] - type: list - items: - - variable: search - label: "Search Entry" - schema: - type: string - - - variable: serviceList - label: "Add Manual Custom Services" - group: "Networking and Services" - schema: - type: list - default: [] - items: - - variable: serviceListEntry - label: "Custom Service" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable the service" - schema: - type: boolean - default: true - hidden: true - - variable: name - label: "Name" - schema: - type: string - default: "" - - variable: type - label: "Service Type" - description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" - schema: - type: string - default: "Simple" - enum: - - value: "Simple" - description: "Simple" - - value: "NodePort" - description: "NodePort" - - value: "ClusterIP" - description: "ClusterIP" - - value: "LoadBalancer" - description: "LoadBalancer" - - variable: loadBalancerIP - label: "LoadBalancer IP" - description: "LoadBalancerIP" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: string - default: "" - - variable: externalIPs - label: "External IP's" - description: "External IP's" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: list - default: [] - items: - - variable: externalIP - label: "External IP" - schema: - type: string - - variable: portsList - label: "Additional Service Ports" - schema: - type: list - default: [] - items: - - variable: portsListEntry - label: "Custom ports" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - - variable: name - label: "Port Name" - schema: - type: string - default: "" - - variable: protocol - label: "Port Type" - schema: - type: string - default: "TCP" - enum: - - value: HTTP - description: "HTTP" - - value: "HTTPS" - description: "HTTPS" - - value: TCP - description: "TCP" - - value: "UDP" - description: "UDP" - - variable: targetPort - label: "Target Port" - description: "This port exposes the container port on the service" - schema: - type: int - required: true - - variable: port - label: "Container Port" - schema: - type: int - required: true - - variable: nodePort - label: "Node Port (Optional)" - description: "This port gets exposed to the node. Only considered when service type is NodePort" - schema: - type: int - min: 9000 - max: 65535 - - - variable: persistence - label: "Integrated Persistent Storage" - description: "Integrated Persistent Storage" - group: "Storage and Persistence" - schema: - type: dict - attrs: - - variable: storage - label: "App Storage" - description: "Stores the Application Configuration." - schema: - type: dict - attrs: - - variable: type - label: "Type of Storage" - description: "Sets the persistence type, Anything other than PVC could break rollback!" - schema: - type: string - default: "simplePVC" - enum: - - value: "simplePVC" - description: "PVC (simple)" - - value: "simpleHP" - description: "HostPath (simple)" - - value: "emptyDir" - description: "emptyDir" - - value: "pvc" - description: "pvc" - - value: "hostPath" - description: "hostPath" - - variable: setPermissionsSimple - label: "Automatic Permissions" - description: "Automatically set permissions on install" - schema: - show_if: [["type", "=", "simpleHP"]] - type: boolean - default: true - - variable: setPermissions - label: "Automatic Permissions" - description: "Automatically set permissions on install" - schema: - show_if: [["type", "=", "hostPath"]] - type: boolean - default: true - - variable: readOnly - label: "readOnly" - schema: - type: boolean - default: false - - variable: hostPathSimple - label: "hostPath" - description: "Path inside the container the storage is mounted" - schema: - show_if: [["type", "=", "simpleHP"]] - type: hostpath - - variable: hostPath - label: "hostPath" - description: "Path inside the container the storage is mounted" - schema: - show_if: [["type", "=", "hostPath"]] - type: hostpath - - variable: medium - label: "EmptyDir Medium" - schema: - show_if: [["type", "=", "emptyDir"]] - type: string - default: "" - enum: - - value: "" - description: "Default" - - value: "Memory" - description: "Memory" - - variable: size - label: "Size quotum of storage" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "999Gi" - - variable: hostPathType - label: "(Advanced) hostPath Type" - schema: - show_if: [["type", "=", "hostPath"]] - type: string - default: "" - enum: - - value: "" - description: "Default" - - value: "DirectoryOrCreate" - description: "DirectoryOrCreate" - - value: "Directory" - description: "Directory" - - value: "FileOrCreate" - description: "FileOrCreate" - - value: "File" - description: "File" - - value: "Socket" - description: "Socket" - - value: "CharDevice" - description: "CharDevice" - - value: "BlockDevice" - description: "BlockDevice" - - variable: storageClass - label: "(Advanced) storageClass" - description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "SCALE-ZFS" - - variable: accessMode - label: "(Advanced) Access Mode" - description: "Allow or disallow multiple PVC's writhing to the same PV" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "ReadWriteOnce" - enum: - - value: "ReadWriteOnce" - description: "ReadWriteOnce" - - value: "ReadOnlyMany" - description: "ReadOnlyMany" - - value: "ReadWriteMany" - description: "ReadWriteMany" - - variable: advanced - label: "Show Advanced Options" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: labelsList - label: "Labels" - schema: - type: list - default: [] - items: - - variable: labelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: annotationsList - label: "Annotations" - schema: - type: list - default: [] - items: - - variable: annotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: persistenceList - label: "Additional app storage" - group: "Storage and Persistence" - schema: - type: list - default: [] - items: - - variable: persistenceListEntry - label: "Custom Storage" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable the storage" - schema: - type: boolean - default: true - hidden: true - - variable: name - label: "Name (optional)" - description: "Not required, please set to config when mounting /config or temp when mounting /tmp" - schema: - type: string - - variable: type - label: "Type of Storage" - description: "Sets the persistence type, Anything other than PVC could break rollback!" - schema: - type: string - default: "simpleHP" - enum: - - value: "simplePVC" - description: "PVC (simple)" - - value: "simpleHP" - description: "HostPath (simple)" - - value: "emptyDir" - description: "emptyDir" - - value: "pvc" - description: "pvc" - - value: "hostPath" - description: "hostPath" - - variable: setPermissionsSimple - label: "Automatic Permissions" - description: "Automatically set permissions on install" - schema: - show_if: [["type", "=", "simpleHP"]] - type: boolean - default: true - - variable: setPermissions - label: "Automatic Permissions" - description: "Automatically set permissions on install" - schema: - show_if: [["type", "=", "hostPath"]] - type: boolean - default: true - - variable: readOnly - label: "readOnly" - schema: - type: boolean - default: false - - variable: hostPathSimple - label: "hostPath" - description: "Path inside the container the storage is mounted" - schema: - show_if: [["type", "=", "simpleHP"]] - type: hostpath - - variable: hostPath - label: "hostPath" - description: "Path inside the container the storage is mounted" - schema: - show_if: [["type", "=", "hostPath"]] - type: hostpath - - variable: mountPath - label: "mountPath" - description: "Path inside the container the storage is mounted" - schema: - type: string - default: "" - required: true - valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' - - variable: medium - label: "EmptyDir Medium" - schema: - show_if: [["type", "=", "emptyDir"]] - type: string - default: "" - enum: - - value: "" - description: "Default" - - value: "Memory" - description: "Memory" - - variable: size - label: "Size quotum of storage" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "999Gi" - - variable: hostPathType - label: "(Advanced) hostPath Type" - schema: - show_if: [["type", "=", "hostPath"]] - type: string - default: "" - enum: - - value: "" - description: "Default" - - value: "DirectoryOrCreate" - description: "DirectoryOrCreate" - - value: "Directory" - description: "Directory" - - value: "FileOrCreate" - description: "FileOrCreate" - - value: "File" - description: "File" - - value: "Socket" - description: "Socket" - - value: "CharDevice" - description: "CharDevice" - - value: "BlockDevice" - description: "BlockDevice" - - variable: storageClass - label: "(Advanced) storageClass" - description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "SCALE-ZFS" - - variable: accessMode - label: "(Advanced) Access Mode" - description: "Allow or disallow multiple PVC's writhing to the same PV" - schema: - show_if: [["type", "=", "pvc"]] - type: string - default: "ReadWriteOnce" - enum: - - value: "ReadWriteOnce" - description: "ReadWriteOnce" - - value: "ReadOnlyMany" - description: "ReadOnlyMany" - - value: "ReadWriteMany" - description: "ReadWriteMany" - - variable: advanced - label: "Show Advanced Options" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: labelsList - label: "Labels" - schema: - type: list - default: [] - items: - - variable: labelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: annotationsList - label: "Annotations" - schema: - type: list - default: [] - items: - - variable: annotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: ingress - label: "" - group: "Ingress" - schema: - type: dict - attrs: - - variable: main - label: "Main Ingress" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable Ingress" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: hosts - label: "Hosts" - schema: - type: list - default: [] - items: - - variable: hostEntry - label: "Host" - schema: - type: dict - attrs: - - variable: host - label: "HostName" - schema: - type: string - default: "" - required: true - - variable: paths - label: "Paths" - schema: - type: list - default: [] - items: - - variable: pathEntry - label: "Host" - schema: - type: dict - attrs: - - variable: path - label: "path" - schema: - type: string - required: true - default: "/" - - variable: pathType - label: "pathType" - schema: - type: string - required: true - default: "Prefix" - - - variable: tls - label: "TLS-Settings" - schema: - type: list - default: [] - items: - - variable: tlsEntry - label: "Host" - schema: - type: dict - attrs: - - variable: hosts - label: "Certificate Hosts" - schema: - type: list - default: [] - items: - - variable: host - label: "Host" - schema: - type: string - default: "" - required: true - - variable: scaleCert - label: "Select TrueNAS SCALE Certificate" - schema: - type: int - $ref: - - "definitions/certificate" - - - variable: entrypoint - label: "(Advanced) Traefik Entrypoint" - description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" - schema: - type: string - default: "websecure" - required: true - - variable: middlewares - label: "Traefik Middlewares" - description: "Add previously created Traefik Middlewares to this Ingress" - schema: - type: list - default: [] - items: - - variable: name - label: "Name" - schema: - type: string - default: "" - required: true - - - variable: expert - label: "Show Expert Configuration Options" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: enableFixedMiddlewares - description: "These middlewares enforce a number of best practices." - label: "Enable Default Middlewares" - schema: - type: boolean - default: true - - variable: ingressClassName - label: "IngressClass Name" - schema: - type: string - default: "" - - variable: labelsList - label: "Labels" - schema: - type: list - default: [] - items: - - variable: labelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: annotationsList - label: "Annotations" - schema: - type: list - default: [] - items: - - variable: annotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - - variable: ingressList - label: "Add Manual Custom Ingresses" - group: "Ingress" - schema: - type: list - default: [] - items: - - variable: ingressListEntry - label: "Custom Ingress" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable Ingress" - schema: - type: boolean - default: true - hidden: true - - variable: name - label: "Name" - schema: - type: string - default: "" - - variable: ingressClassName - label: "IngressClass Name" - schema: - type: string - default: "" - - variable: labelsList - label: "Labels" - schema: - type: list - default: [] - items: - - variable: labelItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: annotationsList - label: "Annotations" - schema: - type: list - default: [] - items: - - variable: annotationItem - label: "Label" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - - variable: value - label: "Value" - schema: - type: string - - variable: hosts - label: "Hosts" - schema: - type: list - default: [] - items: - - variable: hostEntry - label: "Host" - schema: - type: dict - attrs: - - variable: host - label: "HostName" - schema: - type: string - default: "" - required: true - - variable: paths - label: "Paths" - schema: - type: list - default: [] - items: - - variable: pathEntry - label: "Host" - schema: - type: dict - attrs: - - variable: path - label: "path" - schema: - type: string - required: true - default: "/" - - variable: pathType - label: "pathType" - schema: - type: string - required: true - default: "Prefix" - - variable: service - label: "Linked Service" - schema: - type: dict - attrs: - - variable: name - label: "Service Name" - schema: - type: string - default: "" - - variable: port - label: "Service Port" - schema: - type: int - - variable: tls - label: "TLS-Settings" - schema: - type: list - default: [] - items: - - variable: tlsEntry - label: "Host" - schema: - type: dict - attrs: - - variable: hosts - label: "Certificate Hosts" - schema: - type: list - default: [] - items: - - variable: host - label: "Host" - schema: - type: string - default: "" - required: true - - variable: scaleCert - label: "Select TrueNAS SCALE Certificate" - schema: - type: int - $ref: - - "definitions/certificate" - - variable: entrypoint - label: "Traefik Entrypoint" - description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" - schema: - type: string - default: "websecure" - required: true - - variable: middlewares - label: "Traefik Middlewares" - description: "Add previously created Traefik Middlewares to this Ingress" - schema: - type: list - default: [] - items: - - variable: name - label: "Name" - schema: - type: string - default: "" - required: true - - - variable: advancedSecurity - label: "Show Advanced Security Settings" - group: "Security and Permissions" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: securityContext - label: "Security Context" - schema: - type: dict - attrs: - - variable: privileged - label: "Privileged mode" - schema: - type: boolean - default: false - - variable: readOnlyRootFilesystem - label: "ReadOnly Root Filesystem" - schema: - type: boolean - default: false - - variable: allowPrivilegeEscalation - label: "Allow Privilege Escalation" - schema: - type: boolean - default: false - - variable: runAsNonRoot - label: "runAsNonRoot" - schema: - type: boolean - default: true - - - variable: podSecurityContext - group: "Security and Permissions" - label: "Pod Security Context" - schema: - type: dict - attrs: - - variable: runAsUser - label: "runAsUser" - description: "The UserID of the user running the application" - schema: - type: int - default: 568 - - variable: runAsGroup - label: "runAsGroup" - description: The groupID this App of the user running the application" - schema: - type: int - default: 568 - - variable: fsGroup - label: "fsGroup" - description: "The group that should own ALL storage." - schema: - type: int - default: 568 - - variable: supplementalGroups - label: "supplemental Groups" - schema: - type: list - default: [] - items: - - variable: supplementalGroupsEntry - label: "supplemental Group" - schema: - type: int - - variable: fsGroupChangePolicy - label: "When should we take ownership?" - schema: - type: string - default: "OnRootMismatch" - enum: - - value: "OnRootMismatch" - description: "OnRootMismatch" - - value: "Always" - description: "Always" - - - - variable: advancedresources - label: "Set Custom Resource Limits/Requests (Advanced)" - group: "Resources and Devices" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: resources - label: "" - schema: - type: dict - attrs: - - variable: limits - label: "Advanced Limit Resource Consumption" - schema: - type: dict - attrs: - - variable: cpu - label: "CPU" - schema: - type: string - default: "4000m" - valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' - - variable: memory - label: "Memory RAM" - schema: - type: string - default: "8Gi" - valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' - - variable: requests - label: "Advanced Request minimum resources required" - schema: - type: dict - attrs: - - variable: cpu - label: "CPU" - schema: - type: string - default: "10m" - valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' - - variable: memory - label: "Memory RAM" - schema: - type: string - default: "50Mi" - valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' - - - variable: deviceList - label: "Mount USB devices" - group: "Resources and Devices" - schema: - type: list - default: [] - items: - - variable: deviceListEntry - label: "Device" - schema: - type: dict - attrs: - - variable: enabled - label: "Enable the storage" - schema: - type: boolean - default: true - - variable: type - label: "(Advanced) Type of Storage" - description: "Sets the persistence type" - schema: - type: string - default: "hostPath" - hidden: true - - variable: readOnly - label: "readOnly" - schema: - type: boolean - default: false - - variable: hostPath - label: "Host Device Path" - description: "Path to the device on the host system" - schema: - type: path - - variable: mountPath - label: "Container Device Path" - description: "Path inside the container the device is mounted" - schema: - type: string - default: "/dev/ttyACM0" - - # Specify GPU configuration - - variable: scaleGPU - label: "GPU Configuration" - group: "Resources and Devices" - schema: - type: dict - $ref: - - "definitions/gpuConfiguration" - attrs: [] - - - variable: autoscaling - group: "Advanced" - label: "(Advanced) Horizontal Pod Autoscaler" - schema: - type: dict - attrs: - - variable: enabled - label: "enabled" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: target - label: "Target" - description: "deployment name, defaults to main deployment" - schema: - type: string - default: "" - - variable: minReplicas - label: "Minimum Replicas" - schema: - type: int - default: 1 - - variable: maxReplicas - label: "Maximum Replicas" - schema: - type: int - default: 5 - - variable: targetCPUUtilizationPercentage - label: "Target CPU Utilization Percentage" - schema: - type: int - default: 80 - - variable: targetMemoryUtilizationPercentage - label: "Target Memory Utilization Percentage" - schema: - type: int - default: 80 - - - - variable: addons - group: "Addons" - label: "" - schema: - type: dict - attrs: - - variable: vpn - label: "VPN" - schema: - type: dict - attrs: - - variable: type - label: "Type" - schema: - type: string - default: "disabled" - enum: - - value: "disabled" - description: "disabled" - - value: "openvpn" - description: "OpenVPN" - - value: "wireguard" - description: "Wireguard" - - variable: openvpn - label: "OpenVPN Settings" - schema: - type: dict - show_if: [["type", "=", "openvpn"]] - attrs: - - variable: username - label: "authentication username" - description: "authentication username, optional" - schema: - type: string - default: "" - - variable: password - label: "authentication password" - description: "authentication credentials" - schema: - type: string - default: "" - required: true - - variable: killSwitch - label: "Enable killswitch" - schema: - type: boolean - show_if: [["type", "!=", "disabled"]] - default: true - - variable: excludedNetworks_IPv4 - label: "Killswitch Excluded IPv4 networks" - description: "list of killswitch excluded ipv4 addresses" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: networkv4 - label: "IPv4 Network" - schema: - type: string - required: true - - variable: excludedNetworks_IPv6 - label: "Killswitch Excluded IPv6 networks" - description: "list of killswitch excluded ipv4 addresses" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: networkv6 - label: "IPv6 Network" - schema: - type: string - required: true - - - variable: configFile - label: "VPN Config File Location" - schema: - type: dict - show_if: [["type", "!=", "disabled"]] - attrs: - - variable: enabled - label: "enabled" - schema: - type: boolean - default: true - hidden: true - - variable: type - label: "type" - schema: - type: string - default: "hostPath" - hidden: true - - variable: hostPathType - label: "hostPathType" - schema: - type: string - default: "File" - hidden: true - - variable: noMount - label: "noMount" - schema: - type: boolean - default: true - hidden: true - - variable: hostPath - label: "Full path to file" - description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" - schema: - type: string - default: "" - required: true - - variable: envList - label: "VPN environment Variables" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: envItem - label: "Environment Variable" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - required: true - - variable: value - label: "Value" - schema: - type: string - required: true - - - variable: codeserver - label: "Codeserver" - schema: - type: dict - attrs: - - variable: enabled - label: "enabled" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: git - label: "Git Settings" - schema: - type: dict - attrs: - - variable: deployKey - description: "Raw SSH private key" - label: "deployKey" - schema: - type: string - - variable: deployKeyBase64 - description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" - label: "deployKeyBase64" - schema: - type: string - - variable: service - label: "" - schema: - type: dict - attrs: - - variable: type - label: "Service Type" - description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" - schema: - type: string - default: "NodePort" - enum: - - value: "NodePort" - description: "NodePort" - - value: "ClusterIP" - description: "ClusterIP" - - value: "LoadBalancer" - description: "LoadBalancer" - - variable: loadBalancerIP - label: "LoadBalancer IP" - description: "LoadBalancerIP" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: string - default: "" - - variable: externalIPs - label: "External IP's" - description: "External IP's" - schema: - show_if: [["type", "=", "LoadBalancer"]] - type: list - default: [] - items: - - variable: externalIP - label: "External IP" - schema: - type: string - - variable: ports - label: "" - schema: - type: dict - attrs: - - variable: codeserver - label: "" - schema: - type: dict - attrs: - - variable: nodePort - description: "leave empty to disable" - label: "nodePort" - schema: - type: int - default: 36107 - - variable: envList - label: "Codeserver environment Variables" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: envItem - label: "Environment Variable" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - required: true - - variable: value - label: "Value" - schema: - type: string - required: true - - - - variable: promtail - label: "Promtail" - schema: - type: dict - attrs: - - variable: enabled - label: "enabled" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: loki - label: "Loki URL" - schema: - type: string - required: true - - variable: logs - label: "Log Paths" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - required: true - - variable: path - label: "Path" - schema: - type: string - required: true - - variable: args - label: "Promtail ecommand line arguments" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: arg - label: "Arg" - schema: - type: string - required: true - - variable: envList - label: "Promtail environment Variables" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: envItem - label: "Environment Variable" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - required: true - - variable: value - label: "Value" - schema: - type: string - required: true - - - - - - variable: netshoot - label: "Netshoot" - schema: - type: dict - attrs: - - variable: enabled - label: "enabled" - schema: - type: boolean - default: false - show_subquestions_if: true - subquestions: - - variable: envList - label: "Netshoot environment Variables" - schema: - type: list - show_if: [["type", "!=", "disabled"]] - default: [] - items: - - variable: envItem - label: "Environment Variable" - schema: - type: dict - attrs: - - variable: name - label: "Name" - schema: - type: string - required: true - - variable: value - label: "Value" - schema: - type: string - required: true diff --git a/stable/photoprism/7.0.7/CHANGELOG.md b/stable/photoprism/7.0.8/CHANGELOG.md similarity index 86% rename from stable/photoprism/7.0.7/CHANGELOG.md rename to stable/photoprism/7.0.8/CHANGELOG.md index b01972bdc5f..15873539cf5 100644 --- a/stable/photoprism/7.0.7/CHANGELOG.md +++ b/stable/photoprism/7.0.8/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [photoprism-7.0.8](https://github.com/truecharts/apps/compare/photoprism-7.0.7...photoprism-7.0.8) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [photoprism-7.0.7](https://github.com/truecharts/apps/compare/photoprism-7.0.6...photoprism-7.0.7) (2021-12-19) @@ -86,14 +97,3 @@ #### Chore * update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - - -### [photoprism-6.0.9](https://github.com/truecharts/apps/compare/photoprism-6.0.8...photoprism-6.0.9) (2021-12-07) - -#### Chore - -* update container image tccr.io/truecharts/photoprism to v20211203 ([#1476](https://github.com/truecharts/apps/issues/1476)) - - diff --git a/stable/piwigo/1.0.25/CONFIG.md b/stable/photoprism/7.0.8/CONFIG.md similarity index 100% rename from stable/piwigo/1.0.25/CONFIG.md rename to stable/photoprism/7.0.8/CONFIG.md diff --git a/stable/fleet/0.0.5/Chart.lock b/stable/photoprism/7.0.8/Chart.lock similarity index 84% rename from stable/fleet/0.0.5/Chart.lock rename to stable/photoprism/7.0.8/Chart.lock index dbe9ed6f0a1..3fe9f45920d 100644 --- a/stable/fleet/0.0.5/Chart.lock +++ b/stable/photoprism/7.0.8/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 1.0.37 digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:29:01.89806763Z" +generated: "2021-12-19T23:29:42.68600731Z" diff --git a/stable/photoprism/7.0.7/Chart.yaml b/stable/photoprism/7.0.8/Chart.yaml similarity index 98% rename from stable/photoprism/7.0.7/Chart.yaml rename to stable/photoprism/7.0.8/Chart.yaml index c55c7505626..e298f1dd276 100644 --- a/stable/photoprism/7.0.7/Chart.yaml +++ b/stable/photoprism/7.0.8/Chart.yaml @@ -26,7 +26,7 @@ name: photoprism sources: - https://github.com/photoprism/photoprism - https://hub.docker.com/r/photoprism/photoprism -version: 7.0.7 +version: 7.0.8 annotations: truecharts.org/catagories: | - media diff --git a/stable/photoprism/7.0.7/README.md b/stable/photoprism/7.0.8/README.md similarity index 100% rename from stable/photoprism/7.0.7/README.md rename to stable/photoprism/7.0.8/README.md diff --git a/stable/photoprism/7.0.7/app-readme.md b/stable/photoprism/7.0.8/app-readme.md similarity index 100% rename from stable/photoprism/7.0.7/app-readme.md rename to stable/photoprism/7.0.8/app-readme.md diff --git a/stable/piwigo/1.0.25/charts/common-8.9.24.tgz b/stable/photoprism/7.0.8/charts/common-8.9.24.tgz similarity index 100% rename from stable/piwigo/1.0.25/charts/common-8.9.24.tgz rename to stable/photoprism/7.0.8/charts/common-8.9.24.tgz diff --git a/stable/photoprism/7.0.7/charts/mariadb-1.0.37.tgz b/stable/photoprism/7.0.8/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/photoprism/7.0.7/charts/mariadb-1.0.37.tgz rename to stable/photoprism/7.0.8/charts/mariadb-1.0.37.tgz diff --git a/stable/photoprism/7.0.7/helm-values.md b/stable/photoprism/7.0.8/helm-values.md similarity index 96% rename from stable/photoprism/7.0.7/helm-values.md rename to stable/photoprism/7.0.8/helm-values.md index 39591875dd7..777d202bc0b 100644 --- a/stable/photoprism/7.0.7/helm-values.md +++ b/stable/photoprism/7.0.8/helm-values.md @@ -17,7 +17,7 @@ You will, however, be able to use all values referenced in the common chart here | env.PHOTOPRISM_CONFIG_PATH | string | `"/assets/config"` | Photoprism config path | | env.PHOTOPRISM_IMPORT_PATH | string | `"/photoprism/import"` | Photoprism import path | | env.PHOTOPRISM_ORIGINALS_PATH | string | `"/photoprism/originals"` | Photoprism originals path | -| env.PHOTOPRISM_PUBLIC | string | `"false"` | Disable authentication / password protection | +| env.PHOTOPRISM_PUBLIC | bool | `false` | Disable authentication / password protection | | env.PHOTOPRISM_SIDECAR_PATH | string | `"/assets/sidecar"` | Photoprism sidecar path | | env.PHOTOPRISM_STORAGE_PATH | string | `"/assets/storage"` | Photoprism storage path | | env.PHOTOPRISM_TEMP_PATH | string | `"/photoprism/temp"` | Photoprism temp path | diff --git a/stable/photoprism/7.0.7/ix_values.yaml b/stable/photoprism/7.0.8/ix_values.yaml similarity index 84% rename from stable/photoprism/7.0.7/ix_values.yaml rename to stable/photoprism/7.0.8/ix_values.yaml index 7b6023cf83b..299627fdb00 100644 --- a/stable/photoprism/7.0.7/ix_values.yaml +++ b/stable/photoprism/7.0.8/ix_values.yaml @@ -18,23 +18,23 @@ env: # -- Set the container timezone TZ: UTC # -- Photoprism originals path - PHOTOPRISM_ORIGINALS_PATH: /photoprism/originals + PHOTOPRISM_ORIGINALS_PATH: "/photoprism/originals" # -- Photoprism import path - PHOTOPRISM_IMPORT_PATH: /photoprism/import + PHOTOPRISM_IMPORT_PATH: "/photoprism/import" # -- Photoprism temp path - PHOTOPRISM_TEMP_PATH: /photoprism/temp + PHOTOPRISM_TEMP_PATH: "/photoprism/temp" # -- Photoprism storage path - PHOTOPRISM_STORAGE_PATH: /assets/storage + PHOTOPRISM_STORAGE_PATH: "/assets/storage" # -- Photoprism sidecar path - PHOTOPRISM_SIDECAR_PATH: /assets/sidecar + PHOTOPRISM_SIDECAR_PATH: "/assets/sidecar" # -- Photoprism cache path - PHOTOPRISM_CACHE_PATH: /assets/cache + PHOTOPRISM_CACHE_PATH: "/assets/cache" # -- Photoprism config path - PHOTOPRISM_CONFIG_PATH: /assets/config + PHOTOPRISM_CONFIG_PATH: "/assets/config" # -- Photoprism backup path - PROTOPRISM_BACKUP_PATH: /assets/backup + PROTOPRISM_BACKUP_PATH: "/assets/backup" # -- Disable authentication / password protection - PHOTOPRISM_PUBLIC: "false" + PHOTOPRISM_PUBLIC: false # -- Sets UID Photoprism runs under. UID: # 1000 # -- Sets GID Photoprism runs under. diff --git a/stable/photoprism/7.0.8/questions.yaml b/stable/photoprism/7.0.8/questions.yaml new file mode 100644 index 00000000000..505f072c5e7 --- /dev/null +++ b/stable/photoprism/7.0.8/questions.yaml @@ -0,0 +1,1863 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: PHOTOPRISM_ADMIN_PASSWORD + label: "PHOTOPRISM_ADMIN_PASSWORD (First Install Only)" + description: "Initial admin password. **BE SURE TO CHANGE THIS!**" + schema: + type: string + required: true + private: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the userID inside the container" + schema: + type: int + default: 568 + - variable: PHOTOPRISM_ORIGINALS_PATH + label: "PHOTOPRISM_ORIGINALS_PATH" + description: "Photoprism originals path" + schema: + type: string + default: "/photoprism/originals" + - variable: PHOTOPRISM_IMPORT_PATH + label: "PHOTOPRISM_IMPORT_PATH" + description: "Photoprism import path" + schema: + type: string + default: "/photoprism/import" + - variable: PHOTOPRISM_PUBLIC + label: "PHOTOPRISM_PUBLIC" + description: "Disable authentication / password protection" + schema: + type: boolean + default: false + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 2342 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 2342 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: storage + label: "App Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/photoprism/7.0.7/security.md b/stable/photoprism/7.0.8/security.md similarity index 100% rename from stable/photoprism/7.0.7/security.md rename to stable/photoprism/7.0.8/security.md diff --git a/stable/piaware/4.0.28/templates/common.yaml b/stable/photoprism/7.0.8/templates/common.yaml similarity index 100% rename from stable/piaware/4.0.28/templates/common.yaml rename to stable/photoprism/7.0.8/templates/common.yaml diff --git a/stable/piwigo/1.0.25/values.yaml b/stable/photoprism/7.0.8/values.yaml similarity index 100% rename from stable/piwigo/1.0.25/values.yaml rename to stable/photoprism/7.0.8/values.yaml diff --git a/stable/photoshow/1.0.28/Chart.lock b/stable/photoshow/1.0.28/Chart.lock deleted file mode 100644 index d4ce64e9779..00000000000 --- a/stable/photoshow/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:43:16.259669532Z" diff --git a/stable/photoshow/1.0.28/CHANGELOG.md b/stable/photoshow/1.0.29/CHANGELOG.md similarity index 90% rename from stable/photoshow/1.0.28/CHANGELOG.md rename to stable/photoshow/1.0.29/CHANGELOG.md index 61396d447b5..443368c181d 100644 --- a/stable/photoshow/1.0.28/CHANGELOG.md +++ b/stable/photoshow/1.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [photoshow-1.0.29](https://github.com/truecharts/apps/compare/photoshow-1.0.28...photoshow-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [photoshow-1.0.28](https://github.com/truecharts/apps/compare/photoshow-1.0.27...photoshow-1.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [photoshow-1.0.20](https://github.com/truecharts/apps/compare/photoshow-1.0.19...photoshow-1.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [photoshow-1.0.19](https://github.com/truecharts/apps/compare/photoshow-1.0.18...photoshow-1.0.19) (2021-12-04) - diff --git a/stable/pixapop/1.0.24/CONFIG.md b/stable/photoshow/1.0.29/CONFIG.md similarity index 100% rename from stable/pixapop/1.0.24/CONFIG.md rename to stable/photoshow/1.0.29/CONFIG.md diff --git a/stable/photoshow/1.0.29/Chart.lock b/stable/photoshow/1.0.29/Chart.lock new file mode 100644 index 00000000000..3b8133440d0 --- /dev/null +++ b/stable/photoshow/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:29:58.64575962Z" diff --git a/stable/photoshow/1.0.28/Chart.yaml b/stable/photoshow/1.0.29/Chart.yaml similarity index 98% rename from stable/photoshow/1.0.28/Chart.yaml rename to stable/photoshow/1.0.29/Chart.yaml index 8cf537cefcf..e5dd685249b 100644 --- a/stable/photoshow/1.0.28/Chart.yaml +++ b/stable/photoshow/1.0.29/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/thibaud-rohmer/PhotoShow - https://github.com/linuxserver/docker-photoshow type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/photoshow/1.0.28/README.md b/stable/photoshow/1.0.29/README.md similarity index 100% rename from stable/photoshow/1.0.28/README.md rename to stable/photoshow/1.0.29/README.md diff --git a/stable/photoshow/1.0.28/app-readme.md b/stable/photoshow/1.0.29/app-readme.md similarity index 100% rename from stable/photoshow/1.0.28/app-readme.md rename to stable/photoshow/1.0.29/app-readme.md diff --git a/stable/pixapop/1.0.24/charts/common-8.9.24.tgz b/stable/photoshow/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/pixapop/1.0.24/charts/common-8.9.24.tgz rename to stable/photoshow/1.0.29/charts/common-8.9.24.tgz diff --git a/stable/photoshow/1.0.28/helm-values.md b/stable/photoshow/1.0.29/helm-values.md similarity index 100% rename from stable/photoshow/1.0.28/helm-values.md rename to stable/photoshow/1.0.29/helm-values.md diff --git a/stable/photoshow/1.0.28/ix_values.yaml b/stable/photoshow/1.0.29/ix_values.yaml similarity index 100% rename from stable/photoshow/1.0.28/ix_values.yaml rename to stable/photoshow/1.0.29/ix_values.yaml diff --git a/stable/photoshow/1.0.28/questions.yaml b/stable/photoshow/1.0.29/questions.yaml similarity index 99% rename from stable/photoshow/1.0.28/questions.yaml rename to stable/photoshow/1.0.29/questions.yaml index 967af5b01f4..a9311c3fe34 100644 --- a/stable/photoshow/1.0.28/questions.yaml +++ b/stable/photoshow/1.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10025 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/photoshow/1.0.28/security.md b/stable/photoshow/1.0.29/security.md similarity index 100% rename from stable/photoshow/1.0.28/security.md rename to stable/photoshow/1.0.29/security.md diff --git a/stable/photoshow/1.0.28/templates/common.yaml b/stable/photoshow/1.0.29/templates/common.yaml similarity index 100% rename from stable/photoshow/1.0.28/templates/common.yaml rename to stable/photoshow/1.0.29/templates/common.yaml diff --git a/stable/pixapop/1.0.24/values.yaml b/stable/photoshow/1.0.29/values.yaml similarity index 100% rename from stable/pixapop/1.0.24/values.yaml rename to stable/photoshow/1.0.29/values.yaml diff --git a/stable/phpldapadmin/4.0.25/Chart.lock b/stable/phpldapadmin/4.0.25/Chart.lock deleted file mode 100644 index 687116f6148..00000000000 --- a/stable/phpldapadmin/4.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:43:18.729640835Z" diff --git a/stable/phpldapadmin/4.0.25/CHANGELOG.md b/stable/phpldapadmin/4.0.26/CHANGELOG.md similarity index 90% rename from stable/phpldapadmin/4.0.25/CHANGELOG.md rename to stable/phpldapadmin/4.0.26/CHANGELOG.md index 86abd4114c1..0af8b87750f 100644 --- a/stable/phpldapadmin/4.0.25/CHANGELOG.md +++ b/stable/phpldapadmin/4.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [phpldapadmin-4.0.26](https://github.com/truecharts/apps/compare/phpldapadmin-4.0.25...phpldapadmin-4.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [phpldapadmin-4.0.25](https://github.com/truecharts/apps/compare/phpldapadmin-4.0.24...phpldapadmin-4.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [phpldapadmin-4.0.17](https://github.com/truecharts/apps/compare/phpldapadmin-4.0.16...phpldapadmin-4.0.17) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [phpldapadmin-4.0.16](https://github.com/truecharts/apps/compare/phpldapadmin-4.0.15...phpldapadmin-4.0.16) (2021-12-04) - -#### Chore diff --git a/stable/plex/8.0.25/CONFIG.md b/stable/phpldapadmin/4.0.26/CONFIG.md similarity index 100% rename from stable/plex/8.0.25/CONFIG.md rename to stable/phpldapadmin/4.0.26/CONFIG.md diff --git a/stable/phpldapadmin/4.0.26/Chart.lock b/stable/phpldapadmin/4.0.26/Chart.lock new file mode 100644 index 00000000000..88b0a259be1 --- /dev/null +++ b/stable/phpldapadmin/4.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:07.507555569Z" diff --git a/stable/phpldapadmin/4.0.25/Chart.yaml b/stable/phpldapadmin/4.0.26/Chart.yaml similarity index 97% rename from stable/phpldapadmin/4.0.25/Chart.yaml rename to stable/phpldapadmin/4.0.26/Chart.yaml index 82eaf883c8e..0101edb914d 100644 --- a/stable/phpldapadmin/4.0.25/Chart.yaml +++ b/stable/phpldapadmin/4.0.26/Chart.yaml @@ -21,7 +21,7 @@ name: phpldapadmin sources: - https://gitlab.v2.rancher.geohub.space/g3s/i3s/i3s-helm-catalog type: application -version: 4.0.25 +version: 4.0.26 annotations: truecharts.org/catagories: | - management diff --git a/stable/phpldapadmin/4.0.25/README.md b/stable/phpldapadmin/4.0.26/README.md similarity index 100% rename from stable/phpldapadmin/4.0.25/README.md rename to stable/phpldapadmin/4.0.26/README.md diff --git a/stable/phpldapadmin/4.0.25/app-readme.md b/stable/phpldapadmin/4.0.26/app-readme.md similarity index 100% rename from stable/phpldapadmin/4.0.25/app-readme.md rename to stable/phpldapadmin/4.0.26/app-readme.md diff --git a/stable/plex/8.0.25/charts/common-8.9.24.tgz b/stable/phpldapadmin/4.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/plex/8.0.25/charts/common-8.9.24.tgz rename to stable/phpldapadmin/4.0.26/charts/common-8.9.24.tgz diff --git a/stable/phpldapadmin/4.0.25/helm-values.md b/stable/phpldapadmin/4.0.26/helm-values.md similarity index 100% rename from stable/phpldapadmin/4.0.25/helm-values.md rename to stable/phpldapadmin/4.0.26/helm-values.md diff --git a/stable/phpldapadmin/4.0.25/ix_values.yaml b/stable/phpldapadmin/4.0.26/ix_values.yaml similarity index 100% rename from stable/phpldapadmin/4.0.25/ix_values.yaml rename to stable/phpldapadmin/4.0.26/ix_values.yaml diff --git a/stable/phpldapadmin/4.0.25/questions.yaml b/stable/phpldapadmin/4.0.26/questions.yaml similarity index 99% rename from stable/phpldapadmin/4.0.25/questions.yaml rename to stable/phpldapadmin/4.0.26/questions.yaml index afaf4860af8..d09c123445a 100644 --- a/stable/phpldapadmin/4.0.25/questions.yaml +++ b/stable/phpldapadmin/4.0.26/questions.yaml @@ -356,7 +356,6 @@ questions: schema: type: int default: 10026 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/phpldapadmin/4.0.25/security.md b/stable/phpldapadmin/4.0.26/security.md similarity index 100% rename from stable/phpldapadmin/4.0.25/security.md rename to stable/phpldapadmin/4.0.26/security.md diff --git a/stable/pidgin/0.0.5/templates/common.yaml b/stable/phpldapadmin/4.0.26/templates/common.yaml similarity index 100% rename from stable/pidgin/0.0.5/templates/common.yaml rename to stable/phpldapadmin/4.0.26/templates/common.yaml diff --git a/stable/plex/8.0.25/values.yaml b/stable/phpldapadmin/4.0.26/values.yaml similarity index 100% rename from stable/plex/8.0.25/values.yaml rename to stable/phpldapadmin/4.0.26/values.yaml diff --git a/stable/piaware/4.0.28/Chart.lock b/stable/piaware/4.0.28/Chart.lock deleted file mode 100644 index 0932f72f338..00000000000 --- a/stable/piaware/4.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:43:47.413316271Z" diff --git a/stable/piaware/4.0.28/CHANGELOG.md b/stable/piaware/4.0.29/CHANGELOG.md similarity index 90% rename from stable/piaware/4.0.28/CHANGELOG.md rename to stable/piaware/4.0.29/CHANGELOG.md index 99acfdd069e..4537fb3b657 100644 --- a/stable/piaware/4.0.28/CHANGELOG.md +++ b/stable/piaware/4.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [piaware-4.0.29](https://github.com/truecharts/apps/compare/piaware-4.0.28...piaware-4.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [piaware-4.0.28](https://github.com/truecharts/apps/compare/piaware-4.0.27...piaware-4.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [piaware-4.0.19](https://github.com/truecharts/apps/compare/piaware-4.0.18...piaware-4.0.19) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - - -### piaware-4.0.18 (2021-12-05) - diff --git a/stable/podgrab/8.0.5/CONFIG.md b/stable/piaware/4.0.29/CONFIG.md similarity index 100% rename from stable/podgrab/8.0.5/CONFIG.md rename to stable/piaware/4.0.29/CONFIG.md diff --git a/stable/piaware/4.0.29/Chart.lock b/stable/piaware/4.0.29/Chart.lock new file mode 100644 index 00000000000..ab18151c39b --- /dev/null +++ b/stable/piaware/4.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:10.520812931Z" diff --git a/stable/piaware/4.0.28/Chart.yaml b/stable/piaware/4.0.29/Chart.yaml similarity index 97% rename from stable/piaware/4.0.28/Chart.yaml rename to stable/piaware/4.0.29/Chart.yaml index 42c17eccffc..1186561cea3 100644 --- a/stable/piaware/4.0.28/Chart.yaml +++ b/stable/piaware/4.0.29/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: piaware sources: - https://github.com/flightaware/piaware -version: 4.0.28 +version: 4.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/piaware/4.0.28/README.md b/stable/piaware/4.0.29/README.md similarity index 100% rename from stable/piaware/4.0.28/README.md rename to stable/piaware/4.0.29/README.md diff --git a/stable/piaware/4.0.28/app-readme.md b/stable/piaware/4.0.29/app-readme.md similarity index 100% rename from stable/piaware/4.0.28/app-readme.md rename to stable/piaware/4.0.29/app-readme.md diff --git a/stable/podgrab/8.0.5/charts/common-8.9.24.tgz b/stable/piaware/4.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/podgrab/8.0.5/charts/common-8.9.24.tgz rename to stable/piaware/4.0.29/charts/common-8.9.24.tgz diff --git a/stable/piaware/4.0.28/ci/ct-values.yaml b/stable/piaware/4.0.29/ci/ct-values.yaml similarity index 100% rename from stable/piaware/4.0.28/ci/ct-values.yaml rename to stable/piaware/4.0.29/ci/ct-values.yaml diff --git a/stable/piaware/4.0.28/helm-values.md b/stable/piaware/4.0.29/helm-values.md similarity index 100% rename from stable/piaware/4.0.28/helm-values.md rename to stable/piaware/4.0.29/helm-values.md diff --git a/stable/piaware/4.0.28/ix_values.yaml b/stable/piaware/4.0.29/ix_values.yaml similarity index 100% rename from stable/piaware/4.0.28/ix_values.yaml rename to stable/piaware/4.0.29/ix_values.yaml diff --git a/stable/piaware/4.0.28/questions.yaml b/stable/piaware/4.0.29/questions.yaml similarity index 99% rename from stable/piaware/4.0.28/questions.yaml rename to stable/piaware/4.0.29/questions.yaml index 7d8f4837795..3a9bbfcada0 100644 --- a/stable/piaware/4.0.28/questions.yaml +++ b/stable/piaware/4.0.29/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10092 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/piaware/4.0.28/security.md b/stable/piaware/4.0.29/security.md similarity index 100% rename from stable/piaware/4.0.28/security.md rename to stable/piaware/4.0.29/security.md diff --git a/stable/plex/8.0.25/templates/common.yaml b/stable/piaware/4.0.29/templates/common.yaml similarity index 100% rename from stable/plex/8.0.25/templates/common.yaml rename to stable/piaware/4.0.29/templates/common.yaml diff --git a/stable/podgrab/8.0.5/values.yaml b/stable/piaware/4.0.29/values.yaml similarity index 100% rename from stable/podgrab/8.0.5/values.yaml rename to stable/piaware/4.0.29/values.yaml diff --git a/stable/pidgin/0.0.5/Chart.lock b/stable/pidgin/0.0.5/Chart.lock deleted file mode 100644 index c1e829785d8..00000000000 --- a/stable/pidgin/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:43:56.779571777Z" diff --git a/stable/pidgin/0.0.5/CHANGELOG.md b/stable/pidgin/0.0.6/CHANGELOG.md similarity index 86% rename from stable/pidgin/0.0.5/CHANGELOG.md rename to stable/pidgin/0.0.6/CHANGELOG.md index ed539791991..c205cb48e7a 100644 --- a/stable/pidgin/0.0.5/CHANGELOG.md +++ b/stable/pidgin/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [pidgin-0.0.6](https://github.com/truecharts/apps/compare/pidgin-0.0.5...pidgin-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [pidgin-0.0.5](https://github.com/truecharts/apps/compare/pidgin-0.0.4...pidgin-0.0.5) (2021-12-19) diff --git a/stable/pretend-youre-xyzzy/4.0.24/CONFIG.md b/stable/pidgin/0.0.6/CONFIG.md similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/CONFIG.md rename to stable/pidgin/0.0.6/CONFIG.md diff --git a/stable/pidgin/0.0.6/Chart.lock b/stable/pidgin/0.0.6/Chart.lock new file mode 100644 index 00000000000..ce09fa4f21c --- /dev/null +++ b/stable/pidgin/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:32.67054905Z" diff --git a/stable/pidgin/0.0.5/Chart.yaml b/stable/pidgin/0.0.6/Chart.yaml similarity index 98% rename from stable/pidgin/0.0.5/Chart.yaml rename to stable/pidgin/0.0.6/Chart.yaml index 4be6434d112..7d93ae3dfe7 100644 --- a/stable/pidgin/0.0.5/Chart.yaml +++ b/stable/pidgin/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: pidgin -version: 0.0.5 +version: 0.0.6 appVersion: "2.14.3" description: Pidgin is a chat program which lets you log into accounts on multiple chat networks simultaneously. type: application diff --git a/stable/pidgin/0.0.5/README.md b/stable/pidgin/0.0.6/README.md similarity index 100% rename from stable/pidgin/0.0.5/README.md rename to stable/pidgin/0.0.6/README.md diff --git a/stable/pidgin/0.0.5/app-readme.md b/stable/pidgin/0.0.6/app-readme.md similarity index 100% rename from stable/pidgin/0.0.5/app-readme.md rename to stable/pidgin/0.0.6/app-readme.md diff --git a/stable/pretend-youre-xyzzy/4.0.24/charts/common-8.9.24.tgz b/stable/pidgin/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/charts/common-8.9.24.tgz rename to stable/pidgin/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/pidgin/0.0.5/helm-values.md b/stable/pidgin/0.0.6/helm-values.md similarity index 100% rename from stable/pidgin/0.0.5/helm-values.md rename to stable/pidgin/0.0.6/helm-values.md diff --git a/stable/pidgin/0.0.5/ix_values.yaml b/stable/pidgin/0.0.6/ix_values.yaml similarity index 100% rename from stable/pidgin/0.0.5/ix_values.yaml rename to stable/pidgin/0.0.6/ix_values.yaml diff --git a/stable/pidgin/0.0.5/questions.yaml b/stable/pidgin/0.0.6/questions.yaml similarity index 100% rename from stable/pidgin/0.0.5/questions.yaml rename to stable/pidgin/0.0.6/questions.yaml diff --git a/stable/pidgin/0.0.5/security.md b/stable/pidgin/0.0.6/security.md similarity index 100% rename from stable/pidgin/0.0.5/security.md rename to stable/pidgin/0.0.6/security.md diff --git a/stable/podgrab/8.0.5/templates/common.yaml b/stable/pidgin/0.0.6/templates/common.yaml similarity index 100% rename from stable/podgrab/8.0.5/templates/common.yaml rename to stable/pidgin/0.0.6/templates/common.yaml diff --git a/stable/pretend-youre-xyzzy/4.0.24/values.yaml b/stable/pidgin/0.0.6/values.yaml similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/values.yaml rename to stable/pidgin/0.0.6/values.yaml diff --git a/stable/pihole/4.0.27/Chart.lock b/stable/pihole/4.0.27/Chart.lock deleted file mode 100644 index b659adbc2c9..00000000000 --- a/stable/pihole/4.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:43:58.394142144Z" diff --git a/stable/pihole/4.0.27/CHANGELOG.md b/stable/pihole/4.0.28/CHANGELOG.md similarity index 85% rename from stable/pihole/4.0.27/CHANGELOG.md rename to stable/pihole/4.0.28/CHANGELOG.md index cb8a9e68545..9168bac01a9 100644 --- a/stable/pihole/4.0.27/CHANGELOG.md +++ b/stable/pihole/4.0.28/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [pihole-4.0.28](https://github.com/truecharts/apps/compare/pihole-4.0.27...pihole-4.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [pihole-4.0.27](https://github.com/truecharts/apps/compare/pihole-4.0.26...pihole-4.0.27) (2021-12-19) @@ -86,14 +97,3 @@ * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - -### [pihole-4.0.19](https://github.com/truecharts/apps/compare/pihole-4.0.18...pihole-4.0.19) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - diff --git a/stable/projectsend/0.0.5/CONFIG.md b/stable/pihole/4.0.28/CONFIG.md similarity index 100% rename from stable/projectsend/0.0.5/CONFIG.md rename to stable/pihole/4.0.28/CONFIG.md diff --git a/stable/pihole/4.0.28/Chart.lock b/stable/pihole/4.0.28/Chart.lock new file mode 100644 index 00000000000..c959236a28a --- /dev/null +++ b/stable/pihole/4.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:45.415026191Z" diff --git a/stable/pihole/4.0.27/Chart.yaml b/stable/pihole/4.0.28/Chart.yaml similarity index 97% rename from stable/pihole/4.0.27/Chart.yaml rename to stable/pihole/4.0.28/Chart.yaml index 4c82ba57288..e65e0a138b8 100644 --- a/stable/pihole/4.0.27/Chart.yaml +++ b/stable/pihole/4.0.28/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/pi-hole - https://github.com/pi-hole/docker-pi-hole type: application -version: 4.0.27 +version: 4.0.28 annotations: truecharts.org/catagories: | - networking diff --git a/stable/pihole/4.0.27/README.md b/stable/pihole/4.0.28/README.md similarity index 100% rename from stable/pihole/4.0.27/README.md rename to stable/pihole/4.0.28/README.md diff --git a/stable/pihole/4.0.27/app-readme.md b/stable/pihole/4.0.28/app-readme.md similarity index 100% rename from stable/pihole/4.0.27/app-readme.md rename to stable/pihole/4.0.28/app-readme.md diff --git a/stable/projectsend/0.0.5/charts/common-8.9.24.tgz b/stable/pihole/4.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/projectsend/0.0.5/charts/common-8.9.24.tgz rename to stable/pihole/4.0.28/charts/common-8.9.24.tgz diff --git a/stable/pihole/4.0.27/helm-values.md b/stable/pihole/4.0.28/helm-values.md similarity index 100% rename from stable/pihole/4.0.27/helm-values.md rename to stable/pihole/4.0.28/helm-values.md diff --git a/stable/pihole/4.0.27/ix_values.yaml b/stable/pihole/4.0.28/ix_values.yaml similarity index 100% rename from stable/pihole/4.0.27/ix_values.yaml rename to stable/pihole/4.0.28/ix_values.yaml diff --git a/stable/pihole/4.0.27/questions.yaml b/stable/pihole/4.0.28/questions.yaml similarity index 99% rename from stable/pihole/4.0.27/questions.yaml rename to stable/pihole/4.0.28/questions.yaml index 518599869e8..02c76579443 100644 --- a/stable/pihole/4.0.27/questions.yaml +++ b/stable/pihole/4.0.28/questions.yaml @@ -381,7 +381,6 @@ questions: schema: type: int default: 9089 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -475,19 +474,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 53 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -580,19 +572,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 53 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/pihole/4.0.27/security.md b/stable/pihole/4.0.28/security.md similarity index 100% rename from stable/pihole/4.0.27/security.md rename to stable/pihole/4.0.28/security.md diff --git a/stable/pihole/4.0.27/templates/_configmap.tpl b/stable/pihole/4.0.28/templates/_configmap.tpl similarity index 100% rename from stable/pihole/4.0.27/templates/_configmap.tpl rename to stable/pihole/4.0.28/templates/_configmap.tpl diff --git a/stable/pihole/4.0.27/templates/common.yaml b/stable/pihole/4.0.28/templates/common.yaml similarity index 100% rename from stable/pihole/4.0.27/templates/common.yaml rename to stable/pihole/4.0.28/templates/common.yaml diff --git a/stable/projectsend/0.0.5/values.yaml b/stable/pihole/4.0.28/values.yaml similarity index 100% rename from stable/projectsend/0.0.5/values.yaml rename to stable/pihole/4.0.28/values.yaml diff --git a/stable/piwigo/1.0.25/Chart.lock b/stable/piwigo/1.0.25/Chart.lock deleted file mode 100644 index 88f824c1a78..00000000000 --- a/stable/piwigo/1.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:05.429040871Z" diff --git a/stable/piwigo/1.0.25/CHANGELOG.md b/stable/piwigo/1.0.26/CHANGELOG.md similarity index 90% rename from stable/piwigo/1.0.25/CHANGELOG.md rename to stable/piwigo/1.0.26/CHANGELOG.md index f28bdc033ac..44df1089e2d 100644 --- a/stable/piwigo/1.0.25/CHANGELOG.md +++ b/stable/piwigo/1.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [piwigo-1.0.26](https://github.com/truecharts/apps/compare/piwigo-1.0.25...piwigo-1.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [piwigo-1.0.25](https://github.com/truecharts/apps/compare/piwigo-1.0.24...piwigo-1.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [piwigo-1.0.17](https://github.com/truecharts/apps/compare/piwigo-1.0.16...piwigo-1.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [piwigo-1.0.16](https://github.com/truecharts/apps/compare/piwigo-1.0.15...piwigo-1.0.16) (2021-12-04) - diff --git a/stable/promcord/2.0.5/CONFIG.md b/stable/piwigo/1.0.26/CONFIG.md similarity index 100% rename from stable/promcord/2.0.5/CONFIG.md rename to stable/piwigo/1.0.26/CONFIG.md diff --git a/stable/piwigo/1.0.26/Chart.lock b/stable/piwigo/1.0.26/Chart.lock new file mode 100644 index 00000000000..10d753fd839 --- /dev/null +++ b/stable/piwigo/1.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:50.078734894Z" diff --git a/stable/piwigo/1.0.25/Chart.yaml b/stable/piwigo/1.0.26/Chart.yaml similarity index 97% rename from stable/piwigo/1.0.25/Chart.yaml rename to stable/piwigo/1.0.26/Chart.yaml index 262923a8d1c..be06c0b2595 100644 --- a/stable/piwigo/1.0.25/Chart.yaml +++ b/stable/piwigo/1.0.26/Chart.yaml @@ -23,7 +23,7 @@ sources: - http://piwigo.org/ - https://github.com/linuxserver/docker-piwigo type: application -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/piwigo/1.0.25/README.md b/stable/piwigo/1.0.26/README.md similarity index 100% rename from stable/piwigo/1.0.25/README.md rename to stable/piwigo/1.0.26/README.md diff --git a/stable/piwigo/1.0.25/app-readme.md b/stable/piwigo/1.0.26/app-readme.md similarity index 100% rename from stable/piwigo/1.0.25/app-readme.md rename to stable/piwigo/1.0.26/app-readme.md diff --git a/stable/promcord/2.0.5/charts/common-8.9.24.tgz b/stable/piwigo/1.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/promcord/2.0.5/charts/common-8.9.24.tgz rename to stable/piwigo/1.0.26/charts/common-8.9.24.tgz diff --git a/stable/piwigo/1.0.25/helm-values.md b/stable/piwigo/1.0.26/helm-values.md similarity index 100% rename from stable/piwigo/1.0.25/helm-values.md rename to stable/piwigo/1.0.26/helm-values.md diff --git a/stable/piwigo/1.0.25/ix_values.yaml b/stable/piwigo/1.0.26/ix_values.yaml similarity index 100% rename from stable/piwigo/1.0.25/ix_values.yaml rename to stable/piwigo/1.0.26/ix_values.yaml diff --git a/stable/piwigo/1.0.25/questions.yaml b/stable/piwigo/1.0.26/questions.yaml similarity index 99% rename from stable/piwigo/1.0.25/questions.yaml rename to stable/piwigo/1.0.26/questions.yaml index 419344b4011..67b61c5f9b6 100644 --- a/stable/piwigo/1.0.25/questions.yaml +++ b/stable/piwigo/1.0.26/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10027 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/piwigo/1.0.25/security.md b/stable/piwigo/1.0.26/security.md similarity index 100% rename from stable/piwigo/1.0.25/security.md rename to stable/piwigo/1.0.26/security.md diff --git a/stable/piwigo/1.0.25/templates/common.yaml b/stable/piwigo/1.0.26/templates/common.yaml similarity index 100% rename from stable/piwigo/1.0.25/templates/common.yaml rename to stable/piwigo/1.0.26/templates/common.yaml diff --git a/stable/promcord/2.0.5/values.yaml b/stable/piwigo/1.0.26/values.yaml similarity index 100% rename from stable/promcord/2.0.5/values.yaml rename to stable/piwigo/1.0.26/values.yaml diff --git a/stable/pixapop/1.0.24/Chart.lock b/stable/pixapop/1.0.24/Chart.lock deleted file mode 100644 index cca61cb5004..00000000000 --- a/stable/pixapop/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:15.147084607Z" diff --git a/stable/pixapop/1.0.24/CHANGELOG.md b/stable/pixapop/1.0.25/CHANGELOG.md similarity index 90% rename from stable/pixapop/1.0.24/CHANGELOG.md rename to stable/pixapop/1.0.25/CHANGELOG.md index c6dbde22a00..b2d82d8b6b1 100644 --- a/stable/pixapop/1.0.24/CHANGELOG.md +++ b/stable/pixapop/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [pixapop-1.0.25](https://github.com/truecharts/apps/compare/pixapop-1.0.24...pixapop-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [pixapop-1.0.24](https://github.com/truecharts/apps/compare/pixapop-1.0.23...pixapop-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [pixapop-1.0.16](https://github.com/truecharts/apps/compare/pixapop-1.0.15...pixapop-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [pixapop-1.0.15](https://github.com/truecharts/apps/compare/pixapop-1.0.14...pixapop-1.0.15) (2021-12-04) - diff --git a/stable/protonmail-bridge/4.0.24/CONFIG.md b/stable/pixapop/1.0.25/CONFIG.md similarity index 100% rename from stable/protonmail-bridge/4.0.24/CONFIG.md rename to stable/pixapop/1.0.25/CONFIG.md diff --git a/stable/pixapop/1.0.25/Chart.lock b/stable/pixapop/1.0.25/Chart.lock new file mode 100644 index 00000000000..582829f8f1b --- /dev/null +++ b/stable/pixapop/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:30:55.823743423Z" diff --git a/stable/pixapop/1.0.24/Chart.yaml b/stable/pixapop/1.0.25/Chart.yaml similarity index 97% rename from stable/pixapop/1.0.24/Chart.yaml rename to stable/pixapop/1.0.25/Chart.yaml index ab9e7678e3b..a9305cbac77 100644 --- a/stable/pixapop/1.0.24/Chart.yaml +++ b/stable/pixapop/1.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-pixapop - https://github.com/bierdok/pixapop type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/pixapop/1.0.24/README.md b/stable/pixapop/1.0.25/README.md similarity index 100% rename from stable/pixapop/1.0.24/README.md rename to stable/pixapop/1.0.25/README.md diff --git a/stable/pixapop/1.0.24/app-readme.md b/stable/pixapop/1.0.25/app-readme.md similarity index 100% rename from stable/pixapop/1.0.24/app-readme.md rename to stable/pixapop/1.0.25/app-readme.md diff --git a/stable/protonmail-bridge/4.0.24/charts/common-8.9.24.tgz b/stable/pixapop/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/protonmail-bridge/4.0.24/charts/common-8.9.24.tgz rename to stable/pixapop/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/pixapop/1.0.24/helm-values.md b/stable/pixapop/1.0.25/helm-values.md similarity index 100% rename from stable/pixapop/1.0.24/helm-values.md rename to stable/pixapop/1.0.25/helm-values.md diff --git a/stable/pixapop/1.0.24/ix_values.yaml b/stable/pixapop/1.0.25/ix_values.yaml similarity index 100% rename from stable/pixapop/1.0.24/ix_values.yaml rename to stable/pixapop/1.0.25/ix_values.yaml diff --git a/stable/pixapop/1.0.24/questions.yaml b/stable/pixapop/1.0.25/questions.yaml similarity index 99% rename from stable/pixapop/1.0.24/questions.yaml rename to stable/pixapop/1.0.25/questions.yaml index beb7e1e8f88..bf016f19efc 100644 --- a/stable/pixapop/1.0.24/questions.yaml +++ b/stable/pixapop/1.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10028 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/pixapop/1.0.24/security.md b/stable/pixapop/1.0.25/security.md similarity index 99% rename from stable/pixapop/1.0.24/security.md rename to stable/pixapop/1.0.25/security.md index 6345c1c91b4..8f5a2de4c86 100644 --- a/stable/pixapop/1.0.24/security.md +++ b/stable/pixapop/1.0.25/security.md @@ -142,13 +142,13 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| symfony/cache | CVE-2019-18889 | CRITICAL | v4.2.3 | 3.4.0, 3.4.35, 4.1.0, 4.2.0, 4.2.12, 4.3.8, 3.2.0, 3.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18889
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml
https://github.com/advisories/GHSA-79gr-58r3-pwm3
https://github.com/symfony/symfony/commit/8817d28fcaacb31fe01d267f6e19b44d8179395a
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://nvd.nist.gov/vuln/detail/CVE-2019-18889
https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18889
| -| symfony/cache | CVE-2019-10912 | HIGH | v4.2.3 | 3.3.0, 3.4.0, 3.4.26, 4.1.0, 4.1.12, 4.2.7, 3.2.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10912
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml
https://github.com/advisories/GHSA-w2fr-65vp-mxw3
https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/
https://nvd.nist.gov/vuln/detail/CVE-2019-10912
https://seclists.org/bugtraq/2019/May/21
https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized
https://symfony.com/cve-2019-10912
https://typo3.org/security/advisory/typo3-core-sa-2019-016
https://typo3.org/security/advisory/typo3-core-sa-2019-016/
https://www.debian.org/security/2019/dsa-4441
| -| symfony/dependency-injection | CVE-2019-10910 | CRITICAL | v4.2.4 | 3.4.0, 3.4.26, 4.1.12, 2.7.51, 2.8.50, 3.1.0, 3.2.0, 3.3.0, 4.1.0, 4.2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10910
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml
https://github.com/advisories/GHSA-pgwj-prpq-jpc2
https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b
https://nvd.nist.gov/vuln/detail/CVE-2019-10910
https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid
https://symfony.com/cve-2019-10910
https://www.drupal.org/SA-CORE-2019-005
https://www.synology.com/security/advisory/Synology_SA_19_19
| -| symfony/framework-bundle | CVE-2019-10909 | MEDIUM | v4.2.3 | 3.2.0, 3.3.0, 3.4.0, 3.4.26, 4.1.0, 2.7.51, 2.8.50, 3.1.0, 4.1.12, 4.2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10909
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml
https://github.com/advisories/GHSA-g996-q5r8-w7g2
https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2
https://nvd.nist.gov/vuln/detail/CVE-2019-10909
https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine
https://symfony.com/cve-2019-10909
https://www.drupal.org/SA-CORE-2019-005
https://www.drupal.org/sa-core-2019-005
https://www.synology.com/security/advisory/Synology_SA_19_19
| -| symfony/http-foundation | CVE-2019-10913 | CRITICAL | v4.2.4 | 3.2.0, 4.1.0, 4.1.12, 4.2.7, 2.8.50, 3.1.0, 3.3.0, 3.4.0, 3.4.26, 2.7.51 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10913
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml
https://github.com/advisories/GHSA-x92h-wmg2-6hp7
https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec
https://nvd.nist.gov/vuln/detail/CVE-2019-10913
https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides
https://symfony.com/cve-2019-10913
| -| symfony/http-foundation | CVE-2019-18888 | HIGH | v4.2.4 | 3.1.0, 4.1.0, 4.2.0, 4.2.12, 3.4.35, 4.3.8, 2.2.0, 3.2.0, 3.3.0, 3.4.0, 2.8.0, 2.1.0, 2.3.0, 2.5.0, 2.6.0, 2.4.0, 2.7.0, 2.8.52 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml
https://github.com/advisories/GHSA-xhh6-956q-4q69
https://github.com/symfony/symfony/commit/691486e43ce0e4893cd703e221bafc10a871f365
https://github.com/symfony/symfony/commit/77ddabf2e785ea85860d2720cc86f7c5d8967ed5
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/
https://nvd.nist.gov/vuln/detail/CVE-2019-18888
https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18888
| -| symfony/http-kernel | CVE-2019-18887 | HIGH | v4.2.4 | 2.4.0, 2.8.52, 3.2.0, 3.3.0, 2.7.0, 4.2.0, 4.2.12, 4.3.8, 2.3.0, 2.5.0, 2.8.0, 3.1.0, 3.4.0, 3.4.35, 4.1.0, 2.6.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18887
https://github.com/symfony/symfony/commit/cccefe6a7f12e776df0665aeb77fe9294c285fbb
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/
https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18887
| +| symfony/cache | CVE-2019-18889 | CRITICAL | v4.2.3 | 4.1.0, 4.2.0, 4.2.12, 4.3.8, 3.2.0, 3.3.0, 3.4.0, 3.4.35 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18889
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml
https://github.com/advisories/GHSA-79gr-58r3-pwm3
https://github.com/symfony/symfony/commit/8817d28fcaacb31fe01d267f6e19b44d8179395a
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://nvd.nist.gov/vuln/detail/CVE-2019-18889
https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18889
| +| symfony/cache | CVE-2019-10912 | HIGH | v4.2.3 | 4.2.7, 3.2.0, 3.3.0, 3.4.0, 3.4.26, 4.1.0, 4.1.12 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10912
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml
https://github.com/advisories/GHSA-w2fr-65vp-mxw3
https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/
https://nvd.nist.gov/vuln/detail/CVE-2019-10912
https://seclists.org/bugtraq/2019/May/21
https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized
https://symfony.com/cve-2019-10912
https://typo3.org/security/advisory/typo3-core-sa-2019-016
https://typo3.org/security/advisory/typo3-core-sa-2019-016/
https://www.debian.org/security/2019/dsa-4441
| +| symfony/dependency-injection | CVE-2019-10910 | CRITICAL | v4.2.4 | 3.1.0, 3.2.0, 3.4.0, 4.1.0, 4.1.12, 2.7.51, 3.3.0, 3.4.26, 4.2.7, 2.8.50 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10910
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml
https://github.com/advisories/GHSA-pgwj-prpq-jpc2
https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b
https://nvd.nist.gov/vuln/detail/CVE-2019-10910
https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid
https://symfony.com/cve-2019-10910
https://www.drupal.org/SA-CORE-2019-005
https://www.synology.com/security/advisory/Synology_SA_19_19
| +| symfony/framework-bundle | CVE-2019-10909 | MEDIUM | v4.2.3 | 4.1.0, 4.2.7, 3.2.0, 3.4.0, 3.4.26, 3.3.0, 4.1.12, 2.7.51, 2.8.50, 3.1.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10909
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml
https://github.com/advisories/GHSA-g996-q5r8-w7g2
https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2
https://nvd.nist.gov/vuln/detail/CVE-2019-10909
https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine
https://symfony.com/cve-2019-10909
https://www.drupal.org/SA-CORE-2019-005
https://www.drupal.org/sa-core-2019-005
https://www.synology.com/security/advisory/Synology_SA_19_19
| +| symfony/http-foundation | CVE-2019-10913 | CRITICAL | v4.2.4 | 3.1.0, 3.2.0, 4.1.12, 4.2.7, 2.7.51, 3.3.0, 3.4.0, 3.4.26, 4.1.0, 2.8.50 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10913
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml
https://github.com/advisories/GHSA-x92h-wmg2-6hp7
https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec
https://nvd.nist.gov/vuln/detail/CVE-2019-10913
https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides
https://symfony.com/cve-2019-10913
| +| symfony/http-foundation | CVE-2019-18888 | HIGH | v4.2.4 | 2.4.0, 2.6.0, 3.2.0, 3.3.0, 4.3.8, 2.3.0, 3.1.0, 3.4.35, 4.2.0, 2.7.0, 2.2.0, 2.5.0, 2.8.52, 3.4.0, 2.1.0, 4.1.0, 4.2.12, 2.8.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml
https://github.com/advisories/GHSA-xhh6-956q-4q69
https://github.com/symfony/symfony/commit/691486e43ce0e4893cd703e221bafc10a871f365
https://github.com/symfony/symfony/commit/77ddabf2e785ea85860d2720cc86f7c5d8967ed5
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/
https://nvd.nist.gov/vuln/detail/CVE-2019-18888
https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18888
| +| symfony/http-kernel | CVE-2019-18887 | HIGH | v4.2.4 | 2.8.0, 3.3.0, 2.3.0, 2.6.0, 4.1.0, 4.2.12, 4.3.8, 2.4.0, 2.5.0, 2.7.0, 2.8.52, 3.1.0, 3.2.0, 3.4.0, 3.4.35, 4.2.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18887
https://github.com/symfony/symfony/commit/cccefe6a7f12e776df0665aeb77fe9294c285fbb
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/
https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-18887
| | symfony/var-exporter | CVE-2019-11325 | CRITICAL | v4.2.3 | 4.2.12, 4.3.8 |
Expand...https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml
https://github.com/advisories/GHSA-w4rc-rx25-8m86
https://github.com/symfony/symfony/releases/tag/v4.3.8
https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3
https://nvd.nist.gov/vuln/detail/CVE-2019-11325
https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter
https://symfony.com/blog/symfony-4-3-8-released
https://symfony.com/cve-2019-11325
| | twig/twig | CVE-2019-9942 | LOW | v2.6.2 | 1.38.0, 2.7.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9942
https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077
https://seclists.org/bugtraq/2019/Mar/60
https://symfony.com/blog/twig-sandbox-information-disclosure
https://www.debian.org/security/2019/dsa-4419
| diff --git a/stable/pixapop/1.0.24/templates/common.yaml b/stable/pixapop/1.0.25/templates/common.yaml similarity index 100% rename from stable/pixapop/1.0.24/templates/common.yaml rename to stable/pixapop/1.0.25/templates/common.yaml diff --git a/stable/protonmail-bridge/4.0.24/values.yaml b/stable/pixapop/1.0.25/values.yaml similarity index 100% rename from stable/protonmail-bridge/4.0.24/values.yaml rename to stable/pixapop/1.0.25/values.yaml diff --git a/stable/plex/8.0.25/Chart.lock b/stable/plex/8.0.25/Chart.lock deleted file mode 100644 index 7a9422fb2f4..00000000000 --- a/stable/plex/8.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:23.284657869Z" diff --git a/stable/plex/8.0.25/CHANGELOG.md b/stable/plex/8.0.26/CHANGELOG.md similarity index 91% rename from stable/plex/8.0.25/CHANGELOG.md rename to stable/plex/8.0.26/CHANGELOG.md index ffb1666c3fa..1840b28d4d1 100644 --- a/stable/plex/8.0.25/CHANGELOG.md +++ b/stable/plex/8.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [plex-8.0.26](https://github.com/truecharts/apps/compare/plex-8.0.25...plex-8.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [plex-8.0.25](https://github.com/truecharts/apps/compare/plex-8.0.24...plex-8.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [plex-8.0.17](https://github.com/truecharts/apps/compare/plex-8.0.16...plex-8.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [plex-8.0.16](https://github.com/truecharts/apps/compare/plex-8.0.15...plex-8.0.16) (2021-12-04) - diff --git a/stable/prowlarr/4.0.43/CONFIG.md b/stable/plex/8.0.26/CONFIG.md similarity index 100% rename from stable/prowlarr/4.0.43/CONFIG.md rename to stable/plex/8.0.26/CONFIG.md diff --git a/stable/plex/8.0.26/Chart.lock b/stable/plex/8.0.26/Chart.lock new file mode 100644 index 00000000000..65fed6b4271 --- /dev/null +++ b/stable/plex/8.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:04.787145051Z" diff --git a/stable/plex/8.0.25/Chart.yaml b/stable/plex/8.0.26/Chart.yaml similarity index 97% rename from stable/plex/8.0.25/Chart.yaml rename to stable/plex/8.0.26/Chart.yaml index 0a9304805cf..c6510cf5c56 100644 --- a/stable/plex/8.0.25/Chart.yaml +++ b/stable/plex/8.0.26/Chart.yaml @@ -20,7 +20,7 @@ name: plex sources: - https://github.com/k8s-at-home/container-images/pkgs/container/plex type: application -version: 8.0.25 +version: 8.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/plex/8.0.25/README.md b/stable/plex/8.0.26/README.md similarity index 100% rename from stable/plex/8.0.25/README.md rename to stable/plex/8.0.26/README.md diff --git a/stable/plex/8.0.25/app-readme.md b/stable/plex/8.0.26/app-readme.md similarity index 100% rename from stable/plex/8.0.25/app-readme.md rename to stable/plex/8.0.26/app-readme.md diff --git a/stable/prowlarr/4.0.43/charts/common-8.9.24.tgz b/stable/plex/8.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/prowlarr/4.0.43/charts/common-8.9.24.tgz rename to stable/plex/8.0.26/charts/common-8.9.24.tgz diff --git a/stable/plex/8.0.25/helm-values.md b/stable/plex/8.0.26/helm-values.md similarity index 100% rename from stable/plex/8.0.25/helm-values.md rename to stable/plex/8.0.26/helm-values.md diff --git a/stable/plex/8.0.25/ix_values.yaml b/stable/plex/8.0.26/ix_values.yaml similarity index 100% rename from stable/plex/8.0.25/ix_values.yaml rename to stable/plex/8.0.26/ix_values.yaml diff --git a/stable/plex/8.0.25/questions.yaml b/stable/plex/8.0.26/questions.yaml similarity index 99% rename from stable/plex/8.0.25/questions.yaml rename to stable/plex/8.0.26/questions.yaml index a4b415d7630..551d3c1ace8 100644 --- a/stable/plex/8.0.25/questions.yaml +++ b/stable/plex/8.0.26/questions.yaml @@ -363,7 +363,6 @@ questions: schema: type: int default: 32400 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/plex/8.0.25/security.md b/stable/plex/8.0.26/security.md similarity index 100% rename from stable/plex/8.0.25/security.md rename to stable/plex/8.0.26/security.md diff --git a/stable/pretend-youre-xyzzy/4.0.24/templates/common.yaml b/stable/plex/8.0.26/templates/common.yaml similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/templates/common.yaml rename to stable/plex/8.0.26/templates/common.yaml diff --git a/stable/prowlarr/4.0.43/values.yaml b/stable/plex/8.0.26/values.yaml similarity index 100% rename from stable/prowlarr/4.0.43/values.yaml rename to stable/plex/8.0.26/values.yaml diff --git a/stable/podgrab/8.0.5/Chart.lock b/stable/podgrab/8.0.5/Chart.lock deleted file mode 100644 index e0166de47c2..00000000000 --- a/stable/podgrab/8.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:31.565759274Z" diff --git a/stable/podgrab/8.0.5/CHANGELOG.md b/stable/podgrab/8.0.6/CHANGELOG.md similarity index 90% rename from stable/podgrab/8.0.5/CHANGELOG.md rename to stable/podgrab/8.0.6/CHANGELOG.md index 2e0d697959e..f95bd114cac 100644 --- a/stable/podgrab/8.0.5/CHANGELOG.md +++ b/stable/podgrab/8.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [podgrab-8.0.6](https://github.com/truecharts/apps/compare/podgrab-8.0.5...podgrab-8.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [podgrab-8.0.5](https://github.com/truecharts/apps/compare/podgrab-8.0.4...podgrab-8.0.5) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [podgrab-7.0.17](https://github.com/truecharts/apps/compare/podgrab-7.0.16...podgrab-7.0.17) (2021-12-05) - diff --git a/stable/pwndrop/0.0.5/CONFIG.md b/stable/podgrab/8.0.6/CONFIG.md similarity index 100% rename from stable/pwndrop/0.0.5/CONFIG.md rename to stable/podgrab/8.0.6/CONFIG.md diff --git a/stable/podgrab/8.0.6/Chart.lock b/stable/podgrab/8.0.6/Chart.lock new file mode 100644 index 00000000000..0fdab3bdf6f --- /dev/null +++ b/stable/podgrab/8.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:12.976402244Z" diff --git a/stable/podgrab/8.0.5/Chart.yaml b/stable/podgrab/8.0.6/Chart.yaml similarity index 98% rename from stable/podgrab/8.0.5/Chart.yaml rename to stable/podgrab/8.0.6/Chart.yaml index d9edb365beb..ff9a4a2366d 100644 --- a/stable/podgrab/8.0.5/Chart.yaml +++ b/stable/podgrab/8.0.6/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/akhilrex/podgrab - https://hub.docker.com/r/akhilrex/podgrab type: application -version: 8.0.5 +version: 8.0.6 annotations: truecharts.org/catagories: | - mutlimedia diff --git a/stable/podgrab/8.0.5/README.md b/stable/podgrab/8.0.6/README.md similarity index 100% rename from stable/podgrab/8.0.5/README.md rename to stable/podgrab/8.0.6/README.md diff --git a/stable/podgrab/8.0.5/app-readme.md b/stable/podgrab/8.0.6/app-readme.md similarity index 100% rename from stable/podgrab/8.0.5/app-readme.md rename to stable/podgrab/8.0.6/app-readme.md diff --git a/stable/pwndrop/0.0.5/charts/common-8.9.24.tgz b/stable/podgrab/8.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/pwndrop/0.0.5/charts/common-8.9.24.tgz rename to stable/podgrab/8.0.6/charts/common-8.9.24.tgz diff --git a/stable/podgrab/8.0.5/helm-values.md b/stable/podgrab/8.0.6/helm-values.md similarity index 100% rename from stable/podgrab/8.0.5/helm-values.md rename to stable/podgrab/8.0.6/helm-values.md diff --git a/stable/podgrab/8.0.5/ix_values.yaml b/stable/podgrab/8.0.6/ix_values.yaml similarity index 100% rename from stable/podgrab/8.0.5/ix_values.yaml rename to stable/podgrab/8.0.6/ix_values.yaml diff --git a/stable/podgrab/8.0.5/questions.yaml b/stable/podgrab/8.0.6/questions.yaml similarity index 99% rename from stable/podgrab/8.0.5/questions.yaml rename to stable/podgrab/8.0.6/questions.yaml index 2ae1cb7ffca..7780f717607 100644 --- a/stable/podgrab/8.0.5/questions.yaml +++ b/stable/podgrab/8.0.6/questions.yaml @@ -364,7 +364,6 @@ questions: schema: type: int default: 10093 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/podgrab/8.0.5/security.md b/stable/podgrab/8.0.6/security.md similarity index 100% rename from stable/podgrab/8.0.5/security.md rename to stable/podgrab/8.0.6/security.md diff --git a/stable/projectsend/0.0.5/templates/common.yaml b/stable/podgrab/8.0.6/templates/common.yaml similarity index 100% rename from stable/projectsend/0.0.5/templates/common.yaml rename to stable/podgrab/8.0.6/templates/common.yaml diff --git a/stable/pwndrop/0.0.5/values.yaml b/stable/podgrab/8.0.6/values.yaml similarity index 100% rename from stable/pwndrop/0.0.5/values.yaml rename to stable/podgrab/8.0.6/values.yaml diff --git a/stable/pretend-youre-xyzzy/4.0.24/Chart.lock b/stable/pretend-youre-xyzzy/4.0.24/Chart.lock deleted file mode 100644 index 99ae6d184de..00000000000 --- a/stable/pretend-youre-xyzzy/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:41.332426238Z" diff --git a/stable/pretend-youre-xyzzy/4.0.24/CHANGELOG.md b/stable/pretend-youre-xyzzy/4.0.25/CHANGELOG.md similarity index 90% rename from stable/pretend-youre-xyzzy/4.0.24/CHANGELOG.md rename to stable/pretend-youre-xyzzy/4.0.25/CHANGELOG.md index b1dc425c78d..a59b866d7ac 100644 --- a/stable/pretend-youre-xyzzy/4.0.24/CHANGELOG.md +++ b/stable/pretend-youre-xyzzy/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [pretend-youre-xyzzy-4.0.25](https://github.com/truecharts/apps/compare/pretend-youre-xyzzy-4.0.24...pretend-youre-xyzzy-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [pretend-youre-xyzzy-4.0.24](https://github.com/truecharts/apps/compare/pretend-youre-xyzzy-4.0.23...pretend-youre-xyzzy-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ #### Chore * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [pretend-youre-xyzzy-4.0.16](https://github.com/truecharts/apps/compare/pretend-youre-xyzzy-4.0.15...pretend-youre-xyzzy-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - diff --git a/stable/pydio-cells/0.0.6/CONFIG.md b/stable/pretend-youre-xyzzy/4.0.25/CONFIG.md similarity index 100% rename from stable/pydio-cells/0.0.6/CONFIG.md rename to stable/pretend-youre-xyzzy/4.0.25/CONFIG.md diff --git a/stable/pretend-youre-xyzzy/4.0.25/Chart.lock b/stable/pretend-youre-xyzzy/4.0.25/Chart.lock new file mode 100644 index 00000000000..a832e1406f2 --- /dev/null +++ b/stable/pretend-youre-xyzzy/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:21.006816121Z" diff --git a/stable/pretend-youre-xyzzy/4.0.24/Chart.yaml b/stable/pretend-youre-xyzzy/4.0.25/Chart.yaml similarity index 97% rename from stable/pretend-youre-xyzzy/4.0.24/Chart.yaml rename to stable/pretend-youre-xyzzy/4.0.25/Chart.yaml index 49d1b499bdb..6bac658cfb9 100644 --- a/stable/pretend-youre-xyzzy/4.0.24/Chart.yaml +++ b/stable/pretend-youre-xyzzy/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: pretend-youre-xyzzy sources: - https://github.com/ajanata/PretendYoureXyzzy - https://github.com/emcniece/DockerYourXyzzy -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/pretend-youre-xyzzy/4.0.24/README.md b/stable/pretend-youre-xyzzy/4.0.25/README.md similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/README.md rename to stable/pretend-youre-xyzzy/4.0.25/README.md diff --git a/stable/pretend-youre-xyzzy/4.0.24/app-readme.md b/stable/pretend-youre-xyzzy/4.0.25/app-readme.md similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/app-readme.md rename to stable/pretend-youre-xyzzy/4.0.25/app-readme.md diff --git a/stable/pydio-cells/0.0.6/charts/common-8.9.24.tgz b/stable/pretend-youre-xyzzy/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/pydio-cells/0.0.6/charts/common-8.9.24.tgz rename to stable/pretend-youre-xyzzy/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/pretend-youre-xyzzy/4.0.24/helm-values.md b/stable/pretend-youre-xyzzy/4.0.25/helm-values.md similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/helm-values.md rename to stable/pretend-youre-xyzzy/4.0.25/helm-values.md diff --git a/stable/pretend-youre-xyzzy/4.0.24/ix_values.yaml b/stable/pretend-youre-xyzzy/4.0.25/ix_values.yaml similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/ix_values.yaml rename to stable/pretend-youre-xyzzy/4.0.25/ix_values.yaml diff --git a/stable/pretend-youre-xyzzy/4.0.24/questions.yaml b/stable/pretend-youre-xyzzy/4.0.25/questions.yaml similarity index 99% rename from stable/pretend-youre-xyzzy/4.0.24/questions.yaml rename to stable/pretend-youre-xyzzy/4.0.25/questions.yaml index ca4f548a611..14c4fb7a27b 100644 --- a/stable/pretend-youre-xyzzy/4.0.24/questions.yaml +++ b/stable/pretend-youre-xyzzy/4.0.25/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10094 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/pretend-youre-xyzzy/4.0.24/security.md b/stable/pretend-youre-xyzzy/4.0.25/security.md similarity index 100% rename from stable/pretend-youre-xyzzy/4.0.24/security.md rename to stable/pretend-youre-xyzzy/4.0.25/security.md diff --git a/stable/protonmail-bridge/4.0.24/templates/common.yaml b/stable/pretend-youre-xyzzy/4.0.25/templates/common.yaml similarity index 100% rename from stable/protonmail-bridge/4.0.24/templates/common.yaml rename to stable/pretend-youre-xyzzy/4.0.25/templates/common.yaml diff --git a/stable/pydio-cells/0.0.6/values.yaml b/stable/pretend-youre-xyzzy/4.0.25/values.yaml similarity index 100% rename from stable/pydio-cells/0.0.6/values.yaml rename to stable/pretend-youre-xyzzy/4.0.25/values.yaml diff --git a/stable/projectsend/0.0.5/Chart.lock b/stable/projectsend/0.0.5/Chart.lock deleted file mode 100644 index 567429152bd..00000000000 --- a/stable/projectsend/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:50.170437916Z" diff --git a/stable/projectsend/0.0.5/CHANGELOG.md b/stable/projectsend/0.0.6/CHANGELOG.md similarity index 86% rename from stable/projectsend/0.0.5/CHANGELOG.md rename to stable/projectsend/0.0.6/CHANGELOG.md index 42d2c8ae860..eb186868037 100644 --- a/stable/projectsend/0.0.5/CHANGELOG.md +++ b/stable/projectsend/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [projectsend-0.0.6](https://github.com/truecharts/apps/compare/projectsend-0.0.5...projectsend-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [projectsend-0.0.5](https://github.com/truecharts/apps/compare/projectsend-0.0.4...projectsend-0.0.5) (2021-12-19) diff --git a/stable/pyload/4.0.24/CONFIG.md b/stable/projectsend/0.0.6/CONFIG.md similarity index 100% rename from stable/pyload/4.0.24/CONFIG.md rename to stable/projectsend/0.0.6/CONFIG.md diff --git a/stable/projectsend/0.0.6/Chart.lock b/stable/projectsend/0.0.6/Chart.lock new file mode 100644 index 00000000000..79c25030c12 --- /dev/null +++ b/stable/projectsend/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:30.897397193Z" diff --git a/stable/projectsend/0.0.5/Chart.yaml b/stable/projectsend/0.0.6/Chart.yaml similarity index 98% rename from stable/projectsend/0.0.5/Chart.yaml rename to stable/projectsend/0.0.6/Chart.yaml index 6871776bae0..4c8e65e221f 100644 --- a/stable/projectsend/0.0.5/Chart.yaml +++ b/stable/projectsend/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: projectsend -version: 0.0.5 +version: 0.0.6 appVersion: "2021.12.10" description: Projectsend is a self-hosted application that lets you upload files and assign them to specific clients that you create yourself. type: application diff --git a/stable/projectsend/0.0.5/README.md b/stable/projectsend/0.0.6/README.md similarity index 100% rename from stable/projectsend/0.0.5/README.md rename to stable/projectsend/0.0.6/README.md diff --git a/stable/projectsend/0.0.5/app-readme.md b/stable/projectsend/0.0.6/app-readme.md similarity index 100% rename from stable/projectsend/0.0.5/app-readme.md rename to stable/projectsend/0.0.6/app-readme.md diff --git a/stable/pyload/4.0.24/charts/common-8.9.24.tgz b/stable/projectsend/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/pyload/4.0.24/charts/common-8.9.24.tgz rename to stable/projectsend/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/projectsend/0.0.5/helm-values.md b/stable/projectsend/0.0.6/helm-values.md similarity index 100% rename from stable/projectsend/0.0.5/helm-values.md rename to stable/projectsend/0.0.6/helm-values.md diff --git a/stable/projectsend/0.0.5/ix_values.yaml b/stable/projectsend/0.0.6/ix_values.yaml similarity index 100% rename from stable/projectsend/0.0.5/ix_values.yaml rename to stable/projectsend/0.0.6/ix_values.yaml diff --git a/stable/projectsend/0.0.5/questions.yaml b/stable/projectsend/0.0.6/questions.yaml similarity index 100% rename from stable/projectsend/0.0.5/questions.yaml rename to stable/projectsend/0.0.6/questions.yaml diff --git a/stable/projectsend/0.0.5/security.md b/stable/projectsend/0.0.6/security.md similarity index 100% rename from stable/projectsend/0.0.5/security.md rename to stable/projectsend/0.0.6/security.md diff --git a/stable/prowlarr/4.0.43/templates/common.yaml b/stable/projectsend/0.0.6/templates/common.yaml similarity index 100% rename from stable/prowlarr/4.0.43/templates/common.yaml rename to stable/projectsend/0.0.6/templates/common.yaml diff --git a/stable/pyload/4.0.24/values.yaml b/stable/projectsend/0.0.6/values.yaml similarity index 100% rename from stable/pyload/4.0.24/values.yaml rename to stable/projectsend/0.0.6/values.yaml diff --git a/stable/promcord/2.0.5/Chart.lock b/stable/promcord/2.0.5/Chart.lock deleted file mode 100644 index 0e09ffe4c60..00000000000 --- a/stable/promcord/2.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:44:56.207150799Z" diff --git a/stable/promcord/2.0.5/CHANGELOG.md b/stable/promcord/2.0.6/CHANGELOG.md similarity index 92% rename from stable/promcord/2.0.5/CHANGELOG.md rename to stable/promcord/2.0.6/CHANGELOG.md index 9510314271f..b9295e87557 100644 --- a/stable/promcord/2.0.5/CHANGELOG.md +++ b/stable/promcord/2.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [promcord-2.0.6](https://github.com/truecharts/apps/compare/promcord-2.0.5...promcord-2.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [promcord-2.0.5](https://github.com/truecharts/apps/compare/promcord-2.0.4...promcord-2.0.5) (2021-12-19) @@ -88,12 +97,3 @@ ### [promcord-1.0.6](https://github.com/truecharts/apps/compare/promcord-1.0.5...promcord-1.0.6) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [promcord-1.0.5](https://github.com/truecharts/apps/compare/promcord-1.0.4...promcord-1.0.5) (2021-12-05) - diff --git a/stable/pylon/0.0.5/CONFIG.md b/stable/promcord/2.0.6/CONFIG.md similarity index 100% rename from stable/pylon/0.0.5/CONFIG.md rename to stable/promcord/2.0.6/CONFIG.md diff --git a/stable/promcord/2.0.6/Chart.lock b/stable/promcord/2.0.6/Chart.lock new file mode 100644 index 00000000000..0e25a38ac9d --- /dev/null +++ b/stable/promcord/2.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:42.836596411Z" diff --git a/stable/promcord/2.0.5/Chart.yaml b/stable/promcord/2.0.6/Chart.yaml similarity index 97% rename from stable/promcord/2.0.5/Chart.yaml rename to stable/promcord/2.0.6/Chart.yaml index 69ec369fd10..ffe79e8cc40 100644 --- a/stable/promcord/2.0.5/Chart.yaml +++ b/stable/promcord/2.0.6/Chart.yaml @@ -21,7 +21,7 @@ name: promcord sources: - https://github.com/nimarion/promcord type: application -version: 2.0.5 +version: 2.0.6 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/promcord/2.0.5/README.md b/stable/promcord/2.0.6/README.md similarity index 100% rename from stable/promcord/2.0.5/README.md rename to stable/promcord/2.0.6/README.md diff --git a/stable/promcord/2.0.5/app-readme.md b/stable/promcord/2.0.6/app-readme.md similarity index 100% rename from stable/promcord/2.0.5/app-readme.md rename to stable/promcord/2.0.6/app-readme.md diff --git a/stable/pylon/0.0.5/charts/common-8.9.24.tgz b/stable/promcord/2.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/pylon/0.0.5/charts/common-8.9.24.tgz rename to stable/promcord/2.0.6/charts/common-8.9.24.tgz diff --git a/stable/promcord/2.0.5/ci/no-values.yaml b/stable/promcord/2.0.6/ci/no-values.yaml similarity index 100% rename from stable/promcord/2.0.5/ci/no-values.yaml rename to stable/promcord/2.0.6/ci/no-values.yaml diff --git a/stable/promcord/2.0.5/helm-values.md b/stable/promcord/2.0.6/helm-values.md similarity index 100% rename from stable/promcord/2.0.5/helm-values.md rename to stable/promcord/2.0.6/helm-values.md diff --git a/stable/promcord/2.0.5/ix_values.yaml b/stable/promcord/2.0.6/ix_values.yaml similarity index 100% rename from stable/promcord/2.0.5/ix_values.yaml rename to stable/promcord/2.0.6/ix_values.yaml diff --git a/stable/promcord/2.0.5/questions.yaml b/stable/promcord/2.0.6/questions.yaml similarity index 100% rename from stable/promcord/2.0.5/questions.yaml rename to stable/promcord/2.0.6/questions.yaml diff --git a/stable/promcord/2.0.5/security.md b/stable/promcord/2.0.6/security.md similarity index 100% rename from stable/promcord/2.0.5/security.md rename to stable/promcord/2.0.6/security.md diff --git a/stable/promcord/2.0.5/templates/common.yaml b/stable/promcord/2.0.6/templates/common.yaml similarity index 100% rename from stable/promcord/2.0.5/templates/common.yaml rename to stable/promcord/2.0.6/templates/common.yaml diff --git a/stable/promcord/2.0.5/templates/prometheusrules.yaml b/stable/promcord/2.0.6/templates/prometheusrules.yaml similarity index 100% rename from stable/promcord/2.0.5/templates/prometheusrules.yaml rename to stable/promcord/2.0.6/templates/prometheusrules.yaml diff --git a/stable/promcord/2.0.5/templates/servicemonitor.yaml b/stable/promcord/2.0.6/templates/servicemonitor.yaml similarity index 100% rename from stable/promcord/2.0.5/templates/servicemonitor.yaml rename to stable/promcord/2.0.6/templates/servicemonitor.yaml diff --git a/stable/pylon/0.0.5/values.yaml b/stable/promcord/2.0.6/values.yaml similarity index 100% rename from stable/pylon/0.0.5/values.yaml rename to stable/promcord/2.0.6/values.yaml diff --git a/stable/protonmail-bridge/4.0.24/Chart.lock b/stable/protonmail-bridge/4.0.24/Chart.lock deleted file mode 100644 index 3bf712b7179..00000000000 --- a/stable/protonmail-bridge/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:06.862071601Z" diff --git a/stable/protonmail-bridge/4.0.24/CHANGELOG.md b/stable/protonmail-bridge/4.0.25/CHANGELOG.md similarity index 90% rename from stable/protonmail-bridge/4.0.24/CHANGELOG.md rename to stable/protonmail-bridge/4.0.25/CHANGELOG.md index 0480978ffcb..389a005d22a 100644 --- a/stable/protonmail-bridge/4.0.24/CHANGELOG.md +++ b/stable/protonmail-bridge/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [protonmail-bridge-4.0.25](https://github.com/truecharts/apps/compare/protonmail-bridge-4.0.24...protonmail-bridge-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [protonmail-bridge-4.0.24](https://github.com/truecharts/apps/compare/protonmail-bridge-4.0.23...protonmail-bridge-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ #### Chore * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [protonmail-bridge-4.0.16](https://github.com/truecharts/apps/compare/protonmail-bridge-4.0.15...protonmail-bridge-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - diff --git a/stable/qbittorrent/9.0.27/CONFIG.md b/stable/protonmail-bridge/4.0.25/CONFIG.md similarity index 100% rename from stable/qbittorrent/9.0.27/CONFIG.md rename to stable/protonmail-bridge/4.0.25/CONFIG.md diff --git a/stable/protonmail-bridge/4.0.25/Chart.lock b/stable/protonmail-bridge/4.0.25/Chart.lock new file mode 100644 index 00000000000..a9b78c3c146 --- /dev/null +++ b/stable/protonmail-bridge/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:46.479044735Z" diff --git a/stable/protonmail-bridge/4.0.24/Chart.yaml b/stable/protonmail-bridge/4.0.25/Chart.yaml similarity index 97% rename from stable/protonmail-bridge/4.0.24/Chart.yaml rename to stable/protonmail-bridge/4.0.25/Chart.yaml index 9cf462fbb3f..5f2a715545e 100644 --- a/stable/protonmail-bridge/4.0.24/Chart.yaml +++ b/stable/protonmail-bridge/4.0.25/Chart.yaml @@ -19,7 +19,7 @@ name: protonmail-bridge sources: - https://github.com/shenxn/protonmail-bridge-docker - https://hub.docker.com/r/shenxn/protonmail-bridge -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/protonmail-bridge/4.0.24/README.md b/stable/protonmail-bridge/4.0.25/README.md similarity index 100% rename from stable/protonmail-bridge/4.0.24/README.md rename to stable/protonmail-bridge/4.0.25/README.md diff --git a/stable/protonmail-bridge/4.0.24/app-readme.md b/stable/protonmail-bridge/4.0.25/app-readme.md similarity index 100% rename from stable/protonmail-bridge/4.0.24/app-readme.md rename to stable/protonmail-bridge/4.0.25/app-readme.md diff --git a/stable/qbittorrent/9.0.27/charts/common-8.9.24.tgz b/stable/protonmail-bridge/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/qbittorrent/9.0.27/charts/common-8.9.24.tgz rename to stable/protonmail-bridge/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/protonmail-bridge/4.0.24/helm-values.md b/stable/protonmail-bridge/4.0.25/helm-values.md similarity index 100% rename from stable/protonmail-bridge/4.0.24/helm-values.md rename to stable/protonmail-bridge/4.0.25/helm-values.md diff --git a/stable/protonmail-bridge/4.0.24/ix_values.yaml b/stable/protonmail-bridge/4.0.25/ix_values.yaml similarity index 100% rename from stable/protonmail-bridge/4.0.24/ix_values.yaml rename to stable/protonmail-bridge/4.0.25/ix_values.yaml diff --git a/stable/protonmail-bridge/4.0.24/questions.yaml b/stable/protonmail-bridge/4.0.25/questions.yaml similarity index 99% rename from stable/protonmail-bridge/4.0.24/questions.yaml rename to stable/protonmail-bridge/4.0.25/questions.yaml index 4ee2b3a9edc..34ca044b814 100644 --- a/stable/protonmail-bridge/4.0.24/questions.yaml +++ b/stable/protonmail-bridge/4.0.25/questions.yaml @@ -335,7 +335,6 @@ questions: schema: type: int default: 25 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/protonmail-bridge/4.0.24/security.md b/stable/protonmail-bridge/4.0.25/security.md similarity index 100% rename from stable/protonmail-bridge/4.0.24/security.md rename to stable/protonmail-bridge/4.0.25/security.md diff --git a/stable/pwndrop/0.0.5/templates/common.yaml b/stable/protonmail-bridge/4.0.25/templates/common.yaml similarity index 100% rename from stable/pwndrop/0.0.5/templates/common.yaml rename to stable/protonmail-bridge/4.0.25/templates/common.yaml diff --git a/stable/qbittorrent/9.0.27/values.yaml b/stable/protonmail-bridge/4.0.25/values.yaml similarity index 100% rename from stable/qbittorrent/9.0.27/values.yaml rename to stable/protonmail-bridge/4.0.25/values.yaml diff --git a/stable/prowlarr/4.0.43/Chart.lock b/stable/prowlarr/4.0.43/Chart.lock deleted file mode 100644 index 44c9e2e525d..00000000000 --- a/stable/prowlarr/4.0.43/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:14.810515549Z" diff --git a/stable/prowlarr/4.0.43/CHANGELOG.md b/stable/prowlarr/4.0.44/CHANGELOG.md similarity index 90% rename from stable/prowlarr/4.0.43/CHANGELOG.md rename to stable/prowlarr/4.0.44/CHANGELOG.md index 2b29cbca717..9cf71a3a928 100644 --- a/stable/prowlarr/4.0.43/CHANGELOG.md +++ b/stable/prowlarr/4.0.44/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [prowlarr-4.0.44](https://github.com/truecharts/apps/compare/prowlarr-4.0.43...prowlarr-4.0.44) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [prowlarr-4.0.43](https://github.com/truecharts/apps/compare/prowlarr-4.0.42...prowlarr-4.0.43) (2021-12-19) @@ -87,13 +97,3 @@ ### [prowlarr-4.0.34](https://github.com/truecharts/apps/compare/prowlarr-4.0.33...prowlarr-4.0.34) (2021-12-11) -#### Chore - -* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) - - - - -### [prowlarr-4.0.33](https://github.com/truecharts/apps/compare/prowlarr-4.0.32...prowlarr-4.0.33) (2021-12-08) - -#### Chore diff --git a/stable/quassel-core/0.0.6/CONFIG.md b/stable/prowlarr/4.0.44/CONFIG.md similarity index 100% rename from stable/quassel-core/0.0.6/CONFIG.md rename to stable/prowlarr/4.0.44/CONFIG.md diff --git a/stable/prowlarr/4.0.44/Chart.lock b/stable/prowlarr/4.0.44/Chart.lock new file mode 100644 index 00000000000..45525db2352 --- /dev/null +++ b/stable/prowlarr/4.0.44/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:31:56.684057439Z" diff --git a/stable/prowlarr/4.0.43/Chart.yaml b/stable/prowlarr/4.0.44/Chart.yaml similarity index 97% rename from stable/prowlarr/4.0.43/Chart.yaml rename to stable/prowlarr/4.0.44/Chart.yaml index 18f30b89227..9a8955ef52a 100644 --- a/stable/prowlarr/4.0.43/Chart.yaml +++ b/stable/prowlarr/4.0.44/Chart.yaml @@ -21,7 +21,7 @@ name: prowlarr sources: - https://github.com/Prowlarr/Prowlarr - https://github.com/k8s-at-home/container-images -version: 4.0.43 +version: 4.0.44 annotations: truecharts.org/catagories: | - media diff --git a/stable/prowlarr/4.0.43/README.md b/stable/prowlarr/4.0.44/README.md similarity index 100% rename from stable/prowlarr/4.0.43/README.md rename to stable/prowlarr/4.0.44/README.md diff --git a/stable/prowlarr/4.0.43/app-readme.md b/stable/prowlarr/4.0.44/app-readme.md similarity index 100% rename from stable/prowlarr/4.0.43/app-readme.md rename to stable/prowlarr/4.0.44/app-readme.md diff --git a/stable/quassel-core/0.0.6/charts/common-8.9.24.tgz b/stable/prowlarr/4.0.44/charts/common-8.9.24.tgz similarity index 100% rename from stable/quassel-core/0.0.6/charts/common-8.9.24.tgz rename to stable/prowlarr/4.0.44/charts/common-8.9.24.tgz diff --git a/stable/prowlarr/4.0.43/helm-values.md b/stable/prowlarr/4.0.44/helm-values.md similarity index 100% rename from stable/prowlarr/4.0.43/helm-values.md rename to stable/prowlarr/4.0.44/helm-values.md diff --git a/stable/prowlarr/4.0.43/ix_values.yaml b/stable/prowlarr/4.0.44/ix_values.yaml similarity index 100% rename from stable/prowlarr/4.0.43/ix_values.yaml rename to stable/prowlarr/4.0.44/ix_values.yaml diff --git a/stable/prowlarr/4.0.43/questions.yaml b/stable/prowlarr/4.0.44/questions.yaml similarity index 99% rename from stable/prowlarr/4.0.43/questions.yaml rename to stable/prowlarr/4.0.44/questions.yaml index 8b884a71be9..62e10b2f1ea 100644 --- a/stable/prowlarr/4.0.43/questions.yaml +++ b/stable/prowlarr/4.0.44/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 9696 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/prowlarr/4.0.43/security.md b/stable/prowlarr/4.0.44/security.md similarity index 100% rename from stable/prowlarr/4.0.43/security.md rename to stable/prowlarr/4.0.44/security.md diff --git a/stable/pydio-cells/0.0.6/templates/common.yaml b/stable/prowlarr/4.0.44/templates/common.yaml similarity index 100% rename from stable/pydio-cells/0.0.6/templates/common.yaml rename to stable/prowlarr/4.0.44/templates/common.yaml diff --git a/stable/quassel-core/0.0.6/values.yaml b/stable/prowlarr/4.0.44/values.yaml similarity index 100% rename from stable/quassel-core/0.0.6/values.yaml rename to stable/prowlarr/4.0.44/values.yaml diff --git a/stable/pwndrop/0.0.5/Chart.lock b/stable/pwndrop/0.0.5/Chart.lock deleted file mode 100644 index 1d7c35a0b2e..00000000000 --- a/stable/pwndrop/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:25.894416774Z" diff --git a/stable/pwndrop/0.0.5/CHANGELOG.md b/stable/pwndrop/0.0.6/CHANGELOG.md similarity index 86% rename from stable/pwndrop/0.0.5/CHANGELOG.md rename to stable/pwndrop/0.0.6/CHANGELOG.md index bf409856fea..fc3dbdbac92 100644 --- a/stable/pwndrop/0.0.5/CHANGELOG.md +++ b/stable/pwndrop/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [pwndrop-0.0.6](https://github.com/truecharts/apps/compare/pwndrop-0.0.5...pwndrop-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [pwndrop-0.0.5](https://github.com/truecharts/apps/compare/pwndrop-0.0.4...pwndrop-0.0.5) (2021-12-19) diff --git a/stable/quassel-web/0.0.5/CONFIG.md b/stable/pwndrop/0.0.6/CONFIG.md similarity index 100% rename from stable/quassel-web/0.0.5/CONFIG.md rename to stable/pwndrop/0.0.6/CONFIG.md diff --git a/stable/pwndrop/0.0.6/Chart.lock b/stable/pwndrop/0.0.6/Chart.lock new file mode 100644 index 00000000000..4df77e8aa96 --- /dev/null +++ b/stable/pwndrop/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:04.124643725Z" diff --git a/stable/pwndrop/0.0.5/Chart.yaml b/stable/pwndrop/0.0.6/Chart.yaml similarity index 98% rename from stable/pwndrop/0.0.5/Chart.yaml rename to stable/pwndrop/0.0.6/Chart.yaml index 3cc7f050ccf..fe52e353080 100644 --- a/stable/pwndrop/0.0.5/Chart.yaml +++ b/stable/pwndrop/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: pwndrop -version: 0.0.5 +version: 0.0.6 appVersion: "1.0.1" description: Pwndrop is a self-deployable file hosting service for sending out red teaming payloads or securely sharing your private files over HTTP and WebDAV. type: application diff --git a/stable/pwndrop/0.0.5/README.md b/stable/pwndrop/0.0.6/README.md similarity index 100% rename from stable/pwndrop/0.0.5/README.md rename to stable/pwndrop/0.0.6/README.md diff --git a/stable/pwndrop/0.0.5/app-readme.md b/stable/pwndrop/0.0.6/app-readme.md similarity index 100% rename from stable/pwndrop/0.0.5/app-readme.md rename to stable/pwndrop/0.0.6/app-readme.md diff --git a/stable/quassel-web/0.0.5/charts/common-8.9.24.tgz b/stable/pwndrop/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/quassel-web/0.0.5/charts/common-8.9.24.tgz rename to stable/pwndrop/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/pwndrop/0.0.5/helm-values.md b/stable/pwndrop/0.0.6/helm-values.md similarity index 100% rename from stable/pwndrop/0.0.5/helm-values.md rename to stable/pwndrop/0.0.6/helm-values.md diff --git a/stable/pwndrop/0.0.5/ix_values.yaml b/stable/pwndrop/0.0.6/ix_values.yaml similarity index 100% rename from stable/pwndrop/0.0.5/ix_values.yaml rename to stable/pwndrop/0.0.6/ix_values.yaml diff --git a/stable/pwndrop/0.0.5/questions.yaml b/stable/pwndrop/0.0.6/questions.yaml similarity index 100% rename from stable/pwndrop/0.0.5/questions.yaml rename to stable/pwndrop/0.0.6/questions.yaml diff --git a/stable/pwndrop/0.0.5/security.md b/stable/pwndrop/0.0.6/security.md similarity index 100% rename from stable/pwndrop/0.0.5/security.md rename to stable/pwndrop/0.0.6/security.md diff --git a/stable/pyload/4.0.24/templates/common.yaml b/stable/pwndrop/0.0.6/templates/common.yaml similarity index 100% rename from stable/pyload/4.0.24/templates/common.yaml rename to stable/pwndrop/0.0.6/templates/common.yaml diff --git a/stable/quassel-web/0.0.5/values.yaml b/stable/pwndrop/0.0.6/values.yaml similarity index 100% rename from stable/quassel-web/0.0.5/values.yaml rename to stable/pwndrop/0.0.6/values.yaml diff --git a/stable/pydio-cells/0.0.6/Chart.lock b/stable/pydio-cells/0.0.6/Chart.lock deleted file mode 100644 index 308c89b9c36..00000000000 --- a/stable/pydio-cells/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:32.538619674Z" diff --git a/stable/pydio-cells/0.0.6/CHANGELOG.md b/stable/pydio-cells/0.0.7/CHANGELOG.md similarity index 88% rename from stable/pydio-cells/0.0.6/CHANGELOG.md rename to stable/pydio-cells/0.0.7/CHANGELOG.md index 62b516acd98..36b3b8e7e68 100644 --- a/stable/pydio-cells/0.0.6/CHANGELOG.md +++ b/stable/pydio-cells/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [pydio-cells-0.0.7](https://github.com/truecharts/apps/compare/pydio-cells-0.0.6...pydio-cells-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [pydio-cells-0.0.6](https://github.com/truecharts/apps/compare/pydio-cells-0.0.5...pydio-cells-0.0.6) (2021-12-19) diff --git a/stable/radarr/9.0.25/CONFIG.md b/stable/pydio-cells/0.0.7/CONFIG.md similarity index 100% rename from stable/radarr/9.0.25/CONFIG.md rename to stable/pydio-cells/0.0.7/CONFIG.md diff --git a/stable/pydio-cells/0.0.7/Chart.lock b/stable/pydio-cells/0.0.7/Chart.lock new file mode 100644 index 00000000000..1ccac5190b3 --- /dev/null +++ b/stable/pydio-cells/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:13.063266289Z" diff --git a/stable/pydio-cells/0.0.6/Chart.yaml b/stable/pydio-cells/0.0.7/Chart.yaml similarity index 98% rename from stable/pydio-cells/0.0.6/Chart.yaml rename to stable/pydio-cells/0.0.7/Chart.yaml index b2b4f059a4f..f24aab42a43 100644 --- a/stable/pydio-cells/0.0.6/Chart.yaml +++ b/stable/pydio-cells/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: pydio-cells -version: 0.0.6 +version: 0.0.7 appVersion: "3.0.3" description: Pydio-cells is the nextgen file sharing platform for organizations. type: application diff --git a/stable/pydio-cells/0.0.6/README.md b/stable/pydio-cells/0.0.7/README.md similarity index 100% rename from stable/pydio-cells/0.0.6/README.md rename to stable/pydio-cells/0.0.7/README.md diff --git a/stable/pydio-cells/0.0.6/app-readme.md b/stable/pydio-cells/0.0.7/app-readme.md similarity index 100% rename from stable/pydio-cells/0.0.6/app-readme.md rename to stable/pydio-cells/0.0.7/app-readme.md diff --git a/stable/radarr/9.0.25/charts/common-8.9.24.tgz b/stable/pydio-cells/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/radarr/9.0.25/charts/common-8.9.24.tgz rename to stable/pydio-cells/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/pydio-cells/0.0.6/helm-values.md b/stable/pydio-cells/0.0.7/helm-values.md similarity index 100% rename from stable/pydio-cells/0.0.6/helm-values.md rename to stable/pydio-cells/0.0.7/helm-values.md diff --git a/stable/pydio-cells/0.0.6/ix_values.yaml b/stable/pydio-cells/0.0.7/ix_values.yaml similarity index 100% rename from stable/pydio-cells/0.0.6/ix_values.yaml rename to stable/pydio-cells/0.0.7/ix_values.yaml diff --git a/stable/pydio-cells/0.0.6/questions.yaml b/stable/pydio-cells/0.0.7/questions.yaml similarity index 100% rename from stable/pydio-cells/0.0.6/questions.yaml rename to stable/pydio-cells/0.0.7/questions.yaml diff --git a/stable/pydio-cells/0.0.6/security.md b/stable/pydio-cells/0.0.7/security.md similarity index 100% rename from stable/pydio-cells/0.0.6/security.md rename to stable/pydio-cells/0.0.7/security.md diff --git a/stable/pylon/0.0.5/templates/common.yaml b/stable/pydio-cells/0.0.7/templates/common.yaml similarity index 100% rename from stable/pylon/0.0.5/templates/common.yaml rename to stable/pydio-cells/0.0.7/templates/common.yaml diff --git a/stable/radarr/9.0.25/values.yaml b/stable/pydio-cells/0.0.7/values.yaml similarity index 100% rename from stable/radarr/9.0.25/values.yaml rename to stable/pydio-cells/0.0.7/values.yaml diff --git a/stable/pyload/4.0.24/Chart.lock b/stable/pyload/4.0.24/Chart.lock deleted file mode 100644 index 3eb41033229..00000000000 --- a/stable/pyload/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:40.345531142Z" diff --git a/stable/pyload/4.0.24/CHANGELOG.md b/stable/pyload/4.0.25/CHANGELOG.md similarity index 90% rename from stable/pyload/4.0.24/CHANGELOG.md rename to stable/pyload/4.0.25/CHANGELOG.md index 31eeab6be55..53de0c6aca7 100644 --- a/stable/pyload/4.0.24/CHANGELOG.md +++ b/stable/pyload/4.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [pyload-4.0.25](https://github.com/truecharts/apps/compare/pyload-4.0.24...pyload-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [pyload-4.0.24](https://github.com/truecharts/apps/compare/pyload-4.0.23...pyload-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [pyload-4.0.16](https://github.com/truecharts/apps/compare/pyload-4.0.15...pyload-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [pyload-4.0.15](https://github.com/truecharts/apps/compare/pyload-4.0.14...pyload-4.0.15) (2021-12-04) diff --git a/stable/readarr/9.0.38/CONFIG.md b/stable/pyload/4.0.25/CONFIG.md similarity index 100% rename from stable/readarr/9.0.38/CONFIG.md rename to stable/pyload/4.0.25/CONFIG.md diff --git a/stable/pyload/4.0.25/Chart.lock b/stable/pyload/4.0.25/Chart.lock new file mode 100644 index 00000000000..24a6c7b2446 --- /dev/null +++ b/stable/pyload/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:21.192584769Z" diff --git a/stable/pyload/4.0.24/Chart.yaml b/stable/pyload/4.0.25/Chart.yaml similarity index 98% rename from stable/pyload/4.0.24/Chart.yaml rename to stable/pyload/4.0.25/Chart.yaml index e958d1ff15c..f41051b3f6f 100644 --- a/stable/pyload/4.0.24/Chart.yaml +++ b/stable/pyload/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: pyload sources: - https://github.com/pyload/pyload - https://hub.docker.com/r/linuxserver/pyload -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/pyload/4.0.24/README.md b/stable/pyload/4.0.25/README.md similarity index 100% rename from stable/pyload/4.0.24/README.md rename to stable/pyload/4.0.25/README.md diff --git a/stable/pyload/4.0.24/app-readme.md b/stable/pyload/4.0.25/app-readme.md similarity index 100% rename from stable/pyload/4.0.24/app-readme.md rename to stable/pyload/4.0.25/app-readme.md diff --git a/stable/readarr/9.0.38/charts/common-8.9.24.tgz b/stable/pyload/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/readarr/9.0.38/charts/common-8.9.24.tgz rename to stable/pyload/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/pyload/4.0.24/helm-values.md b/stable/pyload/4.0.25/helm-values.md similarity index 100% rename from stable/pyload/4.0.24/helm-values.md rename to stable/pyload/4.0.25/helm-values.md diff --git a/stable/pyload/4.0.24/ix_values.yaml b/stable/pyload/4.0.25/ix_values.yaml similarity index 100% rename from stable/pyload/4.0.24/ix_values.yaml rename to stable/pyload/4.0.25/ix_values.yaml diff --git a/stable/pyload/4.0.24/questions.yaml b/stable/pyload/4.0.25/questions.yaml similarity index 99% rename from stable/pyload/4.0.24/questions.yaml rename to stable/pyload/4.0.25/questions.yaml index 57a4b8add33..c6b4d1ffe5a 100644 --- a/stable/pyload/4.0.24/questions.yaml +++ b/stable/pyload/4.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10075 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/pyload/4.0.24/security.md b/stable/pyload/4.0.25/security.md similarity index 100% rename from stable/pyload/4.0.24/security.md rename to stable/pyload/4.0.25/security.md diff --git a/stable/quassel-core/0.0.6/templates/common.yaml b/stable/pyload/4.0.25/templates/common.yaml similarity index 100% rename from stable/quassel-core/0.0.6/templates/common.yaml rename to stable/pyload/4.0.25/templates/common.yaml diff --git a/stable/readarr/9.0.38/values.yaml b/stable/pyload/4.0.25/values.yaml similarity index 100% rename from stable/readarr/9.0.38/values.yaml rename to stable/pyload/4.0.25/values.yaml diff --git a/stable/pylon/0.0.5/Chart.lock b/stable/pylon/0.0.5/Chart.lock deleted file mode 100644 index 477fe856683..00000000000 --- a/stable/pylon/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:48.867168649Z" diff --git a/stable/pylon/0.0.5/CHANGELOG.md b/stable/pylon/0.0.6/CHANGELOG.md similarity index 86% rename from stable/pylon/0.0.5/CHANGELOG.md rename to stable/pylon/0.0.6/CHANGELOG.md index 43876da6bc7..9c66c0cd067 100644 --- a/stable/pylon/0.0.5/CHANGELOG.md +++ b/stable/pylon/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [pylon-0.0.6](https://github.com/truecharts/apps/compare/pylon-0.0.5...pylon-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [pylon-0.0.5](https://github.com/truecharts/apps/compare/pylon-0.0.4...pylon-0.0.5) (2021-12-19) diff --git a/stable/recipes/5.0.1/CONFIG.md b/stable/pylon/0.0.6/CONFIG.md similarity index 100% rename from stable/recipes/5.0.1/CONFIG.md rename to stable/pylon/0.0.6/CONFIG.md diff --git a/stable/pylon/0.0.6/Chart.lock b/stable/pylon/0.0.6/Chart.lock new file mode 100644 index 00000000000..73ab955d14d --- /dev/null +++ b/stable/pylon/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:33.436887846Z" diff --git a/stable/pylon/0.0.5/Chart.yaml b/stable/pylon/0.0.6/Chart.yaml similarity index 97% rename from stable/pylon/0.0.5/Chart.yaml rename to stable/pylon/0.0.6/Chart.yaml index 52ba8a76178..b3bd70812e5 100644 --- a/stable/pylon/0.0.5/Chart.yaml +++ b/stable/pylon/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: pylon -version: 0.0.5 +version: 0.0.6 appVersion: "2.7.0" description: Pylon is a web based integrated development environment. type: application diff --git a/stable/pylon/0.0.5/README.md b/stable/pylon/0.0.6/README.md similarity index 100% rename from stable/pylon/0.0.5/README.md rename to stable/pylon/0.0.6/README.md diff --git a/stable/pylon/0.0.5/app-readme.md b/stable/pylon/0.0.6/app-readme.md similarity index 100% rename from stable/pylon/0.0.5/app-readme.md rename to stable/pylon/0.0.6/app-readme.md diff --git a/stable/recipes/5.0.1/charts/common-8.9.24.tgz b/stable/pylon/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/recipes/5.0.1/charts/common-8.9.24.tgz rename to stable/pylon/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/pylon/0.0.5/helm-values.md b/stable/pylon/0.0.6/helm-values.md similarity index 100% rename from stable/pylon/0.0.5/helm-values.md rename to stable/pylon/0.0.6/helm-values.md diff --git a/stable/pylon/0.0.5/ix_values.yaml b/stable/pylon/0.0.6/ix_values.yaml similarity index 100% rename from stable/pylon/0.0.5/ix_values.yaml rename to stable/pylon/0.0.6/ix_values.yaml diff --git a/stable/pylon/0.0.5/questions.yaml b/stable/pylon/0.0.6/questions.yaml similarity index 100% rename from stable/pylon/0.0.5/questions.yaml rename to stable/pylon/0.0.6/questions.yaml diff --git a/stable/pylon/0.0.5/security.md b/stable/pylon/0.0.6/security.md similarity index 100% rename from stable/pylon/0.0.5/security.md rename to stable/pylon/0.0.6/security.md diff --git a/stable/quassel-web/0.0.5/templates/common.yaml b/stable/pylon/0.0.6/templates/common.yaml similarity index 100% rename from stable/quassel-web/0.0.5/templates/common.yaml rename to stable/pylon/0.0.6/templates/common.yaml diff --git a/stable/recipes/5.0.1/values.yaml b/stable/pylon/0.0.6/values.yaml similarity index 100% rename from stable/recipes/5.0.1/values.yaml rename to stable/pylon/0.0.6/values.yaml diff --git a/stable/qbittorrent/9.0.27/Chart.lock b/stable/qbittorrent/9.0.27/Chart.lock deleted file mode 100644 index 4f6376851b3..00000000000 --- a/stable/qbittorrent/9.0.27/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:45:54.104899935Z" diff --git a/stable/qbittorrent/9.0.27/CHANGELOG.md b/stable/qbittorrent/9.0.28/CHANGELOG.md similarity index 86% rename from stable/qbittorrent/9.0.27/CHANGELOG.md rename to stable/qbittorrent/9.0.28/CHANGELOG.md index 5616a3ebab2..844b507d9e1 100644 --- a/stable/qbittorrent/9.0.27/CHANGELOG.md +++ b/stable/qbittorrent/9.0.28/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [qbittorrent-9.0.28](https://github.com/truecharts/apps/compare/qbittorrent-9.0.27...qbittorrent-9.0.28) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [qbittorrent-9.0.27](https://github.com/truecharts/apps/compare/qbittorrent-9.0.26...qbittorrent-9.0.27) (2021-12-19) @@ -86,14 +97,3 @@ #### Chore * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [qbittorrent-9.0.19](https://github.com/truecharts/apps/compare/qbittorrent-9.0.18...qbittorrent-9.0.19) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - diff --git a/stable/reg/4.0.23/CONFIG.md b/stable/qbittorrent/9.0.28/CONFIG.md similarity index 100% rename from stable/reg/4.0.23/CONFIG.md rename to stable/qbittorrent/9.0.28/CONFIG.md diff --git a/stable/qbittorrent/9.0.28/Chart.lock b/stable/qbittorrent/9.0.28/Chart.lock new file mode 100644 index 00000000000..0ff45efcfc4 --- /dev/null +++ b/stable/qbittorrent/9.0.28/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:35.866652259Z" diff --git a/stable/qbittorrent/9.0.27/Chart.yaml b/stable/qbittorrent/9.0.28/Chart.yaml similarity index 97% rename from stable/qbittorrent/9.0.27/Chart.yaml rename to stable/qbittorrent/9.0.28/Chart.yaml index a0025210b04..607046011bd 100644 --- a/stable/qbittorrent/9.0.27/Chart.yaml +++ b/stable/qbittorrent/9.0.28/Chart.yaml @@ -20,7 +20,7 @@ name: qbittorrent sources: - https://github.com/qbittorrent/qBittorrent type: application -version: 9.0.27 +version: 9.0.28 annotations: truecharts.org/catagories: | - media diff --git a/stable/qbittorrent/9.0.27/README.md b/stable/qbittorrent/9.0.28/README.md similarity index 100% rename from stable/qbittorrent/9.0.27/README.md rename to stable/qbittorrent/9.0.28/README.md diff --git a/stable/qbittorrent/9.0.27/app-readme.md b/stable/qbittorrent/9.0.28/app-readme.md similarity index 100% rename from stable/qbittorrent/9.0.27/app-readme.md rename to stable/qbittorrent/9.0.28/app-readme.md diff --git a/stable/reg/4.0.23/charts/common-8.9.24.tgz b/stable/qbittorrent/9.0.28/charts/common-8.9.24.tgz similarity index 100% rename from stable/reg/4.0.23/charts/common-8.9.24.tgz rename to stable/qbittorrent/9.0.28/charts/common-8.9.24.tgz diff --git a/stable/qbittorrent/9.0.27/helm-values.md b/stable/qbittorrent/9.0.28/helm-values.md similarity index 100% rename from stable/qbittorrent/9.0.27/helm-values.md rename to stable/qbittorrent/9.0.28/helm-values.md diff --git a/stable/qbittorrent/9.0.27/ix_values.yaml b/stable/qbittorrent/9.0.28/ix_values.yaml similarity index 100% rename from stable/qbittorrent/9.0.27/ix_values.yaml rename to stable/qbittorrent/9.0.28/ix_values.yaml diff --git a/stable/qbittorrent/9.0.27/questions.yaml b/stable/qbittorrent/9.0.28/questions.yaml similarity index 99% rename from stable/qbittorrent/9.0.27/questions.yaml rename to stable/qbittorrent/9.0.28/questions.yaml index afb05d66a6b..9da608e58bf 100644 --- a/stable/qbittorrent/9.0.27/questions.yaml +++ b/stable/qbittorrent/9.0.28/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 10095 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -438,19 +437,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 6881 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -543,19 +535,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 6881 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/qbittorrent/9.0.27/security.md b/stable/qbittorrent/9.0.28/security.md similarity index 100% rename from stable/qbittorrent/9.0.27/security.md rename to stable/qbittorrent/9.0.28/security.md diff --git a/stable/qbittorrent/9.0.27/templates/_configmap.tpl b/stable/qbittorrent/9.0.28/templates/_configmap.tpl similarity index 100% rename from stable/qbittorrent/9.0.27/templates/_configmap.tpl rename to stable/qbittorrent/9.0.28/templates/_configmap.tpl diff --git a/stable/qbittorrent/9.0.27/templates/common.yaml b/stable/qbittorrent/9.0.28/templates/common.yaml similarity index 100% rename from stable/qbittorrent/9.0.27/templates/common.yaml rename to stable/qbittorrent/9.0.28/templates/common.yaml diff --git a/stable/reg/4.0.23/values.yaml b/stable/qbittorrent/9.0.28/values.yaml similarity index 100% rename from stable/reg/4.0.23/values.yaml rename to stable/qbittorrent/9.0.28/values.yaml diff --git a/stable/quassel-core/0.0.6/Chart.lock b/stable/quassel-core/0.0.6/Chart.lock deleted file mode 100644 index 0e8b674989f..00000000000 --- a/stable/quassel-core/0.0.6/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:46:02.087061994Z" diff --git a/stable/quassel-core/0.0.6/CHANGELOG.md b/stable/quassel-core/0.0.7/CHANGELOG.md similarity index 87% rename from stable/quassel-core/0.0.6/CHANGELOG.md rename to stable/quassel-core/0.0.7/CHANGELOG.md index 32588d71df3..5820357ccae 100644 --- a/stable/quassel-core/0.0.6/CHANGELOG.md +++ b/stable/quassel-core/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [quassel-core-0.0.7](https://github.com/truecharts/apps/compare/quassel-core-0.0.6...quassel-core-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [quassel-core-0.0.6](https://github.com/truecharts/apps/compare/quassel-core-0.0.5...quassel-core-0.0.6) (2021-12-19) diff --git a/stable/remmina/1.0.28/CONFIG.md b/stable/quassel-core/0.0.7/CONFIG.md similarity index 100% rename from stable/remmina/1.0.28/CONFIG.md rename to stable/quassel-core/0.0.7/CONFIG.md diff --git a/stable/quassel-core/0.0.7/Chart.lock b/stable/quassel-core/0.0.7/Chart.lock new file mode 100644 index 00000000000..4772e2a7b8e --- /dev/null +++ b/stable/quassel-core/0.0.7/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:32:44.925933901Z" diff --git a/stable/quassel-core/0.0.6/Chart.yaml b/stable/quassel-core/0.0.7/Chart.yaml similarity index 98% rename from stable/quassel-core/0.0.6/Chart.yaml rename to stable/quassel-core/0.0.7/Chart.yaml index af5cf71ffab..c672b541c8d 100644 --- a/stable/quassel-core/0.0.6/Chart.yaml +++ b/stable/quassel-core/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: quassel-core -version: 0.0.6 +version: 0.0.7 appVersion: "0.13.1" description: Quassel-core is a modern, cross-platform, distributed IRC client. type: application diff --git a/stable/quassel-core/0.0.6/README.md b/stable/quassel-core/0.0.7/README.md similarity index 100% rename from stable/quassel-core/0.0.6/README.md rename to stable/quassel-core/0.0.7/README.md diff --git a/stable/quassel-core/0.0.6/app-readme.md b/stable/quassel-core/0.0.7/app-readme.md similarity index 100% rename from stable/quassel-core/0.0.6/app-readme.md rename to stable/quassel-core/0.0.7/app-readme.md diff --git a/stable/remmina/1.0.28/charts/common-8.9.24.tgz b/stable/quassel-core/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/remmina/1.0.28/charts/common-8.9.24.tgz rename to stable/quassel-core/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/statping/4.0.15/charts/postgresql-6.0.34.tgz b/stable/quassel-core/0.0.7/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/statping/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/quassel-core/0.0.7/charts/postgresql-6.0.34.tgz diff --git a/stable/quassel-core/0.0.6/helm-values.md b/stable/quassel-core/0.0.7/helm-values.md similarity index 100% rename from stable/quassel-core/0.0.6/helm-values.md rename to stable/quassel-core/0.0.7/helm-values.md diff --git a/stable/quassel-core/0.0.6/ix_values.yaml b/stable/quassel-core/0.0.7/ix_values.yaml similarity index 100% rename from stable/quassel-core/0.0.6/ix_values.yaml rename to stable/quassel-core/0.0.7/ix_values.yaml diff --git a/stable/quassel-core/0.0.6/questions.yaml b/stable/quassel-core/0.0.7/questions.yaml similarity index 100% rename from stable/quassel-core/0.0.6/questions.yaml rename to stable/quassel-core/0.0.7/questions.yaml diff --git a/stable/quassel-core/0.0.6/security.md b/stable/quassel-core/0.0.7/security.md similarity index 100% rename from stable/quassel-core/0.0.6/security.md rename to stable/quassel-core/0.0.7/security.md diff --git a/stable/radarr/9.0.25/templates/common.yaml b/stable/quassel-core/0.0.7/templates/common.yaml similarity index 100% rename from stable/radarr/9.0.25/templates/common.yaml rename to stable/quassel-core/0.0.7/templates/common.yaml diff --git a/stable/remmina/1.0.28/values.yaml b/stable/quassel-core/0.0.7/values.yaml similarity index 100% rename from stable/remmina/1.0.28/values.yaml rename to stable/quassel-core/0.0.7/values.yaml diff --git a/stable/quassel-web/0.0.5/Chart.lock b/stable/quassel-web/0.0.5/Chart.lock deleted file mode 100644 index c91721c4899..00000000000 --- a/stable/quassel-web/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:10.911071635Z" diff --git a/stable/quassel-web/0.0.5/CHANGELOG.md b/stable/quassel-web/0.0.6/CHANGELOG.md similarity index 86% rename from stable/quassel-web/0.0.5/CHANGELOG.md rename to stable/quassel-web/0.0.6/CHANGELOG.md index 13fdf008866..2d9aaee04c7 100644 --- a/stable/quassel-web/0.0.5/CHANGELOG.md +++ b/stable/quassel-web/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [quassel-web-0.0.6](https://github.com/truecharts/apps/compare/quassel-web-0.0.5...quassel-web-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [quassel-web-0.0.5](https://github.com/truecharts/apps/compare/quassel-web-0.0.4...quassel-web-0.0.5) (2021-12-19) diff --git a/stable/requestrr/0.0.5/CONFIG.md b/stable/quassel-web/0.0.6/CONFIG.md similarity index 100% rename from stable/requestrr/0.0.5/CONFIG.md rename to stable/quassel-web/0.0.6/CONFIG.md diff --git a/stable/quassel-web/0.0.6/Chart.lock b/stable/quassel-web/0.0.6/Chart.lock new file mode 100644 index 00000000000..c961e5767fc --- /dev/null +++ b/stable/quassel-web/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:32:53.656546934Z" diff --git a/stable/quassel-web/0.0.5/Chart.yaml b/stable/quassel-web/0.0.6/Chart.yaml similarity index 97% rename from stable/quassel-web/0.0.5/Chart.yaml rename to stable/quassel-web/0.0.6/Chart.yaml index 2c783c3cfb3..7637ff77686 100644 --- a/stable/quassel-web/0.0.5/Chart.yaml +++ b/stable/quassel-web/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: quassel-web -version: 0.0.5 +version: 0.0.6 appVersion: "2021.11.18" description: Quassel-web is a web client for Quassel. type: application diff --git a/stable/quassel-web/0.0.5/README.md b/stable/quassel-web/0.0.6/README.md similarity index 100% rename from stable/quassel-web/0.0.5/README.md rename to stable/quassel-web/0.0.6/README.md diff --git a/stable/quassel-web/0.0.5/app-readme.md b/stable/quassel-web/0.0.6/app-readme.md similarity index 100% rename from stable/quassel-web/0.0.5/app-readme.md rename to stable/quassel-web/0.0.6/app-readme.md diff --git a/stable/requestrr/0.0.5/charts/common-8.9.24.tgz b/stable/quassel-web/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/requestrr/0.0.5/charts/common-8.9.24.tgz rename to stable/quassel-web/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/quassel-web/0.0.5/helm-values.md b/stable/quassel-web/0.0.6/helm-values.md similarity index 100% rename from stable/quassel-web/0.0.5/helm-values.md rename to stable/quassel-web/0.0.6/helm-values.md diff --git a/stable/quassel-web/0.0.5/ix_values.yaml b/stable/quassel-web/0.0.6/ix_values.yaml similarity index 100% rename from stable/quassel-web/0.0.5/ix_values.yaml rename to stable/quassel-web/0.0.6/ix_values.yaml diff --git a/stable/quassel-web/0.0.5/questions.yaml b/stable/quassel-web/0.0.6/questions.yaml similarity index 100% rename from stable/quassel-web/0.0.5/questions.yaml rename to stable/quassel-web/0.0.6/questions.yaml diff --git a/stable/quassel-web/0.0.5/security.md b/stable/quassel-web/0.0.6/security.md similarity index 100% rename from stable/quassel-web/0.0.5/security.md rename to stable/quassel-web/0.0.6/security.md diff --git a/stable/readarr/9.0.38/templates/common.yaml b/stable/quassel-web/0.0.6/templates/common.yaml similarity index 100% rename from stable/readarr/9.0.38/templates/common.yaml rename to stable/quassel-web/0.0.6/templates/common.yaml diff --git a/stable/requestrr/0.0.5/values.yaml b/stable/quassel-web/0.0.6/values.yaml similarity index 100% rename from stable/requestrr/0.0.5/values.yaml rename to stable/quassel-web/0.0.6/values.yaml diff --git a/stable/radarr/9.0.25/Chart.lock b/stable/radarr/9.0.25/Chart.lock deleted file mode 100644 index 7ec8a31f50f..00000000000 --- a/stable/radarr/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:17.559819596Z" diff --git a/stable/radarr/9.0.25/CHANGELOG.md b/stable/radarr/9.0.26/CHANGELOG.md similarity index 89% rename from stable/radarr/9.0.25/CHANGELOG.md rename to stable/radarr/9.0.26/CHANGELOG.md index d348a6508dd..7be15b5bf1b 100644 --- a/stable/radarr/9.0.25/CHANGELOG.md +++ b/stable/radarr/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [radarr-9.0.26](https://github.com/truecharts/apps/compare/radarr-9.0.25...radarr-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [radarr-9.0.25](https://github.com/truecharts/apps/compare/radarr-9.0.24...radarr-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ -### [radarr-9.0.17](https://github.com/truecharts/apps/compare/radarr-9.0.16...radarr-9.0.17) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - - - - -### [radarr-9.0.16](https://github.com/truecharts/apps/compare/radarr-9.0.15...radarr-9.0.16) (2021-12-04) diff --git a/stable/resilio-sync/4.0.24/CONFIG.md b/stable/radarr/9.0.26/CONFIG.md similarity index 100% rename from stable/resilio-sync/4.0.24/CONFIG.md rename to stable/radarr/9.0.26/CONFIG.md diff --git a/stable/radarr/9.0.26/Chart.lock b/stable/radarr/9.0.26/Chart.lock new file mode 100644 index 00000000000..4b886fc62fa --- /dev/null +++ b/stable/radarr/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:02.662435147Z" diff --git a/stable/radarr/9.0.25/Chart.yaml b/stable/radarr/9.0.26/Chart.yaml similarity index 97% rename from stable/radarr/9.0.25/Chart.yaml rename to stable/radarr/9.0.26/Chart.yaml index 8fede642c52..297e2404251 100644 --- a/stable/radarr/9.0.25/Chart.yaml +++ b/stable/radarr/9.0.26/Chart.yaml @@ -21,7 +21,7 @@ name: radarr sources: - https://github.com/Radarr/Radarr type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/radarr/9.0.25/README.md b/stable/radarr/9.0.26/README.md similarity index 100% rename from stable/radarr/9.0.25/README.md rename to stable/radarr/9.0.26/README.md diff --git a/stable/radarr/9.0.25/app-readme.md b/stable/radarr/9.0.26/app-readme.md similarity index 100% rename from stable/radarr/9.0.25/app-readme.md rename to stable/radarr/9.0.26/app-readme.md diff --git a/stable/resilio-sync/4.0.24/charts/common-8.9.24.tgz b/stable/radarr/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/resilio-sync/4.0.24/charts/common-8.9.24.tgz rename to stable/radarr/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/radarr/9.0.25/helm-values.md b/stable/radarr/9.0.26/helm-values.md similarity index 100% rename from stable/radarr/9.0.25/helm-values.md rename to stable/radarr/9.0.26/helm-values.md diff --git a/stable/radarr/9.0.25/ix_values.yaml b/stable/radarr/9.0.26/ix_values.yaml similarity index 100% rename from stable/radarr/9.0.25/ix_values.yaml rename to stable/radarr/9.0.26/ix_values.yaml diff --git a/stable/radarr/9.0.25/questions.yaml b/stable/radarr/9.0.26/questions.yaml similarity index 99% rename from stable/radarr/9.0.25/questions.yaml rename to stable/radarr/9.0.26/questions.yaml index fbc48151685..fc90f952711 100644 --- a/stable/radarr/9.0.25/questions.yaml +++ b/stable/radarr/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 7878 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/radarr/9.0.25/security.md b/stable/radarr/9.0.26/security.md similarity index 100% rename from stable/radarr/9.0.25/security.md rename to stable/radarr/9.0.26/security.md diff --git a/stable/reg/4.0.23/templates/common.yaml b/stable/radarr/9.0.26/templates/common.yaml similarity index 100% rename from stable/reg/4.0.23/templates/common.yaml rename to stable/radarr/9.0.26/templates/common.yaml diff --git a/stable/resilio-sync/4.0.24/values.yaml b/stable/radarr/9.0.26/values.yaml similarity index 100% rename from stable/resilio-sync/4.0.24/values.yaml rename to stable/radarr/9.0.26/values.yaml diff --git a/stable/readarr/9.0.38/Chart.lock b/stable/readarr/9.0.38/Chart.lock deleted file mode 100644 index 8a5826e62dd..00000000000 --- a/stable/readarr/9.0.38/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:24.705823117Z" diff --git a/stable/readarr/9.0.38/CHANGELOG.md b/stable/readarr/9.0.39/CHANGELOG.md similarity index 90% rename from stable/readarr/9.0.38/CHANGELOG.md rename to stable/readarr/9.0.39/CHANGELOG.md index 46508611000..fea1e8031e2 100644 --- a/stable/readarr/9.0.38/CHANGELOG.md +++ b/stable/readarr/9.0.39/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [readarr-9.0.39](https://github.com/truecharts/apps/compare/readarr-9.0.38...readarr-9.0.39) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [readarr-9.0.38](https://github.com/truecharts/apps/compare/readarr-9.0.37...readarr-9.0.38) (2021-12-19) @@ -87,13 +97,3 @@ ### [readarr-9.0.29](https://github.com/truecharts/apps/compare/readarr-9.0.28...readarr-9.0.29) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - - -### readarr-9.0.28 (2021-12-05) - diff --git a/stable/rsnapshot/0.0.5/CONFIG.md b/stable/readarr/9.0.39/CONFIG.md similarity index 100% rename from stable/rsnapshot/0.0.5/CONFIG.md rename to stable/readarr/9.0.39/CONFIG.md diff --git a/stable/readarr/9.0.39/Chart.lock b/stable/readarr/9.0.39/Chart.lock new file mode 100644 index 00000000000..3c07c81cd7a --- /dev/null +++ b/stable/readarr/9.0.39/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:06.958436104Z" diff --git a/stable/readarr/9.0.38/Chart.yaml b/stable/readarr/9.0.39/Chart.yaml similarity index 97% rename from stable/readarr/9.0.38/Chart.yaml rename to stable/readarr/9.0.39/Chart.yaml index 9666b01d407..a7d5609db6c 100644 --- a/stable/readarr/9.0.38/Chart.yaml +++ b/stable/readarr/9.0.39/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/Readarr/Readarr - https://readarr.com type: application -version: 9.0.38 +version: 9.0.39 annotations: truecharts.org/catagories: | - media diff --git a/stable/readarr/9.0.38/README.md b/stable/readarr/9.0.39/README.md similarity index 100% rename from stable/readarr/9.0.38/README.md rename to stable/readarr/9.0.39/README.md diff --git a/stable/readarr/9.0.38/app-readme.md b/stable/readarr/9.0.39/app-readme.md similarity index 100% rename from stable/readarr/9.0.38/app-readme.md rename to stable/readarr/9.0.39/app-readme.md diff --git a/stable/rsnapshot/0.0.5/charts/common-8.9.24.tgz b/stable/readarr/9.0.39/charts/common-8.9.24.tgz similarity index 100% rename from stable/rsnapshot/0.0.5/charts/common-8.9.24.tgz rename to stable/readarr/9.0.39/charts/common-8.9.24.tgz diff --git a/stable/readarr/9.0.38/helm-values.md b/stable/readarr/9.0.39/helm-values.md similarity index 100% rename from stable/readarr/9.0.38/helm-values.md rename to stable/readarr/9.0.39/helm-values.md diff --git a/stable/readarr/9.0.38/ix_values.yaml b/stable/readarr/9.0.39/ix_values.yaml similarity index 100% rename from stable/readarr/9.0.38/ix_values.yaml rename to stable/readarr/9.0.39/ix_values.yaml diff --git a/stable/readarr/9.0.38/questions.yaml b/stable/readarr/9.0.39/questions.yaml similarity index 99% rename from stable/readarr/9.0.38/questions.yaml rename to stable/readarr/9.0.39/questions.yaml index f8cfb4e1a98..b2862f460d8 100644 --- a/stable/readarr/9.0.38/questions.yaml +++ b/stable/readarr/9.0.39/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8787 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/readarr/9.0.38/security.md b/stable/readarr/9.0.39/security.md similarity index 100% rename from stable/readarr/9.0.38/security.md rename to stable/readarr/9.0.39/security.md diff --git a/stable/requestrr/0.0.5/templates/common.yaml b/stable/readarr/9.0.39/templates/common.yaml similarity index 100% rename from stable/requestrr/0.0.5/templates/common.yaml rename to stable/readarr/9.0.39/templates/common.yaml diff --git a/stable/rsnapshot/0.0.5/values.yaml b/stable/readarr/9.0.39/values.yaml similarity index 100% rename from stable/rsnapshot/0.0.5/values.yaml rename to stable/readarr/9.0.39/values.yaml diff --git a/stable/recipes/5.0.1/Chart.lock b/stable/recipes/5.0.1/Chart.lock deleted file mode 100644 index 3167e6a5ec9..00000000000 --- a/stable/recipes/5.0.1/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:46:31.984337442Z" diff --git a/stable/recipes/5.0.1/CHANGELOG.md b/stable/recipes/5.0.2/CHANGELOG.md similarity index 88% rename from stable/recipes/5.0.1/CHANGELOG.md rename to stable/recipes/5.0.2/CHANGELOG.md index bfbaa13d6f4..27b9e9c0d10 100644 --- a/stable/recipes/5.0.1/CHANGELOG.md +++ b/stable/recipes/5.0.2/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [recipes-5.0.2](https://github.com/truecharts/apps/compare/recipes-5.0.1...recipes-5.0.2) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [recipes-5.0.1](https://github.com/truecharts/apps/compare/recipes-5.0.0...recipes-5.0.1) (2021-12-19) @@ -86,14 +97,3 @@ * fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - -### [recipes-4.0.12](https://github.com/truecharts/apps/compare/recipes-4.0.11...recipes-4.0.12) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - diff --git a/stable/sabnzbd/9.0.24/CONFIG.md b/stable/recipes/5.0.2/CONFIG.md similarity index 100% rename from stable/sabnzbd/9.0.24/CONFIG.md rename to stable/recipes/5.0.2/CONFIG.md diff --git a/stable/recipes/5.0.2/Chart.lock b/stable/recipes/5.0.2/Chart.lock new file mode 100644 index 00000000000..57e42d6f47f --- /dev/null +++ b/stable/recipes/5.0.2/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:33:20.158977826Z" diff --git a/stable/recipes/5.0.1/Chart.yaml b/stable/recipes/5.0.2/Chart.yaml similarity index 98% rename from stable/recipes/5.0.1/Chart.yaml rename to stable/recipes/5.0.2/Chart.yaml index 0d03180f76c..183045f8caa 100644 --- a/stable/recipes/5.0.1/Chart.yaml +++ b/stable/recipes/5.0.2/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "1.0.2" description: Recipes is a Django application to manage, tag and search recipes using either built in models or external storage providers hosting PDF's, Images or other files. name: recipes -version: 5.0.1 +version: 5.0.2 kubeVersion: ">=1.16.0-0" keywords: - recipes diff --git a/stable/recipes/5.0.1/README.md b/stable/recipes/5.0.2/README.md similarity index 100% rename from stable/recipes/5.0.1/README.md rename to stable/recipes/5.0.2/README.md diff --git a/stable/recipes/5.0.1/app-readme.md b/stable/recipes/5.0.2/app-readme.md similarity index 100% rename from stable/recipes/5.0.1/app-readme.md rename to stable/recipes/5.0.2/app-readme.md diff --git a/stable/sabnzbd/9.0.24/charts/common-8.9.24.tgz b/stable/recipes/5.0.2/charts/common-8.9.24.tgz similarity index 100% rename from stable/sabnzbd/9.0.24/charts/common-8.9.24.tgz rename to stable/recipes/5.0.2/charts/common-8.9.24.tgz diff --git a/stable/teedy/4.0.15/charts/postgresql-6.0.34.tgz b/stable/recipes/5.0.2/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/teedy/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/recipes/5.0.2/charts/postgresql-6.0.34.tgz diff --git a/stable/recipes/5.0.1/helm-values.md b/stable/recipes/5.0.2/helm-values.md similarity index 90% rename from stable/recipes/5.0.1/helm-values.md rename to stable/recipes/5.0.2/helm-values.md index 6c70987e27f..7b7ccb0d2da 100644 --- a/stable/recipes/5.0.1/helm-values.md +++ b/stable/recipes/5.0.2/helm-values.md @@ -24,11 +24,6 @@ You will, however, be able to use all values referenced in the common chart here | additionalContainers.nginx.volumeMounts[2].mountPath | string | `"/static"` | | | additionalContainers.nginx.volumeMounts[2].name | string | `"static"` | | | env | object | See below | environment variables. See [project docs](https://raw.githubusercontent.com/vabene1111/recipes/master/.env.template) for more details. | -| envTpl.DB_ENGINE | string | `"django.db.backends.postgresql"` | | -| envTpl.POSTGRES_DB | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.POSTGRES_PORT | string | `"5432"` | | -| envTpl.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | -| envTpl.TIMEZONE | string | `"{{ .Values.env.TZ }}"` | | | envValueFrom.POSTGRES_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.POSTGRES_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/recipes/5.0.1/ix_values.yaml b/stable/recipes/5.0.2/ix_values.yaml similarity index 99% rename from stable/recipes/5.0.1/ix_values.yaml rename to stable/recipes/5.0.2/ix_values.yaml index 20e644f42c7..3eb062f0931 100644 --- a/stable/recipes/5.0.1/ix_values.yaml +++ b/stable/recipes/5.0.2/ix_values.yaml @@ -29,8 +29,6 @@ env: FRACTION_PREF_DEFAULT: 0 COMMENT_PREF_DEFAULT: 1 SHOPPING_MIN_AUTOSYNC_INTERVAL: 5 - -envTpl: TIMEZONE: "{{ .Values.env.TZ }}" DB_ENGINE: "django.db.backends.postgresql" POSTGRES_DB: "{{ .Values.postgresql.postgresqlDatabase }}" diff --git a/stable/recipes/5.0.1/questions.yaml b/stable/recipes/5.0.2/questions.yaml similarity index 99% rename from stable/recipes/5.0.1/questions.yaml rename to stable/recipes/5.0.2/questions.yaml index f9a46fccc2d..584eec77626 100644 --- a/stable/recipes/5.0.1/questions.yaml +++ b/stable/recipes/5.0.2/questions.yaml @@ -380,7 +380,6 @@ questions: schema: type: int default: 10029 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/recipes/5.0.1/security.md b/stable/recipes/5.0.2/security.md similarity index 100% rename from stable/recipes/5.0.1/security.md rename to stable/recipes/5.0.2/security.md diff --git a/stable/recipes/5.0.1/templates/_sercrets.tpl b/stable/recipes/5.0.2/templates/_sercrets.tpl similarity index 100% rename from stable/recipes/5.0.1/templates/_sercrets.tpl rename to stable/recipes/5.0.2/templates/_sercrets.tpl diff --git a/stable/recipes/5.0.1/templates/common.yaml b/stable/recipes/5.0.2/templates/common.yaml similarity index 100% rename from stable/recipes/5.0.1/templates/common.yaml rename to stable/recipes/5.0.2/templates/common.yaml diff --git a/stable/recipes/5.0.1/templates/configmap.yaml b/stable/recipes/5.0.2/templates/configmap.yaml similarity index 100% rename from stable/recipes/5.0.1/templates/configmap.yaml rename to stable/recipes/5.0.2/templates/configmap.yaml diff --git a/stable/sabnzbd/9.0.24/values.yaml b/stable/recipes/5.0.2/values.yaml similarity index 100% rename from stable/sabnzbd/9.0.24/values.yaml rename to stable/recipes/5.0.2/values.yaml diff --git a/stable/reg/4.0.23/Chart.lock b/stable/reg/4.0.23/Chart.lock deleted file mode 100644 index c2c66d17ce8..00000000000 --- a/stable/reg/4.0.23/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:39.192867305Z" diff --git a/stable/reg/4.0.23/CHANGELOG.md b/stable/reg/4.0.24/CHANGELOG.md similarity index 90% rename from stable/reg/4.0.23/CHANGELOG.md rename to stable/reg/4.0.24/CHANGELOG.md index fa80e52e0ff..1c9411797e5 100644 --- a/stable/reg/4.0.23/CHANGELOG.md +++ b/stable/reg/4.0.24/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [reg-4.0.24](https://github.com/truecharts/apps/compare/reg-4.0.23...reg-4.0.24) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [reg-4.0.23](https://github.com/truecharts/apps/compare/reg-4.0.22...reg-4.0.23) (2021-12-19) @@ -87,13 +97,3 @@ ### [reg-4.0.15](https://github.com/truecharts/apps/compare/reg-4.0.14...reg-4.0.15) (2021-12-04) -#### Chore - -* bump apps to generate security page - - - - -### [reg-4.0.14](https://github.com/truecharts/apps/compare/reg-4.0.13...reg-4.0.14) (2021-12-04) - -#### Chore diff --git a/stable/scrutiny/0.0.6/CONFIG.md b/stable/reg/4.0.24/CONFIG.md similarity index 100% rename from stable/scrutiny/0.0.6/CONFIG.md rename to stable/reg/4.0.24/CONFIG.md diff --git a/stable/reg/4.0.24/Chart.lock b/stable/reg/4.0.24/Chart.lock new file mode 100644 index 00000000000..df225e7de21 --- /dev/null +++ b/stable/reg/4.0.24/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:21.838471088Z" diff --git a/stable/reg/4.0.23/Chart.yaml b/stable/reg/4.0.24/Chart.yaml similarity index 97% rename from stable/reg/4.0.23/Chart.yaml rename to stable/reg/4.0.24/Chart.yaml index 09fe72cd951..66eae68b024 100644 --- a/stable/reg/4.0.23/Chart.yaml +++ b/stable/reg/4.0.24/Chart.yaml @@ -19,7 +19,7 @@ name: reg sources: - https://github.com/genuinetools/reg - https://github.com/k8s-at-home/container-images/ -version: 4.0.23 +version: 4.0.24 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/reg/4.0.23/README.md b/stable/reg/4.0.24/README.md similarity index 100% rename from stable/reg/4.0.23/README.md rename to stable/reg/4.0.24/README.md diff --git a/stable/reg/4.0.23/app-readme.md b/stable/reg/4.0.24/app-readme.md similarity index 100% rename from stable/reg/4.0.23/app-readme.md rename to stable/reg/4.0.24/app-readme.md diff --git a/stable/scrutiny/0.0.6/charts/common-8.9.24.tgz b/stable/reg/4.0.24/charts/common-8.9.24.tgz similarity index 100% rename from stable/scrutiny/0.0.6/charts/common-8.9.24.tgz rename to stable/reg/4.0.24/charts/common-8.9.24.tgz diff --git a/stable/reg/4.0.23/ci/ct-values.yaml b/stable/reg/4.0.24/ci/ct-values.yaml similarity index 100% rename from stable/reg/4.0.23/ci/ct-values.yaml rename to stable/reg/4.0.24/ci/ct-values.yaml diff --git a/stable/reg/4.0.23/helm-values.md b/stable/reg/4.0.24/helm-values.md similarity index 100% rename from stable/reg/4.0.23/helm-values.md rename to stable/reg/4.0.24/helm-values.md diff --git a/stable/reg/4.0.23/ix_values.yaml b/stable/reg/4.0.24/ix_values.yaml similarity index 100% rename from stable/reg/4.0.23/ix_values.yaml rename to stable/reg/4.0.24/ix_values.yaml diff --git a/stable/reg/4.0.23/questions.yaml b/stable/reg/4.0.24/questions.yaml similarity index 99% rename from stable/reg/4.0.23/questions.yaml rename to stable/reg/4.0.24/questions.yaml index cfa844c27d6..39db008c692 100644 --- a/stable/reg/4.0.23/questions.yaml +++ b/stable/reg/4.0.24/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10096 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/reg/4.0.23/security.md b/stable/reg/4.0.24/security.md similarity index 100% rename from stable/reg/4.0.23/security.md rename to stable/reg/4.0.24/security.md diff --git a/stable/resilio-sync/4.0.24/templates/common.yaml b/stable/reg/4.0.24/templates/common.yaml similarity index 100% rename from stable/resilio-sync/4.0.24/templates/common.yaml rename to stable/reg/4.0.24/templates/common.yaml diff --git a/stable/scrutiny/0.0.6/values.yaml b/stable/reg/4.0.24/values.yaml similarity index 100% rename from stable/scrutiny/0.0.6/values.yaml rename to stable/reg/4.0.24/values.yaml diff --git a/stable/remmina/1.0.28/Chart.lock b/stable/remmina/1.0.28/Chart.lock deleted file mode 100644 index 4d209e1669b..00000000000 --- a/stable/remmina/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:46.812528588Z" diff --git a/stable/remmina/1.0.28/CHANGELOG.md b/stable/remmina/1.0.29/CHANGELOG.md similarity index 90% rename from stable/remmina/1.0.28/CHANGELOG.md rename to stable/remmina/1.0.29/CHANGELOG.md index d834c81f441..e31e0e285e8 100644 --- a/stable/remmina/1.0.28/CHANGELOG.md +++ b/stable/remmina/1.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [remmina-1.0.29](https://github.com/truecharts/apps/compare/remmina-1.0.28...remmina-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [remmina-1.0.28](https://github.com/truecharts/apps/compare/remmina-1.0.27...remmina-1.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [remmina-1.0.20](https://github.com/truecharts/apps/compare/remmina-1.0.19...remmina-1.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [remmina-1.0.19](https://github.com/truecharts/apps/compare/remmina-1.0.18...remmina-1.0.19) (2021-12-04) - diff --git a/stable/ser2sock/4.0.24/CONFIG.md b/stable/remmina/1.0.29/CONFIG.md similarity index 100% rename from stable/ser2sock/4.0.24/CONFIG.md rename to stable/remmina/1.0.29/CONFIG.md diff --git a/stable/remmina/1.0.29/Chart.lock b/stable/remmina/1.0.29/Chart.lock new file mode 100644 index 00000000000..660f7034d82 --- /dev/null +++ b/stable/remmina/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:30.626909063Z" diff --git a/stable/remmina/1.0.28/Chart.yaml b/stable/remmina/1.0.29/Chart.yaml similarity index 97% rename from stable/remmina/1.0.28/Chart.yaml rename to stable/remmina/1.0.29/Chart.yaml index 12e692e6c17..a5a70ccd0ce 100644 --- a/stable/remmina/1.0.28/Chart.yaml +++ b/stable/remmina/1.0.29/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-remmina - https://remmina.org/ type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/remmina/1.0.28/README.md b/stable/remmina/1.0.29/README.md similarity index 100% rename from stable/remmina/1.0.28/README.md rename to stable/remmina/1.0.29/README.md diff --git a/stable/remmina/1.0.28/app-readme.md b/stable/remmina/1.0.29/app-readme.md similarity index 100% rename from stable/remmina/1.0.28/app-readme.md rename to stable/remmina/1.0.29/app-readme.md diff --git a/stable/ser2sock/4.0.24/charts/common-8.9.24.tgz b/stable/remmina/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/ser2sock/4.0.24/charts/common-8.9.24.tgz rename to stable/remmina/1.0.29/charts/common-8.9.24.tgz diff --git a/stable/remmina/1.0.28/helm-values.md b/stable/remmina/1.0.29/helm-values.md similarity index 100% rename from stable/remmina/1.0.28/helm-values.md rename to stable/remmina/1.0.29/helm-values.md diff --git a/stable/remmina/1.0.28/ix_values.yaml b/stable/remmina/1.0.29/ix_values.yaml similarity index 100% rename from stable/remmina/1.0.28/ix_values.yaml rename to stable/remmina/1.0.29/ix_values.yaml diff --git a/stable/remmina/1.0.28/questions.yaml b/stable/remmina/1.0.29/questions.yaml similarity index 99% rename from stable/remmina/1.0.28/questions.yaml rename to stable/remmina/1.0.29/questions.yaml index 6c6c7aa06e9..b304679437f 100644 --- a/stable/remmina/1.0.28/questions.yaml +++ b/stable/remmina/1.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10042 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/remmina/1.0.28/security.md b/stable/remmina/1.0.29/security.md similarity index 100% rename from stable/remmina/1.0.28/security.md rename to stable/remmina/1.0.29/security.md diff --git a/stable/remmina/1.0.28/templates/common.yaml b/stable/remmina/1.0.29/templates/common.yaml similarity index 100% rename from stable/remmina/1.0.28/templates/common.yaml rename to stable/remmina/1.0.29/templates/common.yaml diff --git a/stable/ser2sock/4.0.24/values.yaml b/stable/remmina/1.0.29/values.yaml similarity index 100% rename from stable/ser2sock/4.0.24/values.yaml rename to stable/remmina/1.0.29/values.yaml diff --git a/stable/requestrr/0.0.5/Chart.lock b/stable/requestrr/0.0.5/Chart.lock deleted file mode 100644 index 184b11f672e..00000000000 --- a/stable/requestrr/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:46:58.256421442Z" diff --git a/stable/requestrr/0.0.5/CHANGELOG.md b/stable/requestrr/0.0.6/CHANGELOG.md similarity index 86% rename from stable/requestrr/0.0.5/CHANGELOG.md rename to stable/requestrr/0.0.6/CHANGELOG.md index 96a51cb6998..9867119ddf5 100644 --- a/stable/requestrr/0.0.5/CHANGELOG.md +++ b/stable/requestrr/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [requestrr-0.0.6](https://github.com/truecharts/apps/compare/requestrr-0.0.5...requestrr-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [requestrr-0.0.5](https://github.com/truecharts/apps/compare/requestrr-0.0.4...requestrr-0.0.5) (2021-12-19) diff --git a/stable/shiori/4.0.15/CONFIG.md b/stable/requestrr/0.0.6/CONFIG.md similarity index 100% rename from stable/shiori/4.0.15/CONFIG.md rename to stable/requestrr/0.0.6/CONFIG.md diff --git a/stable/requestrr/0.0.6/Chart.lock b/stable/requestrr/0.0.6/Chart.lock new file mode 100644 index 00000000000..915a85de74e --- /dev/null +++ b/stable/requestrr/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:40.735344221Z" diff --git a/stable/requestrr/0.0.5/Chart.yaml b/stable/requestrr/0.0.6/Chart.yaml similarity index 98% rename from stable/requestrr/0.0.5/Chart.yaml rename to stable/requestrr/0.0.6/Chart.yaml index e3f54d97e6d..a688782ccee 100644 --- a/stable/requestrr/0.0.5/Chart.yaml +++ b/stable/requestrr/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: requestrr -version: 0.0.5 +version: 0.0.6 appVersion: "2.1.1" description: Requestrr is a chatbot used to simplify using services like Sonarr/Radarr/Ombi via the use of chat. type: application diff --git a/stable/requestrr/0.0.5/README.md b/stable/requestrr/0.0.6/README.md similarity index 100% rename from stable/requestrr/0.0.5/README.md rename to stable/requestrr/0.0.6/README.md diff --git a/stable/requestrr/0.0.5/app-readme.md b/stable/requestrr/0.0.6/app-readme.md similarity index 100% rename from stable/requestrr/0.0.5/app-readme.md rename to stable/requestrr/0.0.6/app-readme.md diff --git a/stable/shiori/4.0.15/charts/common-8.9.24.tgz b/stable/requestrr/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/shiori/4.0.15/charts/common-8.9.24.tgz rename to stable/requestrr/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/requestrr/0.0.5/helm-values.md b/stable/requestrr/0.0.6/helm-values.md similarity index 100% rename from stable/requestrr/0.0.5/helm-values.md rename to stable/requestrr/0.0.6/helm-values.md diff --git a/stable/requestrr/0.0.5/ix_values.yaml b/stable/requestrr/0.0.6/ix_values.yaml similarity index 100% rename from stable/requestrr/0.0.5/ix_values.yaml rename to stable/requestrr/0.0.6/ix_values.yaml diff --git a/stable/requestrr/0.0.5/questions.yaml b/stable/requestrr/0.0.6/questions.yaml similarity index 100% rename from stable/requestrr/0.0.5/questions.yaml rename to stable/requestrr/0.0.6/questions.yaml diff --git a/stable/requestrr/0.0.5/security.md b/stable/requestrr/0.0.6/security.md similarity index 100% rename from stable/requestrr/0.0.5/security.md rename to stable/requestrr/0.0.6/security.md diff --git a/stable/rsnapshot/0.0.5/templates/common.yaml b/stable/requestrr/0.0.6/templates/common.yaml similarity index 100% rename from stable/rsnapshot/0.0.5/templates/common.yaml rename to stable/requestrr/0.0.6/templates/common.yaml diff --git a/stable/shiori/4.0.15/values.yaml b/stable/requestrr/0.0.6/values.yaml similarity index 100% rename from stable/shiori/4.0.15/values.yaml rename to stable/requestrr/0.0.6/values.yaml diff --git a/stable/resilio-sync/4.0.24/Chart.lock b/stable/resilio-sync/4.0.24/Chart.lock deleted file mode 100644 index 908e627ba00..00000000000 --- a/stable/resilio-sync/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:01.115433146Z" diff --git a/stable/resilio-sync/4.0.24/CHANGELOG.md b/stable/resilio-sync/4.0.25/CHANGELOG.md similarity index 86% rename from stable/resilio-sync/4.0.24/CHANGELOG.md rename to stable/resilio-sync/4.0.25/CHANGELOG.md index b4e9e2813d9..0af8e835f4d 100644 --- a/stable/resilio-sync/4.0.24/CHANGELOG.md +++ b/stable/resilio-sync/4.0.25/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [resilio-sync-4.0.25](https://github.com/truecharts/apps/compare/resilio-sync-4.0.24...resilio-sync-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [resilio-sync-4.0.24](https://github.com/truecharts/apps/compare/resilio-sync-4.0.23...resilio-sync-4.0.24) (2021-12-19) @@ -86,14 +97,3 @@ ### [resilio-sync-4.0.17](https://github.com/truecharts/apps/compare/resilio-sync-4.0.16...resilio-sync-4.0.17) (2021-12-05) #### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [resilio-sync-4.0.16](https://github.com/truecharts/apps/compare/resilio-sync-4.0.15...resilio-sync-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page diff --git a/stable/shorturl/1.0.24/CONFIG.md b/stable/resilio-sync/4.0.25/CONFIG.md similarity index 100% rename from stable/shorturl/1.0.24/CONFIG.md rename to stable/resilio-sync/4.0.25/CONFIG.md diff --git a/stable/resilio-sync/4.0.25/Chart.lock b/stable/resilio-sync/4.0.25/Chart.lock new file mode 100644 index 00000000000..2f652282226 --- /dev/null +++ b/stable/resilio-sync/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:33:47.278096718Z" diff --git a/stable/resilio-sync/4.0.24/Chart.yaml b/stable/resilio-sync/4.0.25/Chart.yaml similarity index 97% rename from stable/resilio-sync/4.0.24/Chart.yaml rename to stable/resilio-sync/4.0.25/Chart.yaml index 661d71bab71..40106280b9a 100644 --- a/stable/resilio-sync/4.0.24/Chart.yaml +++ b/stable/resilio-sync/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ maintainers: name: resilio-sync sources: - https://github.com/orgs/linuxserver/packages/container/package/resilio-sync -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/resilio-sync/4.0.24/README.md b/stable/resilio-sync/4.0.25/README.md similarity index 100% rename from stable/resilio-sync/4.0.24/README.md rename to stable/resilio-sync/4.0.25/README.md diff --git a/stable/resilio-sync/4.0.24/app-readme.md b/stable/resilio-sync/4.0.25/app-readme.md similarity index 100% rename from stable/resilio-sync/4.0.24/app-readme.md rename to stable/resilio-sync/4.0.25/app-readme.md diff --git a/stable/shorturl/1.0.24/charts/common-8.9.24.tgz b/stable/resilio-sync/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/shorturl/1.0.24/charts/common-8.9.24.tgz rename to stable/resilio-sync/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/resilio-sync/4.0.24/helm-values.md b/stable/resilio-sync/4.0.25/helm-values.md similarity index 100% rename from stable/resilio-sync/4.0.24/helm-values.md rename to stable/resilio-sync/4.0.25/helm-values.md diff --git a/stable/resilio-sync/4.0.24/ix_values.yaml b/stable/resilio-sync/4.0.25/ix_values.yaml similarity index 100% rename from stable/resilio-sync/4.0.24/ix_values.yaml rename to stable/resilio-sync/4.0.25/ix_values.yaml diff --git a/stable/resilio-sync/4.0.24/questions.yaml b/stable/resilio-sync/4.0.25/questions.yaml similarity index 99% rename from stable/resilio-sync/4.0.24/questions.yaml rename to stable/resilio-sync/4.0.25/questions.yaml index b51baa73fa4..04c1e8b49b4 100644 --- a/stable/resilio-sync/4.0.24/questions.yaml +++ b/stable/resilio-sync/4.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 8888 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -445,19 +444,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 55555 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -551,19 +543,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 55555 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/resilio-sync/4.0.24/security.md b/stable/resilio-sync/4.0.25/security.md similarity index 100% rename from stable/resilio-sync/4.0.24/security.md rename to stable/resilio-sync/4.0.25/security.md diff --git a/stable/sabnzbd/9.0.24/templates/common.yaml b/stable/resilio-sync/4.0.25/templates/common.yaml similarity index 100% rename from stable/sabnzbd/9.0.24/templates/common.yaml rename to stable/resilio-sync/4.0.25/templates/common.yaml diff --git a/stable/shorturl/1.0.24/values.yaml b/stable/resilio-sync/4.0.25/values.yaml similarity index 100% rename from stable/shorturl/1.0.24/values.yaml rename to stable/resilio-sync/4.0.25/values.yaml diff --git a/stable/rsnapshot/0.0.5/Chart.lock b/stable/rsnapshot/0.0.5/Chart.lock deleted file mode 100644 index 1d878d2f049..00000000000 --- a/stable/rsnapshot/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:19.526266778Z" diff --git a/stable/rsnapshot/0.0.5/CHANGELOG.md b/stable/rsnapshot/0.0.6/CHANGELOG.md similarity index 87% rename from stable/rsnapshot/0.0.5/CHANGELOG.md rename to stable/rsnapshot/0.0.6/CHANGELOG.md index 3bed73edaf2..ffe0a89ab5f 100644 --- a/stable/rsnapshot/0.0.5/CHANGELOG.md +++ b/stable/rsnapshot/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [rsnapshot-0.0.6](https://github.com/truecharts/apps/compare/rsnapshot-0.0.5...rsnapshot-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [rsnapshot-0.0.5](https://github.com/truecharts/apps/compare/rsnapshot-0.0.4...rsnapshot-0.0.5) (2021-12-19) diff --git a/stable/sickchill/1.0.24/CONFIG.md b/stable/rsnapshot/0.0.6/CONFIG.md similarity index 100% rename from stable/sickchill/1.0.24/CONFIG.md rename to stable/rsnapshot/0.0.6/CONFIG.md diff --git a/stable/rsnapshot/0.0.6/Chart.lock b/stable/rsnapshot/0.0.6/Chart.lock new file mode 100644 index 00000000000..17ba876d259 --- /dev/null +++ b/stable/rsnapshot/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:12.277086915Z" diff --git a/stable/rsnapshot/0.0.5/Chart.yaml b/stable/rsnapshot/0.0.6/Chart.yaml similarity index 97% rename from stable/rsnapshot/0.0.5/Chart.yaml rename to stable/rsnapshot/0.0.6/Chart.yaml index 52c4f3a29f1..d8c175ade86 100644 --- a/stable/rsnapshot/0.0.5/Chart.yaml +++ b/stable/rsnapshot/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: rsnapshot -version: 0.0.5 +version: 0.0.6 appVersion: "1.4.3" description: Rsnapshot is a filesystem snapshot utility based on rsync. type: application diff --git a/stable/rsnapshot/0.0.5/README.md b/stable/rsnapshot/0.0.6/README.md similarity index 100% rename from stable/rsnapshot/0.0.5/README.md rename to stable/rsnapshot/0.0.6/README.md diff --git a/stable/rsnapshot/0.0.5/app-readme.md b/stable/rsnapshot/0.0.6/app-readme.md similarity index 100% rename from stable/rsnapshot/0.0.5/app-readme.md rename to stable/rsnapshot/0.0.6/app-readme.md diff --git a/stable/sickchill/1.0.24/charts/common-8.9.24.tgz b/stable/rsnapshot/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/sickchill/1.0.24/charts/common-8.9.24.tgz rename to stable/rsnapshot/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/rsnapshot/0.0.5/helm-values.md b/stable/rsnapshot/0.0.6/helm-values.md similarity index 100% rename from stable/rsnapshot/0.0.5/helm-values.md rename to stable/rsnapshot/0.0.6/helm-values.md diff --git a/stable/rsnapshot/0.0.5/ix_values.yaml b/stable/rsnapshot/0.0.6/ix_values.yaml similarity index 100% rename from stable/rsnapshot/0.0.5/ix_values.yaml rename to stable/rsnapshot/0.0.6/ix_values.yaml diff --git a/stable/rsnapshot/0.0.5/questions.yaml b/stable/rsnapshot/0.0.6/questions.yaml similarity index 100% rename from stable/rsnapshot/0.0.5/questions.yaml rename to stable/rsnapshot/0.0.6/questions.yaml diff --git a/stable/rsnapshot/0.0.5/security.md b/stable/rsnapshot/0.0.6/security.md similarity index 100% rename from stable/rsnapshot/0.0.5/security.md rename to stable/rsnapshot/0.0.6/security.md diff --git a/stable/scrutiny/0.0.6/templates/common.yaml b/stable/rsnapshot/0.0.6/templates/common.yaml similarity index 100% rename from stable/scrutiny/0.0.6/templates/common.yaml rename to stable/rsnapshot/0.0.6/templates/common.yaml diff --git a/stable/sickchill/1.0.24/values.yaml b/stable/rsnapshot/0.0.6/values.yaml similarity index 100% rename from stable/sickchill/1.0.24/values.yaml rename to stable/rsnapshot/0.0.6/values.yaml diff --git a/stable/sabnzbd/9.0.24/Chart.lock b/stable/sabnzbd/9.0.24/Chart.lock deleted file mode 100644 index 9a5a6c9c439..00000000000 --- a/stable/sabnzbd/9.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:29.559658169Z" diff --git a/stable/sabnzbd/9.0.24/CHANGELOG.md b/stable/sabnzbd/9.0.25/CHANGELOG.md similarity index 90% rename from stable/sabnzbd/9.0.24/CHANGELOG.md rename to stable/sabnzbd/9.0.25/CHANGELOG.md index 1fc166a8926..427eedc8626 100644 --- a/stable/sabnzbd/9.0.24/CHANGELOG.md +++ b/stable/sabnzbd/9.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [sabnzbd-9.0.25](https://github.com/truecharts/apps/compare/sabnzbd-9.0.24...sabnzbd-9.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [sabnzbd-9.0.24](https://github.com/truecharts/apps/compare/sabnzbd-9.0.23...sabnzbd-9.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [sabnzbd-9.0.16](https://github.com/truecharts/apps/compare/sabnzbd-9.0.15...sabnzbd-9.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [sabnzbd-9.0.15](https://github.com/truecharts/apps/compare/sabnzbd-9.0.14...sabnzbd-9.0.15) (2021-12-04) - diff --git a/stable/sickgear/1.0.24/CONFIG.md b/stable/sabnzbd/9.0.25/CONFIG.md similarity index 100% rename from stable/sickgear/1.0.24/CONFIG.md rename to stable/sabnzbd/9.0.25/CONFIG.md diff --git a/stable/sabnzbd/9.0.25/Chart.lock b/stable/sabnzbd/9.0.25/Chart.lock new file mode 100644 index 00000000000..d64f2c6f451 --- /dev/null +++ b/stable/sabnzbd/9.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:14.649623039Z" diff --git a/stable/sabnzbd/9.0.24/Chart.yaml b/stable/sabnzbd/9.0.25/Chart.yaml similarity index 97% rename from stable/sabnzbd/9.0.24/Chart.yaml rename to stable/sabnzbd/9.0.25/Chart.yaml index ba17304bc7f..b74454aa943 100644 --- a/stable/sabnzbd/9.0.24/Chart.yaml +++ b/stable/sabnzbd/9.0.25/Chart.yaml @@ -20,7 +20,7 @@ name: sabnzbd sources: - https://sabnzbd.org/ type: application -version: 9.0.24 +version: 9.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/sabnzbd/9.0.24/README.md b/stable/sabnzbd/9.0.25/README.md similarity index 100% rename from stable/sabnzbd/9.0.24/README.md rename to stable/sabnzbd/9.0.25/README.md diff --git a/stable/sabnzbd/9.0.24/app-readme.md b/stable/sabnzbd/9.0.25/app-readme.md similarity index 100% rename from stable/sabnzbd/9.0.24/app-readme.md rename to stable/sabnzbd/9.0.25/app-readme.md diff --git a/stable/sickgear/1.0.24/charts/common-8.9.24.tgz b/stable/sabnzbd/9.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/sickgear/1.0.24/charts/common-8.9.24.tgz rename to stable/sabnzbd/9.0.25/charts/common-8.9.24.tgz diff --git a/stable/sabnzbd/9.0.24/helm-values.md b/stable/sabnzbd/9.0.25/helm-values.md similarity index 100% rename from stable/sabnzbd/9.0.24/helm-values.md rename to stable/sabnzbd/9.0.25/helm-values.md diff --git a/stable/sabnzbd/9.0.24/ix_values.yaml b/stable/sabnzbd/9.0.25/ix_values.yaml similarity index 100% rename from stable/sabnzbd/9.0.24/ix_values.yaml rename to stable/sabnzbd/9.0.25/ix_values.yaml diff --git a/stable/sabnzbd/9.0.24/questions.yaml b/stable/sabnzbd/9.0.25/questions.yaml similarity index 99% rename from stable/sabnzbd/9.0.24/questions.yaml rename to stable/sabnzbd/9.0.25/questions.yaml index a724b669093..b2b385bfd50 100644 --- a/stable/sabnzbd/9.0.24/questions.yaml +++ b/stable/sabnzbd/9.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10097 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/sabnzbd/9.0.24/security.md b/stable/sabnzbd/9.0.25/security.md similarity index 100% rename from stable/sabnzbd/9.0.24/security.md rename to stable/sabnzbd/9.0.25/security.md diff --git a/stable/ser2sock/4.0.24/templates/common.yaml b/stable/sabnzbd/9.0.25/templates/common.yaml similarity index 100% rename from stable/ser2sock/4.0.24/templates/common.yaml rename to stable/sabnzbd/9.0.25/templates/common.yaml diff --git a/stable/sickgear/1.0.24/values.yaml b/stable/sabnzbd/9.0.25/values.yaml similarity index 100% rename from stable/sickgear/1.0.24/values.yaml rename to stable/sabnzbd/9.0.25/values.yaml diff --git a/stable/scrutiny/0.0.6/Chart.lock b/stable/scrutiny/0.0.6/Chart.lock deleted file mode 100644 index 09f3b2e1d36..00000000000 --- a/stable/scrutiny/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:37.335949042Z" diff --git a/stable/scrutiny/0.0.6/CHANGELOG.md b/stable/scrutiny/0.0.7/CHANGELOG.md similarity index 88% rename from stable/scrutiny/0.0.6/CHANGELOG.md rename to stable/scrutiny/0.0.7/CHANGELOG.md index 6483d35af76..c4069a182e4 100644 --- a/stable/scrutiny/0.0.6/CHANGELOG.md +++ b/stable/scrutiny/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [scrutiny-0.0.7](https://github.com/truecharts/apps/compare/scrutiny-0.0.6...scrutiny-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [scrutiny-0.0.6](https://github.com/truecharts/apps/compare/scrutiny-0.0.5...scrutiny-0.0.6) (2021-12-19) diff --git a/stable/smokeping/1.0.26/CONFIG.md b/stable/scrutiny/0.0.7/CONFIG.md similarity index 100% rename from stable/smokeping/1.0.26/CONFIG.md rename to stable/scrutiny/0.0.7/CONFIG.md diff --git a/stable/scrutiny/0.0.7/Chart.lock b/stable/scrutiny/0.0.7/Chart.lock new file mode 100644 index 00000000000..ad8092413db --- /dev/null +++ b/stable/scrutiny/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:16.959682265Z" diff --git a/stable/scrutiny/0.0.6/Chart.yaml b/stable/scrutiny/0.0.7/Chart.yaml similarity index 98% rename from stable/scrutiny/0.0.6/Chart.yaml rename to stable/scrutiny/0.0.7/Chart.yaml index 689f478ad20..90b9078baff 100644 --- a/stable/scrutiny/0.0.6/Chart.yaml +++ b/stable/scrutiny/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: scrutiny -version: 0.0.6 +version: 0.0.7 appVersion: "2021.11.18" description: Scrutiny WebUI for smartd S.M.A.R.T monitoring. Scrutiny is a Hard Drive Health Dashboard & Monitoring solution. type: application diff --git a/stable/scrutiny/0.0.6/README.md b/stable/scrutiny/0.0.7/README.md similarity index 100% rename from stable/scrutiny/0.0.6/README.md rename to stable/scrutiny/0.0.7/README.md diff --git a/stable/scrutiny/0.0.6/app-readme.md b/stable/scrutiny/0.0.7/app-readme.md similarity index 100% rename from stable/scrutiny/0.0.6/app-readme.md rename to stable/scrutiny/0.0.7/app-readme.md diff --git a/stable/smokeping/1.0.26/charts/common-8.9.24.tgz b/stable/scrutiny/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/smokeping/1.0.26/charts/common-8.9.24.tgz rename to stable/scrutiny/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/scrutiny/0.0.6/helm-values.md b/stable/scrutiny/0.0.7/helm-values.md similarity index 100% rename from stable/scrutiny/0.0.6/helm-values.md rename to stable/scrutiny/0.0.7/helm-values.md diff --git a/stable/scrutiny/0.0.6/ix_values.yaml b/stable/scrutiny/0.0.7/ix_values.yaml similarity index 100% rename from stable/scrutiny/0.0.6/ix_values.yaml rename to stable/scrutiny/0.0.7/ix_values.yaml diff --git a/stable/scrutiny/0.0.6/questions.yaml b/stable/scrutiny/0.0.7/questions.yaml similarity index 100% rename from stable/scrutiny/0.0.6/questions.yaml rename to stable/scrutiny/0.0.7/questions.yaml diff --git a/stable/scrutiny/0.0.6/security.md b/stable/scrutiny/0.0.7/security.md similarity index 100% rename from stable/scrutiny/0.0.6/security.md rename to stable/scrutiny/0.0.7/security.md diff --git a/stable/shiori/4.0.15/templates/common.yaml b/stable/scrutiny/0.0.7/templates/common.yaml similarity index 100% rename from stable/shiori/4.0.15/templates/common.yaml rename to stable/scrutiny/0.0.7/templates/common.yaml diff --git a/stable/smokeping/1.0.26/values.yaml b/stable/scrutiny/0.0.7/values.yaml similarity index 100% rename from stable/smokeping/1.0.26/values.yaml rename to stable/scrutiny/0.0.7/values.yaml diff --git a/stable/ser2sock/4.0.24/Chart.lock b/stable/ser2sock/4.0.24/Chart.lock deleted file mode 100644 index 0456244efb0..00000000000 --- a/stable/ser2sock/4.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:38.54939473Z" diff --git a/stable/ser2sock/4.0.24/CHANGELOG.md b/stable/ser2sock/4.0.25/CHANGELOG.md similarity index 86% rename from stable/ser2sock/4.0.24/CHANGELOG.md rename to stable/ser2sock/4.0.25/CHANGELOG.md index 3bb1102f5ab..ee1f4d2b348 100644 --- a/stable/ser2sock/4.0.24/CHANGELOG.md +++ b/stable/ser2sock/4.0.25/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [ser2sock-4.0.25](https://github.com/truecharts/apps/compare/ser2sock-4.0.24...ser2sock-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [ser2sock-4.0.24](https://github.com/truecharts/apps/compare/ser2sock-4.0.23...ser2sock-4.0.24) (2021-12-19) @@ -86,14 +97,3 @@ -### [ser2sock-4.0.16](https://github.com/truecharts/apps/compare/ser2sock-4.0.15...ser2sock-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [ser2sock-4.0.15](https://github.com/truecharts/apps/compare/ser2sock-4.0.14...ser2sock-4.0.15) (2021-12-04) - diff --git a/stable/snipe-it/0.0.16/CONFIG.md b/stable/ser2sock/4.0.25/CONFIG.md similarity index 100% rename from stable/snipe-it/0.0.16/CONFIG.md rename to stable/ser2sock/4.0.25/CONFIG.md diff --git a/stable/ser2sock/4.0.25/Chart.lock b/stable/ser2sock/4.0.25/Chart.lock new file mode 100644 index 00000000000..cf0e16f90c9 --- /dev/null +++ b/stable/ser2sock/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:20.739916146Z" diff --git a/stable/ser2sock/4.0.24/Chart.yaml b/stable/ser2sock/4.0.25/Chart.yaml similarity index 97% rename from stable/ser2sock/4.0.24/Chart.yaml rename to stable/ser2sock/4.0.25/Chart.yaml index 4a03f575d1d..fd1eca89f05 100644 --- a/stable/ser2sock/4.0.24/Chart.yaml +++ b/stable/ser2sock/4.0.25/Chart.yaml @@ -18,7 +18,7 @@ name: ser2sock sources: - https://github.com/nutechsoftware/ser2sock - https://github.com/tenstartups/ser2sock -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/ser2sock/4.0.24/README.md b/stable/ser2sock/4.0.25/README.md similarity index 100% rename from stable/ser2sock/4.0.24/README.md rename to stable/ser2sock/4.0.25/README.md diff --git a/stable/ser2sock/4.0.24/app-readme.md b/stable/ser2sock/4.0.25/app-readme.md similarity index 100% rename from stable/ser2sock/4.0.24/app-readme.md rename to stable/ser2sock/4.0.25/app-readme.md diff --git a/stable/snipe-it/0.0.16/charts/common-8.9.24.tgz b/stable/ser2sock/4.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/snipe-it/0.0.16/charts/common-8.9.24.tgz rename to stable/ser2sock/4.0.25/charts/common-8.9.24.tgz diff --git a/stable/ser2sock/4.0.24/ci/test-values.yaml b/stable/ser2sock/4.0.25/ci/test-values.yaml similarity index 100% rename from stable/ser2sock/4.0.24/ci/test-values.yaml rename to stable/ser2sock/4.0.25/ci/test-values.yaml diff --git a/stable/ser2sock/4.0.24/helm-values.md b/stable/ser2sock/4.0.25/helm-values.md similarity index 100% rename from stable/ser2sock/4.0.24/helm-values.md rename to stable/ser2sock/4.0.25/helm-values.md diff --git a/stable/ser2sock/4.0.24/ix_values.yaml b/stable/ser2sock/4.0.25/ix_values.yaml similarity index 100% rename from stable/ser2sock/4.0.24/ix_values.yaml rename to stable/ser2sock/4.0.25/ix_values.yaml diff --git a/stable/ser2sock/4.0.24/questions.yaml b/stable/ser2sock/4.0.25/questions.yaml similarity index 99% rename from stable/ser2sock/4.0.24/questions.yaml rename to stable/ser2sock/4.0.25/questions.yaml index 1e91a9c9acd..7e1db46e3d8 100644 --- a/stable/ser2sock/4.0.24/questions.yaml +++ b/stable/ser2sock/4.0.25/questions.yaml @@ -207,13 +207,6 @@ questions: type: string required: true default: "" - - variable: LISTENER_PORT - label: "LISTENER_PORT" - description: "Port where ser2sock listens" - schema: - type: string - hidden: true - default: "{{ .Values.service.main.ports.main.port }}" - variable: envList label: "Image environment" group: "Container Configuration" @@ -364,7 +357,6 @@ questions: schema: type: int default: 10000 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/ser2sock/4.0.24/security.md b/stable/ser2sock/4.0.25/security.md similarity index 100% rename from stable/ser2sock/4.0.24/security.md rename to stable/ser2sock/4.0.25/security.md diff --git a/stable/sonarr/9.0.25/templates/common.yaml b/stable/ser2sock/4.0.25/templates/common.yaml similarity index 100% rename from stable/sonarr/9.0.25/templates/common.yaml rename to stable/ser2sock/4.0.25/templates/common.yaml diff --git a/stable/snipe-it/0.0.16/values.yaml b/stable/ser2sock/4.0.25/values.yaml similarity index 100% rename from stable/snipe-it/0.0.16/values.yaml rename to stable/ser2sock/4.0.25/values.yaml diff --git a/stable/shiori/4.0.15/Chart.lock b/stable/shiori/4.0.15/Chart.lock deleted file mode 100644 index e37a0b90bf9..00000000000 --- a/stable/shiori/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:47:44.436450755Z" diff --git a/stable/shiori/4.0.15/CHANGELOG.md b/stable/shiori/4.0.16/CHANGELOG.md similarity index 88% rename from stable/shiori/4.0.15/CHANGELOG.md rename to stable/shiori/4.0.16/CHANGELOG.md index 68beb0305e4..c94d4768258 100644 --- a/stable/shiori/4.0.15/CHANGELOG.md +++ b/stable/shiori/4.0.16/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [shiori-4.0.16](https://github.com/truecharts/apps/compare/shiori-4.0.15...shiori-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [shiori-4.0.15](https://github.com/truecharts/apps/compare/shiori-4.0.14...shiori-4.0.15) (2021-12-19) @@ -86,14 +97,3 @@ -### [shiori-4.0.7](https://github.com/truecharts/apps/compare/shiori-4.0.6...shiori-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [shiori-4.0.6](https://github.com/truecharts/apps/compare/shiori-4.0.5...shiori-4.0.6) (2021-12-04) - diff --git a/stable/sonarr/9.0.25/CONFIG.md b/stable/shiori/4.0.16/CONFIG.md similarity index 100% rename from stable/sonarr/9.0.25/CONFIG.md rename to stable/shiori/4.0.16/CONFIG.md diff --git a/stable/shiori/4.0.16/Chart.lock b/stable/shiori/4.0.16/Chart.lock new file mode 100644 index 00000000000..838e3fdd642 --- /dev/null +++ b/stable/shiori/4.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:34:34.973901248Z" diff --git a/stable/shiori/4.0.15/Chart.yaml b/stable/shiori/4.0.16/Chart.yaml similarity index 98% rename from stable/shiori/4.0.15/Chart.yaml rename to stable/shiori/4.0.16/Chart.yaml index 698bb0e5cad..fa44e605403 100644 --- a/stable/shiori/4.0.15/Chart.yaml +++ b/stable/shiori/4.0.16/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 appVersion: "1.5.0" -version: 4.0.15 +version: 4.0.16 kubeVersion: '>=1.16.0-0' name: shiori description: A simple bookmark manager built with Go diff --git a/stable/shiori/4.0.15/README.md b/stable/shiori/4.0.16/README.md similarity index 100% rename from stable/shiori/4.0.15/README.md rename to stable/shiori/4.0.16/README.md diff --git a/stable/shiori/4.0.15/app-readme.md b/stable/shiori/4.0.16/app-readme.md similarity index 100% rename from stable/shiori/4.0.15/app-readme.md rename to stable/shiori/4.0.16/app-readme.md diff --git a/stable/sonarr/9.0.25/charts/common-8.9.24.tgz b/stable/shiori/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/sonarr/9.0.25/charts/common-8.9.24.tgz rename to stable/shiori/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/traccar/4.0.15/charts/postgresql-6.0.34.tgz b/stable/shiori/4.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/traccar/4.0.15/charts/postgresql-6.0.34.tgz rename to stable/shiori/4.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/shiori/4.0.15/helm-values.md b/stable/shiori/4.0.16/helm-values.md similarity index 92% rename from stable/shiori/4.0.15/helm-values.md rename to stable/shiori/4.0.16/helm-values.md index 5afc895ab35..72b0bf4330d 100644 --- a/stable/shiori/4.0.15/helm-values.md +++ b/stable/shiori/4.0.16/helm-values.md @@ -12,8 +12,8 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| | env.PUID | int | `568` | | -| envTpl.SHIORI_PG_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.SHIORI_PG_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.SHIORI_PG_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.SHIORI_PG_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.SHIORI_PG_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.SHIORI_PG_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.SHIORI_PG_PASS.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/shiori/4.0.15/ix_values.yaml b/stable/shiori/4.0.16/ix_values.yaml similarity index 99% rename from stable/shiori/4.0.15/ix_values.yaml rename to stable/shiori/4.0.16/ix_values.yaml index 9c2bb2e85b1..1e9843f4331 100644 --- a/stable/shiori/4.0.15/ix_values.yaml +++ b/stable/shiori/4.0.16/ix_values.yaml @@ -17,8 +17,6 @@ podSecurityContext: env: # TZ: PUID: 568 - -envTpl: SHIORI_PG_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" SHIORI_PG_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/shiori/4.0.15/questions.yaml b/stable/shiori/4.0.16/questions.yaml similarity index 99% rename from stable/shiori/4.0.15/questions.yaml rename to stable/shiori/4.0.16/questions.yaml index eb76d3ed5e0..b77c26e1786 100644 --- a/stable/shiori/4.0.15/questions.yaml +++ b/stable/shiori/4.0.16/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10098 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/shiori/4.0.15/security.md b/stable/shiori/4.0.16/security.md similarity index 100% rename from stable/shiori/4.0.15/security.md rename to stable/shiori/4.0.16/security.md diff --git a/stable/speedtest-exporter/1.0.11/templates/common.yaml b/stable/shiori/4.0.16/templates/common.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/templates/common.yaml rename to stable/shiori/4.0.16/templates/common.yaml diff --git a/stable/sonarr/9.0.25/values.yaml b/stable/shiori/4.0.16/values.yaml similarity index 100% rename from stable/sonarr/9.0.25/values.yaml rename to stable/shiori/4.0.16/values.yaml diff --git a/stable/shorturl/1.0.24/Chart.lock b/stable/shorturl/1.0.24/Chart.lock deleted file mode 100644 index ed97b6c7298..00000000000 --- a/stable/shorturl/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:47:53.713794378Z" diff --git a/stable/shorturl/1.0.24/CHANGELOG.md b/stable/shorturl/1.0.25/CHANGELOG.md similarity index 90% rename from stable/shorturl/1.0.24/CHANGELOG.md rename to stable/shorturl/1.0.25/CHANGELOG.md index d2af1a5caec..e87656e7ce5 100644 --- a/stable/shorturl/1.0.24/CHANGELOG.md +++ b/stable/shorturl/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [shorturl-1.0.25](https://github.com/truecharts/apps/compare/shorturl-1.0.24...shorturl-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [shorturl-1.0.24](https://github.com/truecharts/apps/compare/shorturl-1.0.23...shorturl-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [shorturl-1.0.16](https://github.com/truecharts/apps/compare/shorturl-1.0.15...shorturl-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [shorturl-1.0.15](https://github.com/truecharts/apps/compare/shorturl-1.0.14...shorturl-1.0.15) (2021-12-04) diff --git a/stable/speedtest-exporter/1.0.11/CONFIG.md b/stable/shorturl/1.0.25/CONFIG.md similarity index 100% rename from stable/speedtest-exporter/1.0.11/CONFIG.md rename to stable/shorturl/1.0.25/CONFIG.md diff --git a/stable/shorturl/1.0.25/Chart.lock b/stable/shorturl/1.0.25/Chart.lock new file mode 100644 index 00000000000..5fd12757bcd --- /dev/null +++ b/stable/shorturl/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:42.670177222Z" diff --git a/stable/shorturl/1.0.24/Chart.yaml b/stable/shorturl/1.0.25/Chart.yaml similarity index 97% rename from stable/shorturl/1.0.24/Chart.yaml rename to stable/shorturl/1.0.25/Chart.yaml index 000e64f9a20..354d0babda7 100644 --- a/stable/shorturl/1.0.24/Chart.yaml +++ b/stable/shorturl/1.0.25/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/prologic/shorturl - https://github.com/nicholaswilde/docker-shorturl type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/shorturl/1.0.24/README.md b/stable/shorturl/1.0.25/README.md similarity index 100% rename from stable/shorturl/1.0.24/README.md rename to stable/shorturl/1.0.25/README.md diff --git a/stable/shorturl/1.0.24/app-readme.md b/stable/shorturl/1.0.25/app-readme.md similarity index 100% rename from stable/shorturl/1.0.24/app-readme.md rename to stable/shorturl/1.0.25/app-readme.md diff --git a/stable/speedtest-exporter/1.0.11/charts/common-8.9.24.tgz b/stable/shorturl/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/speedtest-exporter/1.0.11/charts/common-8.9.24.tgz rename to stable/shorturl/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/shorturl/1.0.24/helm-values.md b/stable/shorturl/1.0.25/helm-values.md similarity index 100% rename from stable/shorturl/1.0.24/helm-values.md rename to stable/shorturl/1.0.25/helm-values.md diff --git a/stable/shorturl/1.0.24/ix_values.yaml b/stable/shorturl/1.0.25/ix_values.yaml similarity index 100% rename from stable/shorturl/1.0.24/ix_values.yaml rename to stable/shorturl/1.0.25/ix_values.yaml diff --git a/stable/shorturl/1.0.24/questions.yaml b/stable/shorturl/1.0.25/questions.yaml similarity index 99% rename from stable/shorturl/1.0.24/questions.yaml rename to stable/shorturl/1.0.25/questions.yaml index d959b967542..cb932ec0de9 100644 --- a/stable/shorturl/1.0.24/questions.yaml +++ b/stable/shorturl/1.0.25/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10076 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/shorturl/1.0.24/security.md b/stable/shorturl/1.0.25/security.md similarity index 100% rename from stable/shorturl/1.0.24/security.md rename to stable/shorturl/1.0.25/security.md diff --git a/stable/shorturl/1.0.24/templates/common.yaml b/stable/shorturl/1.0.25/templates/common.yaml similarity index 100% rename from stable/shorturl/1.0.24/templates/common.yaml rename to stable/shorturl/1.0.25/templates/common.yaml diff --git a/stable/speedtest-exporter/1.0.11/values.yaml b/stable/shorturl/1.0.25/values.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/values.yaml rename to stable/shorturl/1.0.25/values.yaml diff --git a/stable/sickchill/1.0.24/Chart.lock b/stable/sickchill/1.0.24/Chart.lock deleted file mode 100644 index 94ba8454c52..00000000000 --- a/stable/sickchill/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:02.572523668Z" diff --git a/stable/sickchill/1.0.24/CHANGELOG.md b/stable/sickchill/1.0.25/CHANGELOG.md similarity index 90% rename from stable/sickchill/1.0.24/CHANGELOG.md rename to stable/sickchill/1.0.25/CHANGELOG.md index 804fe8da77e..4ff9628db59 100644 --- a/stable/sickchill/1.0.24/CHANGELOG.md +++ b/stable/sickchill/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [sickchill-1.0.25](https://github.com/truecharts/apps/compare/sickchill-1.0.24...sickchill-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [sickchill-1.0.24](https://github.com/truecharts/apps/compare/sickchill-1.0.23...sickchill-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [sickchill-1.0.16](https://github.com/truecharts/apps/compare/sickchill-1.0.15...sickchill-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [sickchill-1.0.15](https://github.com/truecharts/apps/compare/sickchill-1.0.14...sickchill-1.0.15) (2021-12-04) diff --git a/stable/sqlitebrowser/1.0.28/CONFIG.md b/stable/sickchill/1.0.25/CONFIG.md similarity index 100% rename from stable/sqlitebrowser/1.0.28/CONFIG.md rename to stable/sickchill/1.0.25/CONFIG.md diff --git a/stable/sickchill/1.0.25/Chart.lock b/stable/sickchill/1.0.25/Chart.lock new file mode 100644 index 00000000000..6d687502360 --- /dev/null +++ b/stable/sickchill/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:44.004780697Z" diff --git a/stable/sickchill/1.0.24/Chart.yaml b/stable/sickchill/1.0.25/Chart.yaml similarity index 97% rename from stable/sickchill/1.0.24/Chart.yaml rename to stable/sickchill/1.0.25/Chart.yaml index 40f4eab9171..363f2243c1f 100644 --- a/stable/sickchill/1.0.24/Chart.yaml +++ b/stable/sickchill/1.0.25/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/linuxserver/docker-sickchill - https://github.com/SickChill/SickChill type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/sickchill/1.0.24/README.md b/stable/sickchill/1.0.25/README.md similarity index 100% rename from stable/sickchill/1.0.24/README.md rename to stable/sickchill/1.0.25/README.md diff --git a/stable/sickchill/1.0.24/app-readme.md b/stable/sickchill/1.0.25/app-readme.md similarity index 100% rename from stable/sickchill/1.0.24/app-readme.md rename to stable/sickchill/1.0.25/app-readme.md diff --git a/stable/sqlitebrowser/1.0.28/charts/common-8.9.24.tgz b/stable/sickchill/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/sqlitebrowser/1.0.28/charts/common-8.9.24.tgz rename to stable/sickchill/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/sickchill/1.0.24/helm-values.md b/stable/sickchill/1.0.25/helm-values.md similarity index 100% rename from stable/sickchill/1.0.24/helm-values.md rename to stable/sickchill/1.0.25/helm-values.md diff --git a/stable/sickchill/1.0.24/ix_values.yaml b/stable/sickchill/1.0.25/ix_values.yaml similarity index 100% rename from stable/sickchill/1.0.24/ix_values.yaml rename to stable/sickchill/1.0.25/ix_values.yaml diff --git a/stable/sickchill/1.0.24/questions.yaml b/stable/sickchill/1.0.25/questions.yaml similarity index 99% rename from stable/sickchill/1.0.24/questions.yaml rename to stable/sickchill/1.0.25/questions.yaml index bfa19df75cb..7190af8ed21 100644 --- a/stable/sickchill/1.0.24/questions.yaml +++ b/stable/sickchill/1.0.25/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10067 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/sickchill/1.0.24/security.md b/stable/sickchill/1.0.25/security.md similarity index 100% rename from stable/sickchill/1.0.24/security.md rename to stable/sickchill/1.0.25/security.md diff --git a/stable/sickchill/1.0.24/templates/common.yaml b/stable/sickchill/1.0.25/templates/common.yaml similarity index 100% rename from stable/sickchill/1.0.24/templates/common.yaml rename to stable/sickchill/1.0.25/templates/common.yaml diff --git a/stable/sqlitebrowser/1.0.28/values.yaml b/stable/sickchill/1.0.25/values.yaml similarity index 100% rename from stable/sqlitebrowser/1.0.28/values.yaml rename to stable/sickchill/1.0.25/values.yaml diff --git a/stable/sickgear/1.0.24/Chart.lock b/stable/sickgear/1.0.24/Chart.lock deleted file mode 100644 index 27513eb2a4f..00000000000 --- a/stable/sickgear/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:02.870781129Z" diff --git a/stable/sickgear/1.0.24/CHANGELOG.md b/stable/sickgear/1.0.25/CHANGELOG.md similarity index 90% rename from stable/sickgear/1.0.24/CHANGELOG.md rename to stable/sickgear/1.0.25/CHANGELOG.md index c8bd1357cb8..d31fde5db9f 100644 --- a/stable/sickgear/1.0.24/CHANGELOG.md +++ b/stable/sickgear/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [sickgear-1.0.25](https://github.com/truecharts/apps/compare/sickgear-1.0.24...sickgear-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [sickgear-1.0.24](https://github.com/truecharts/apps/compare/sickgear-1.0.23...sickgear-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [sickgear-1.0.16](https://github.com/truecharts/apps/compare/sickgear-1.0.15...sickgear-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [sickgear-1.0.15](https://github.com/truecharts/apps/compare/sickgear-1.0.14...sickgear-1.0.15) (2021-12-04) - diff --git a/stable/stash/5.0.5/CONFIG.md b/stable/sickgear/1.0.25/CONFIG.md similarity index 100% rename from stable/stash/5.0.5/CONFIG.md rename to stable/sickgear/1.0.25/CONFIG.md diff --git a/stable/sickgear/1.0.25/Chart.lock b/stable/sickgear/1.0.25/Chart.lock new file mode 100644 index 00000000000..3ec84c183e1 --- /dev/null +++ b/stable/sickgear/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:34:45.730002604Z" diff --git a/stable/sickgear/1.0.24/Chart.yaml b/stable/sickgear/1.0.25/Chart.yaml similarity index 98% rename from stable/sickgear/1.0.24/Chart.yaml rename to stable/sickgear/1.0.25/Chart.yaml index bb960baa9c2..4b86ef7dbb7 100644 --- a/stable/sickgear/1.0.24/Chart.yaml +++ b/stable/sickgear/1.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-sickgear - https://github.com/SickGear/SickGear type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/sickgear/1.0.24/README.md b/stable/sickgear/1.0.25/README.md similarity index 100% rename from stable/sickgear/1.0.24/README.md rename to stable/sickgear/1.0.25/README.md diff --git a/stable/sickgear/1.0.24/app-readme.md b/stable/sickgear/1.0.25/app-readme.md similarity index 100% rename from stable/sickgear/1.0.24/app-readme.md rename to stable/sickgear/1.0.25/app-readme.md diff --git a/stable/stash/5.0.5/charts/common-8.9.24.tgz b/stable/sickgear/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/stash/5.0.5/charts/common-8.9.24.tgz rename to stable/sickgear/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/sickgear/1.0.24/helm-values.md b/stable/sickgear/1.0.25/helm-values.md similarity index 100% rename from stable/sickgear/1.0.24/helm-values.md rename to stable/sickgear/1.0.25/helm-values.md diff --git a/stable/sickgear/1.0.24/ix_values.yaml b/stable/sickgear/1.0.25/ix_values.yaml similarity index 100% rename from stable/sickgear/1.0.24/ix_values.yaml rename to stable/sickgear/1.0.25/ix_values.yaml diff --git a/stable/sickgear/1.0.24/questions.yaml b/stable/sickgear/1.0.25/questions.yaml similarity index 99% rename from stable/sickgear/1.0.24/questions.yaml rename to stable/sickgear/1.0.25/questions.yaml index 4af852635f8..4ebc6a9ace6 100644 --- a/stable/sickgear/1.0.24/questions.yaml +++ b/stable/sickgear/1.0.25/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10066 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/sickgear/1.0.24/security.md b/stable/sickgear/1.0.25/security.md similarity index 100% rename from stable/sickgear/1.0.24/security.md rename to stable/sickgear/1.0.25/security.md diff --git a/stable/sickgear/1.0.24/templates/common.yaml b/stable/sickgear/1.0.25/templates/common.yaml similarity index 100% rename from stable/sickgear/1.0.24/templates/common.yaml rename to stable/sickgear/1.0.25/templates/common.yaml diff --git a/stable/stash/5.0.5/values.yaml b/stable/sickgear/1.0.25/values.yaml similarity index 100% rename from stable/stash/5.0.5/values.yaml rename to stable/sickgear/1.0.25/values.yaml diff --git a/stable/smokeping/1.0.26/Chart.lock b/stable/smokeping/1.0.26/Chart.lock deleted file mode 100644 index a64362ca669..00000000000 --- a/stable/smokeping/1.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:10.483240772Z" diff --git a/stable/smokeping/1.0.26/CHANGELOG.md b/stable/smokeping/1.0.27/CHANGELOG.md similarity index 90% rename from stable/smokeping/1.0.26/CHANGELOG.md rename to stable/smokeping/1.0.27/CHANGELOG.md index a4a85e9d545..b2777b67457 100644 --- a/stable/smokeping/1.0.26/CHANGELOG.md +++ b/stable/smokeping/1.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [smokeping-1.0.27](https://github.com/truecharts/apps/compare/smokeping-1.0.26...smokeping-1.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [smokeping-1.0.26](https://github.com/truecharts/apps/compare/smokeping-1.0.25...smokeping-1.0.26) (2021-12-19) @@ -87,13 +97,3 @@ #### Chore * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [smokeping-1.0.18](https://github.com/truecharts/apps/compare/smokeping-1.0.17...smokeping-1.0.18) (2021-12-04) - -#### Chore - -* bump apps to generate security page - diff --git a/stable/static/1.0.24/CONFIG.md b/stable/smokeping/1.0.27/CONFIG.md similarity index 100% rename from stable/static/1.0.24/CONFIG.md rename to stable/smokeping/1.0.27/CONFIG.md diff --git a/stable/smokeping/1.0.27/Chart.lock b/stable/smokeping/1.0.27/Chart.lock new file mode 100644 index 00000000000..4683f921280 --- /dev/null +++ b/stable/smokeping/1.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:01.476089772Z" diff --git a/stable/smokeping/1.0.26/Chart.yaml b/stable/smokeping/1.0.27/Chart.yaml similarity index 97% rename from stable/smokeping/1.0.26/Chart.yaml rename to stable/smokeping/1.0.27/Chart.yaml index 3038d1ab652..c9cee29a34b 100644 --- a/stable/smokeping/1.0.26/Chart.yaml +++ b/stable/smokeping/1.0.27/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://oss.oetiker.ch/smokeping/ - https://hub.docker.com/r/linuxserver/smokeping type: application -version: 1.0.26 +version: 1.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/smokeping/1.0.26/README.md b/stable/smokeping/1.0.27/README.md similarity index 100% rename from stable/smokeping/1.0.26/README.md rename to stable/smokeping/1.0.27/README.md diff --git a/stable/smokeping/1.0.26/app-readme.md b/stable/smokeping/1.0.27/app-readme.md similarity index 100% rename from stable/smokeping/1.0.26/app-readme.md rename to stable/smokeping/1.0.27/app-readme.md diff --git a/stable/static/1.0.24/charts/common-8.9.24.tgz b/stable/smokeping/1.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/static/1.0.24/charts/common-8.9.24.tgz rename to stable/smokeping/1.0.27/charts/common-8.9.24.tgz diff --git a/stable/smokeping/1.0.26/helm-values.md b/stable/smokeping/1.0.27/helm-values.md similarity index 100% rename from stable/smokeping/1.0.26/helm-values.md rename to stable/smokeping/1.0.27/helm-values.md diff --git a/stable/smokeping/1.0.26/ix_values.yaml b/stable/smokeping/1.0.27/ix_values.yaml similarity index 100% rename from stable/smokeping/1.0.26/ix_values.yaml rename to stable/smokeping/1.0.27/ix_values.yaml diff --git a/stable/smokeping/1.0.26/questions.yaml b/stable/smokeping/1.0.27/questions.yaml similarity index 99% rename from stable/smokeping/1.0.26/questions.yaml rename to stable/smokeping/1.0.27/questions.yaml index 341810a6830..ebf30916b46 100644 --- a/stable/smokeping/1.0.26/questions.yaml +++ b/stable/smokeping/1.0.27/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10030 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/smokeping/1.0.26/security.md b/stable/smokeping/1.0.27/security.md similarity index 100% rename from stable/smokeping/1.0.26/security.md rename to stable/smokeping/1.0.27/security.md diff --git a/stable/smokeping/1.0.26/templates/common.yaml b/stable/smokeping/1.0.27/templates/common.yaml similarity index 100% rename from stable/smokeping/1.0.26/templates/common.yaml rename to stable/smokeping/1.0.27/templates/common.yaml diff --git a/stable/static/1.0.24/values.yaml b/stable/smokeping/1.0.27/values.yaml similarity index 100% rename from stable/static/1.0.24/values.yaml rename to stable/smokeping/1.0.27/values.yaml diff --git a/stable/snipe-it/0.0.16/Chart.lock b/stable/snipe-it/0.0.16/Chart.lock deleted file mode 100644 index 886dad3f38f..00000000000 --- a/stable/snipe-it/0.0.16/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: mariadb - repository: https://truecharts.org/ - version: 1.0.37 -digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 -generated: "2021-12-19T18:48:15.241762896Z" diff --git a/stable/snipe-it/0.0.16/CHANGELOG.md b/stable/snipe-it/0.0.17/CHANGELOG.md similarity index 91% rename from stable/snipe-it/0.0.16/CHANGELOG.md rename to stable/snipe-it/0.0.17/CHANGELOG.md index d7cb2e6b72a..9559ff62e8f 100644 --- a/stable/snipe-it/0.0.16/CHANGELOG.md +++ b/stable/snipe-it/0.0.17/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [snipe-it-0.0.17](https://github.com/truecharts/apps/compare/snipe-it-0.0.16...snipe-it-0.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [snipe-it-0.0.16](https://github.com/truecharts/apps/compare/snipe-it-0.0.15...snipe-it-0.0.16) (2021-12-19) @@ -88,12 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1433](https://github.com/truecharts/apps/issues/1433)) -* update non-major ([#1431](https://github.com/truecharts/apps/issues/1431)) - -#### Feat - -* add a bunch of mariaDB backed Apps ([#1407](https://github.com/truecharts/apps/issues/1407)) - - - diff --git a/stable/statping/4.0.15/CONFIG.md b/stable/snipe-it/0.0.17/CONFIG.md similarity index 100% rename from stable/statping/4.0.15/CONFIG.md rename to stable/snipe-it/0.0.17/CONFIG.md diff --git a/stable/snipe-it/0.0.17/Chart.lock b/stable/snipe-it/0.0.17/Chart.lock new file mode 100644 index 00000000000..8f32c76c2a7 --- /dev/null +++ b/stable/snipe-it/0.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:35:06.216779095Z" diff --git a/stable/snipe-it/0.0.16/Chart.yaml b/stable/snipe-it/0.0.17/Chart.yaml similarity index 98% rename from stable/snipe-it/0.0.16/Chart.yaml rename to stable/snipe-it/0.0.17/Chart.yaml index abc352916ac..bb45e4c0374 100644 --- a/stable/snipe-it/0.0.16/Chart.yaml +++ b/stable/snipe-it/0.0.17/Chart.yaml @@ -25,7 +25,7 @@ name: snipe-it sources: - https://snipeitapp.com/ - https://hub.docker.com/r/linuxserver/ -version: 0.0.16 +version: 0.0.17 annotations: truecharts.org/catagories: | - management diff --git a/stable/snipe-it/0.0.16/README.md b/stable/snipe-it/0.0.17/README.md similarity index 100% rename from stable/snipe-it/0.0.16/README.md rename to stable/snipe-it/0.0.17/README.md diff --git a/stable/snipe-it/0.0.16/app-readme.md b/stable/snipe-it/0.0.17/app-readme.md similarity index 100% rename from stable/snipe-it/0.0.16/app-readme.md rename to stable/snipe-it/0.0.17/app-readme.md diff --git a/stable/statping/4.0.15/charts/common-8.9.24.tgz b/stable/snipe-it/0.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/statping/4.0.15/charts/common-8.9.24.tgz rename to stable/snipe-it/0.0.17/charts/common-8.9.24.tgz diff --git a/stable/snipe-it/0.0.16/charts/mariadb-1.0.37.tgz b/stable/snipe-it/0.0.17/charts/mariadb-1.0.37.tgz similarity index 100% rename from stable/snipe-it/0.0.16/charts/mariadb-1.0.37.tgz rename to stable/snipe-it/0.0.17/charts/mariadb-1.0.37.tgz diff --git a/stable/snipe-it/0.0.16/helm-values.md b/stable/snipe-it/0.0.17/helm-values.md similarity index 100% rename from stable/snipe-it/0.0.16/helm-values.md rename to stable/snipe-it/0.0.17/helm-values.md diff --git a/stable/snipe-it/0.0.16/ix_values.yaml b/stable/snipe-it/0.0.17/ix_values.yaml similarity index 100% rename from stable/snipe-it/0.0.16/ix_values.yaml rename to stable/snipe-it/0.0.17/ix_values.yaml diff --git a/stable/snipe-it/0.0.16/questions.yaml b/stable/snipe-it/0.0.17/questions.yaml similarity index 100% rename from stable/snipe-it/0.0.16/questions.yaml rename to stable/snipe-it/0.0.17/questions.yaml diff --git a/stable/snipe-it/0.0.16/security.md b/stable/snipe-it/0.0.17/security.md similarity index 99% rename from stable/snipe-it/0.0.16/security.md rename to stable/snipe-it/0.0.17/security.md index ca9f5d74a7f..603a255a167 100644 --- a/stable/snipe-it/0.0.16/security.md +++ b/stable/snipe-it/0.0.17/security.md @@ -102,7 +102,7 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | laravel/framework | CVE-2021-43808 | MEDIUM | v6.20.29 | 6.20.42, 7.30.6, 8.75.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43808
https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| -| lcobucci/jwt | CVE-2021-41106 | LOW | 3.4.5 | 3.4.6, 4.0.4, 4.1.5 |
Expand...https://github.com/advisories/GHSA-7322-jrq4-x5hf
https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73
https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c
https://github.com/lcobucci/jwt/security/advisories/GHSA-7322-jrq4-x5hf
https://nvd.nist.gov/vuln/detail/CVE-2021-41106
| +| lcobucci/jwt | CVE-2021-41106 | LOW | 3.4.5 | 4.1.5, 3.4.6, 4.0.4 |
Expand...https://github.com/advisories/GHSA-7322-jrq4-x5hf
https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73
https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c
https://github.com/lcobucci/jwt/security/advisories/GHSA-7322-jrq4-x5hf
https://nvd.nist.gov/vuln/detail/CVE-2021-41106
| #### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) diff --git a/stable/snipe-it/0.0.16/templates/common.yaml b/stable/snipe-it/0.0.17/templates/common.yaml similarity index 100% rename from stable/snipe-it/0.0.16/templates/common.yaml rename to stable/snipe-it/0.0.17/templates/common.yaml diff --git a/stable/statping/4.0.15/values.yaml b/stable/snipe-it/0.0.17/values.yaml similarity index 100% rename from stable/statping/4.0.15/values.yaml rename to stable/snipe-it/0.0.17/values.yaml diff --git a/stable/sonarr/9.0.25/Chart.lock b/stable/sonarr/9.0.25/Chart.lock deleted file mode 100644 index c91852af19b..00000000000 --- a/stable/sonarr/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:25.191218288Z" diff --git a/stable/sonarr/9.0.25/CHANGELOG.md b/stable/sonarr/9.0.26/CHANGELOG.md similarity index 90% rename from stable/sonarr/9.0.25/CHANGELOG.md rename to stable/sonarr/9.0.26/CHANGELOG.md index 516ea6f85e7..9ea5581757c 100644 --- a/stable/sonarr/9.0.25/CHANGELOG.md +++ b/stable/sonarr/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [sonarr-9.0.26](https://github.com/truecharts/apps/compare/sonarr-9.0.25...sonarr-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [sonarr-9.0.25](https://github.com/truecharts/apps/compare/sonarr-9.0.24...sonarr-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [sonarr-9.0.17](https://github.com/truecharts/apps/compare/sonarr-9.0.16...sonarr-9.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [sonarr-9.0.16](https://github.com/truecharts/apps/compare/sonarr-9.0.15...sonarr-9.0.16) (2021-12-04) - diff --git a/stable/synclounge/0.0.5/CONFIG.md b/stable/sonarr/9.0.26/CONFIG.md similarity index 100% rename from stable/synclounge/0.0.5/CONFIG.md rename to stable/sonarr/9.0.26/CONFIG.md diff --git a/stable/sonarr/9.0.26/Chart.lock b/stable/sonarr/9.0.26/Chart.lock new file mode 100644 index 00000000000..005da19bc2a --- /dev/null +++ b/stable/sonarr/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:14.727503814Z" diff --git a/stable/sonarr/9.0.25/Chart.yaml b/stable/sonarr/9.0.26/Chart.yaml similarity index 97% rename from stable/sonarr/9.0.25/Chart.yaml rename to stable/sonarr/9.0.26/Chart.yaml index 996e53fa637..8999f89ed1a 100644 --- a/stable/sonarr/9.0.25/Chart.yaml +++ b/stable/sonarr/9.0.26/Chart.yaml @@ -21,7 +21,7 @@ name: sonarr sources: - https://github.com/Sonarr/Sonarr type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/sonarr/9.0.25/README.md b/stable/sonarr/9.0.26/README.md similarity index 100% rename from stable/sonarr/9.0.25/README.md rename to stable/sonarr/9.0.26/README.md diff --git a/stable/sonarr/9.0.25/app-readme.md b/stable/sonarr/9.0.26/app-readme.md similarity index 100% rename from stable/sonarr/9.0.25/app-readme.md rename to stable/sonarr/9.0.26/app-readme.md diff --git a/stable/synclounge/0.0.5/charts/common-8.9.24.tgz b/stable/sonarr/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/synclounge/0.0.5/charts/common-8.9.24.tgz rename to stable/sonarr/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/sonarr/9.0.25/helm-values.md b/stable/sonarr/9.0.26/helm-values.md similarity index 100% rename from stable/sonarr/9.0.25/helm-values.md rename to stable/sonarr/9.0.26/helm-values.md diff --git a/stable/sonarr/9.0.25/ix_values.yaml b/stable/sonarr/9.0.26/ix_values.yaml similarity index 100% rename from stable/sonarr/9.0.25/ix_values.yaml rename to stable/sonarr/9.0.26/ix_values.yaml diff --git a/stable/sonarr/9.0.25/questions.yaml b/stable/sonarr/9.0.26/questions.yaml similarity index 99% rename from stable/sonarr/9.0.25/questions.yaml rename to stable/sonarr/9.0.26/questions.yaml index 423b0d20da9..a7f12cd0ea3 100644 --- a/stable/sonarr/9.0.25/questions.yaml +++ b/stable/sonarr/9.0.26/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8989 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/sonarr/9.0.25/security.md b/stable/sonarr/9.0.26/security.md similarity index 100% rename from stable/sonarr/9.0.25/security.md rename to stable/sonarr/9.0.26/security.md diff --git a/stable/stash/5.0.5/templates/common.yaml b/stable/sonarr/9.0.26/templates/common.yaml similarity index 100% rename from stable/stash/5.0.5/templates/common.yaml rename to stable/sonarr/9.0.26/templates/common.yaml diff --git a/stable/synclounge/0.0.5/values.yaml b/stable/sonarr/9.0.26/values.yaml similarity index 100% rename from stable/synclounge/0.0.5/values.yaml rename to stable/sonarr/9.0.26/values.yaml diff --git a/stable/speedtest-exporter/1.0.11/Chart.lock b/stable/speedtest-exporter/1.0.11/Chart.lock deleted file mode 100644 index 10b2178af5a..00000000000 --- a/stable/speedtest-exporter/1.0.11/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:30.969072192Z" diff --git a/stable/speedtest-exporter/1.0.11/CHANGELOG.md b/stable/speedtest-exporter/1.0.12/CHANGELOG.md similarity index 93% rename from stable/speedtest-exporter/1.0.11/CHANGELOG.md rename to stable/speedtest-exporter/1.0.12/CHANGELOG.md index a65f240d2a1..975119d2661 100644 --- a/stable/speedtest-exporter/1.0.11/CHANGELOG.md +++ b/stable/speedtest-exporter/1.0.12/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [speedtest-exporter-1.0.12](https://github.com/truecharts/apps/compare/speedtest-exporter-1.0.11...speedtest-exporter-1.0.12) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [speedtest-exporter-1.0.11](https://github.com/truecharts/apps/compare/speedtest-exporter-1.0.10...speedtest-exporter-1.0.11) (2021-12-19) @@ -88,12 +97,3 @@ #### Chore -* bump apps to generate security page - - - - -### [speedtest-exporter-1.0.2](https://github.com/truecharts/apps/compare/speedtest-exporter-1.0.1...speedtest-exporter-1.0.2) (2021-12-04) - -#### Chore - diff --git a/stable/syncthing/9.0.26/CONFIG.md b/stable/speedtest-exporter/1.0.12/CONFIG.md similarity index 100% rename from stable/syncthing/9.0.26/CONFIG.md rename to stable/speedtest-exporter/1.0.12/CONFIG.md diff --git a/stable/speedtest-exporter/1.0.12/Chart.lock b/stable/speedtest-exporter/1.0.12/Chart.lock new file mode 100644 index 00000000000..487b2a9262a --- /dev/null +++ b/stable/speedtest-exporter/1.0.12/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:17.102526538Z" diff --git a/stable/speedtest-exporter/1.0.11/Chart.yaml b/stable/speedtest-exporter/1.0.12/Chart.yaml similarity index 98% rename from stable/speedtest-exporter/1.0.11/Chart.yaml rename to stable/speedtest-exporter/1.0.12/Chart.yaml index c368205680c..84d72d49d0a 100644 --- a/stable/speedtest-exporter/1.0.11/Chart.yaml +++ b/stable/speedtest-exporter/1.0.12/Chart.yaml @@ -21,7 +21,7 @@ name: speedtest-exporter sources: - https://github.com/MiguelNdeCarvalho/speedtest-exporter/ type: application -version: 1.0.11 +version: 1.0.12 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/speedtest-exporter/1.0.11/README.md b/stable/speedtest-exporter/1.0.12/README.md similarity index 100% rename from stable/speedtest-exporter/1.0.11/README.md rename to stable/speedtest-exporter/1.0.12/README.md diff --git a/stable/speedtest-exporter/1.0.11/app-readme.md b/stable/speedtest-exporter/1.0.12/app-readme.md similarity index 100% rename from stable/speedtest-exporter/1.0.11/app-readme.md rename to stable/speedtest-exporter/1.0.12/app-readme.md diff --git a/stable/syncthing/9.0.26/charts/common-8.9.24.tgz b/stable/speedtest-exporter/1.0.12/charts/common-8.9.24.tgz similarity index 100% rename from stable/syncthing/9.0.26/charts/common-8.9.24.tgz rename to stable/speedtest-exporter/1.0.12/charts/common-8.9.24.tgz diff --git a/stable/speedtest-exporter/1.0.11/helm-values.md b/stable/speedtest-exporter/1.0.12/helm-values.md similarity index 100% rename from stable/speedtest-exporter/1.0.11/helm-values.md rename to stable/speedtest-exporter/1.0.12/helm-values.md diff --git a/stable/speedtest-exporter/1.0.11/ix_values.yaml b/stable/speedtest-exporter/1.0.12/ix_values.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/ix_values.yaml rename to stable/speedtest-exporter/1.0.12/ix_values.yaml diff --git a/stable/speedtest-exporter/1.0.11/questions.yaml b/stable/speedtest-exporter/1.0.12/questions.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/questions.yaml rename to stable/speedtest-exporter/1.0.12/questions.yaml diff --git a/stable/speedtest-exporter/1.0.11/security.md b/stable/speedtest-exporter/1.0.12/security.md similarity index 100% rename from stable/speedtest-exporter/1.0.11/security.md rename to stable/speedtest-exporter/1.0.12/security.md diff --git a/stable/synclounge/0.0.5/templates/common.yaml b/stable/speedtest-exporter/1.0.12/templates/common.yaml similarity index 100% rename from stable/synclounge/0.0.5/templates/common.yaml rename to stable/speedtest-exporter/1.0.12/templates/common.yaml diff --git a/stable/speedtest-exporter/1.0.11/templates/prometheusrules.yaml b/stable/speedtest-exporter/1.0.12/templates/prometheusrules.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/templates/prometheusrules.yaml rename to stable/speedtest-exporter/1.0.12/templates/prometheusrules.yaml diff --git a/stable/speedtest-exporter/1.0.11/templates/servicemonitor.yaml b/stable/speedtest-exporter/1.0.12/templates/servicemonitor.yaml similarity index 100% rename from stable/speedtest-exporter/1.0.11/templates/servicemonitor.yaml rename to stable/speedtest-exporter/1.0.12/templates/servicemonitor.yaml diff --git a/stable/syncthing/9.0.26/values.yaml b/stable/speedtest-exporter/1.0.12/values.yaml similarity index 100% rename from stable/syncthing/9.0.26/values.yaml rename to stable/speedtest-exporter/1.0.12/values.yaml diff --git a/stable/sqlitebrowser/1.0.28/Chart.lock b/stable/sqlitebrowser/1.0.28/Chart.lock deleted file mode 100644 index 042f8df3b77..00000000000 --- a/stable/sqlitebrowser/1.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:38.924756184Z" diff --git a/stable/sqlitebrowser/1.0.28/CHANGELOG.md b/stable/sqlitebrowser/1.0.29/CHANGELOG.md similarity index 90% rename from stable/sqlitebrowser/1.0.28/CHANGELOG.md rename to stable/sqlitebrowser/1.0.29/CHANGELOG.md index c0816917aaf..998b8ab10ce 100644 --- a/stable/sqlitebrowser/1.0.28/CHANGELOG.md +++ b/stable/sqlitebrowser/1.0.29/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [sqlitebrowser-1.0.29](https://github.com/truecharts/apps/compare/sqlitebrowser-1.0.28...sqlitebrowser-1.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [sqlitebrowser-1.0.28](https://github.com/truecharts/apps/compare/sqlitebrowser-1.0.27...sqlitebrowser-1.0.28) (2021-12-19) @@ -87,13 +97,3 @@ ### [sqlitebrowser-1.0.20](https://github.com/truecharts/apps/compare/sqlitebrowser-1.0.19...sqlitebrowser-1.0.20) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [sqlitebrowser-1.0.19](https://github.com/truecharts/apps/compare/sqlitebrowser-1.0.18...sqlitebrowser-1.0.19) (2021-12-04) - diff --git a/stable/syslog-ng/0.0.6/CONFIG.md b/stable/sqlitebrowser/1.0.29/CONFIG.md similarity index 100% rename from stable/syslog-ng/0.0.6/CONFIG.md rename to stable/sqlitebrowser/1.0.29/CONFIG.md diff --git a/stable/sqlitebrowser/1.0.29/Chart.lock b/stable/sqlitebrowser/1.0.29/Chart.lock new file mode 100644 index 00000000000..1a7b194e57e --- /dev/null +++ b/stable/sqlitebrowser/1.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:27.252341758Z" diff --git a/stable/sqlitebrowser/1.0.28/Chart.yaml b/stable/sqlitebrowser/1.0.29/Chart.yaml similarity index 98% rename from stable/sqlitebrowser/1.0.28/Chart.yaml rename to stable/sqlitebrowser/1.0.29/Chart.yaml index d739f417278..7029fd1de3b 100644 --- a/stable/sqlitebrowser/1.0.28/Chart.yaml +++ b/stable/sqlitebrowser/1.0.29/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-sqlitebrowser - https://sqlitebrowser.org/ type: application -version: 1.0.28 +version: 1.0.29 annotations: truecharts.org/catagories: | - media diff --git a/stable/sqlitebrowser/1.0.28/README.md b/stable/sqlitebrowser/1.0.29/README.md similarity index 100% rename from stable/sqlitebrowser/1.0.28/README.md rename to stable/sqlitebrowser/1.0.29/README.md diff --git a/stable/sqlitebrowser/1.0.28/app-readme.md b/stable/sqlitebrowser/1.0.29/app-readme.md similarity index 100% rename from stable/sqlitebrowser/1.0.28/app-readme.md rename to stable/sqlitebrowser/1.0.29/app-readme.md diff --git a/stable/syslog-ng/0.0.6/charts/common-8.9.24.tgz b/stable/sqlitebrowser/1.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/syslog-ng/0.0.6/charts/common-8.9.24.tgz rename to stable/sqlitebrowser/1.0.29/charts/common-8.9.24.tgz diff --git a/stable/sqlitebrowser/1.0.28/helm-values.md b/stable/sqlitebrowser/1.0.29/helm-values.md similarity index 100% rename from stable/sqlitebrowser/1.0.28/helm-values.md rename to stable/sqlitebrowser/1.0.29/helm-values.md diff --git a/stable/sqlitebrowser/1.0.28/ix_values.yaml b/stable/sqlitebrowser/1.0.29/ix_values.yaml similarity index 100% rename from stable/sqlitebrowser/1.0.28/ix_values.yaml rename to stable/sqlitebrowser/1.0.29/ix_values.yaml diff --git a/stable/sqlitebrowser/1.0.28/questions.yaml b/stable/sqlitebrowser/1.0.29/questions.yaml similarity index 99% rename from stable/sqlitebrowser/1.0.28/questions.yaml rename to stable/sqlitebrowser/1.0.29/questions.yaml index 808a27603be..04f123145ae 100644 --- a/stable/sqlitebrowser/1.0.28/questions.yaml +++ b/stable/sqlitebrowser/1.0.29/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 3000 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/sqlitebrowser/1.0.28/security.md b/stable/sqlitebrowser/1.0.29/security.md similarity index 100% rename from stable/sqlitebrowser/1.0.28/security.md rename to stable/sqlitebrowser/1.0.29/security.md diff --git a/stable/sqlitebrowser/1.0.28/templates/common.yaml b/stable/sqlitebrowser/1.0.29/templates/common.yaml similarity index 100% rename from stable/sqlitebrowser/1.0.28/templates/common.yaml rename to stable/sqlitebrowser/1.0.29/templates/common.yaml diff --git a/stable/syslog-ng/0.0.6/values.yaml b/stable/sqlitebrowser/1.0.29/values.yaml similarity index 100% rename from stable/syslog-ng/0.0.6/values.yaml rename to stable/sqlitebrowser/1.0.29/values.yaml diff --git a/stable/stash/5.0.5/Chart.lock b/stable/stash/5.0.5/Chart.lock deleted file mode 100644 index baf7c548d3e..00000000000 --- a/stable/stash/5.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:46.239431212Z" diff --git a/stable/stash/5.0.5/CHANGELOG.md b/stable/stash/5.0.6/CHANGELOG.md similarity index 90% rename from stable/stash/5.0.5/CHANGELOG.md rename to stable/stash/5.0.6/CHANGELOG.md index fd7d1c2012a..2c432085a77 100644 --- a/stable/stash/5.0.5/CHANGELOG.md +++ b/stable/stash/5.0.6/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [stash-5.0.6](https://github.com/truecharts/apps/compare/stash-5.0.5...stash-5.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [stash-5.0.5](https://github.com/truecharts/apps/compare/stash-5.0.4...stash-5.0.5) (2021-12-19) @@ -87,13 +97,3 @@ * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [stash-4.0.17](https://github.com/truecharts/apps/compare/stash-4.0.16...stash-4.0.17) (2021-12-05) - -#### Chore diff --git a/stable/tautulli/9.0.24/CONFIG.md b/stable/stash/5.0.6/CONFIG.md similarity index 100% rename from stable/tautulli/9.0.24/CONFIG.md rename to stable/stash/5.0.6/CONFIG.md diff --git a/stable/stash/5.0.6/Chart.lock b/stable/stash/5.0.6/Chart.lock new file mode 100644 index 00000000000..74449b16588 --- /dev/null +++ b/stable/stash/5.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:47.580742382Z" diff --git a/stable/stash/5.0.5/Chart.yaml b/stable/stash/5.0.6/Chart.yaml similarity index 97% rename from stable/stash/5.0.5/Chart.yaml rename to stable/stash/5.0.6/Chart.yaml index c71d7b91e4e..8a042a1d8f1 100644 --- a/stable/stash/5.0.5/Chart.yaml +++ b/stable/stash/5.0.6/Chart.yaml @@ -18,7 +18,7 @@ name: stash sources: - https://github.com/stashapp/stash - https://hub.docker.com/r/stashapp/stash -version: 5.0.5 +version: 5.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/stash/5.0.5/README.md b/stable/stash/5.0.6/README.md similarity index 100% rename from stable/stash/5.0.5/README.md rename to stable/stash/5.0.6/README.md diff --git a/stable/stash/5.0.5/app-readme.md b/stable/stash/5.0.6/app-readme.md similarity index 100% rename from stable/stash/5.0.5/app-readme.md rename to stable/stash/5.0.6/app-readme.md diff --git a/stable/tautulli/9.0.24/charts/common-8.9.24.tgz b/stable/stash/5.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/tautulli/9.0.24/charts/common-8.9.24.tgz rename to stable/stash/5.0.6/charts/common-8.9.24.tgz diff --git a/stable/stash/5.0.5/ci/ct-values.yaml b/stable/stash/5.0.6/ci/ct-values.yaml similarity index 100% rename from stable/stash/5.0.5/ci/ct-values.yaml rename to stable/stash/5.0.6/ci/ct-values.yaml diff --git a/stable/stash/5.0.5/helm-values.md b/stable/stash/5.0.6/helm-values.md similarity index 100% rename from stable/stash/5.0.5/helm-values.md rename to stable/stash/5.0.6/helm-values.md diff --git a/stable/stash/5.0.5/ix_values.yaml b/stable/stash/5.0.6/ix_values.yaml similarity index 100% rename from stable/stash/5.0.5/ix_values.yaml rename to stable/stash/5.0.6/ix_values.yaml diff --git a/stable/stash/5.0.5/questions.yaml b/stable/stash/5.0.6/questions.yaml similarity index 99% rename from stable/stash/5.0.5/questions.yaml rename to stable/stash/5.0.6/questions.yaml index 6d94f4ca590..803204f1f41 100644 --- a/stable/stash/5.0.5/questions.yaml +++ b/stable/stash/5.0.6/questions.yaml @@ -349,7 +349,6 @@ questions: schema: type: int default: 9999 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/stash/5.0.5/security.md b/stable/stash/5.0.6/security.md similarity index 100% rename from stable/stash/5.0.5/security.md rename to stable/stash/5.0.6/security.md diff --git a/stable/syncthing/9.0.26/templates/common.yaml b/stable/stash/5.0.6/templates/common.yaml similarity index 100% rename from stable/syncthing/9.0.26/templates/common.yaml rename to stable/stash/5.0.6/templates/common.yaml diff --git a/stable/tautulli/9.0.24/values.yaml b/stable/stash/5.0.6/values.yaml similarity index 100% rename from stable/tautulli/9.0.24/values.yaml rename to stable/stash/5.0.6/values.yaml diff --git a/stable/static/1.0.24/Chart.lock b/stable/static/1.0.24/Chart.lock deleted file mode 100644 index c411d40f643..00000000000 --- a/stable/static/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:48:56.143319632Z" diff --git a/stable/static/1.0.24/CHANGELOG.md b/stable/static/1.0.25/CHANGELOG.md similarity index 90% rename from stable/static/1.0.24/CHANGELOG.md rename to stable/static/1.0.25/CHANGELOG.md index f1ed293c36d..0be3e15364c 100644 --- a/stable/static/1.0.24/CHANGELOG.md +++ b/stable/static/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [static-1.0.25](https://github.com/truecharts/apps/compare/static-1.0.24...static-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [static-1.0.24](https://github.com/truecharts/apps/compare/static-1.0.23...static-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [static-1.0.16](https://github.com/truecharts/apps/compare/static-1.0.15...static-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [static-1.0.15](https://github.com/truecharts/apps/compare/static-1.0.14...static-1.0.15) (2021-12-04) - diff --git a/stable/teamspeak3/2.0.24/CONFIG.md b/stable/static/1.0.25/CONFIG.md similarity index 100% rename from stable/teamspeak3/2.0.24/CONFIG.md rename to stable/static/1.0.25/CONFIG.md diff --git a/stable/static/1.0.25/Chart.lock b/stable/static/1.0.25/Chart.lock new file mode 100644 index 00000000000..41ec7f7f56b --- /dev/null +++ b/stable/static/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:49.174453811Z" diff --git a/stable/static/1.0.24/Chart.yaml b/stable/static/1.0.25/Chart.yaml similarity index 98% rename from stable/static/1.0.24/Chart.yaml rename to stable/static/1.0.25/Chart.yaml index d3cc6248c5e..5c7af4e4031 100644 --- a/stable/static/1.0.24/Chart.yaml +++ b/stable/static/1.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/prologic/static - https://github.com/nicholaswilde/docker-static type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/static/1.0.24/README.md b/stable/static/1.0.25/README.md similarity index 100% rename from stable/static/1.0.24/README.md rename to stable/static/1.0.25/README.md diff --git a/stable/static/1.0.24/app-readme.md b/stable/static/1.0.25/app-readme.md similarity index 100% rename from stable/static/1.0.24/app-readme.md rename to stable/static/1.0.25/app-readme.md diff --git a/stable/teamspeak3/2.0.24/charts/common-8.9.24.tgz b/stable/static/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/teamspeak3/2.0.24/charts/common-8.9.24.tgz rename to stable/static/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/static/1.0.24/helm-values.md b/stable/static/1.0.25/helm-values.md similarity index 100% rename from stable/static/1.0.24/helm-values.md rename to stable/static/1.0.25/helm-values.md diff --git a/stable/static/1.0.24/ix_values.yaml b/stable/static/1.0.25/ix_values.yaml similarity index 100% rename from stable/static/1.0.24/ix_values.yaml rename to stable/static/1.0.25/ix_values.yaml diff --git a/stable/static/1.0.24/questions.yaml b/stable/static/1.0.25/questions.yaml similarity index 99% rename from stable/static/1.0.24/questions.yaml rename to stable/static/1.0.25/questions.yaml index c9c537eb001..45675420371 100644 --- a/stable/static/1.0.24/questions.yaml +++ b/stable/static/1.0.25/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 10077 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/static/1.0.24/security.md b/stable/static/1.0.25/security.md similarity index 100% rename from stable/static/1.0.24/security.md rename to stable/static/1.0.25/security.md diff --git a/stable/static/1.0.24/templates/common.yaml b/stable/static/1.0.25/templates/common.yaml similarity index 100% rename from stable/static/1.0.24/templates/common.yaml rename to stable/static/1.0.25/templates/common.yaml diff --git a/stable/teamspeak3/2.0.24/values.yaml b/stable/static/1.0.25/values.yaml similarity index 100% rename from stable/teamspeak3/2.0.24/values.yaml rename to stable/static/1.0.25/values.yaml diff --git a/stable/statping/4.0.15/Chart.lock b/stable/statping/4.0.15/Chart.lock deleted file mode 100644 index 2f71529f0d9..00000000000 --- a/stable/statping/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:49:05.627012774Z" diff --git a/stable/statping/4.0.15/CHANGELOG.md b/stable/statping/4.0.16/CHANGELOG.md similarity index 88% rename from stable/statping/4.0.15/CHANGELOG.md rename to stable/statping/4.0.16/CHANGELOG.md index db4b45f3127..a0dba4d4d16 100644 --- a/stable/statping/4.0.15/CHANGELOG.md +++ b/stable/statping/4.0.16/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [statping-4.0.16](https://github.com/truecharts/apps/compare/statping-4.0.15...statping-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [statping-4.0.15](https://github.com/truecharts/apps/compare/statping-4.0.14...statping-4.0.15) (2021-12-19) @@ -86,14 +97,3 @@ -### [statping-4.0.7](https://github.com/truecharts/apps/compare/statping-4.0.6...statping-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [statping-4.0.6](https://github.com/truecharts/apps/compare/statping-4.0.5...statping-4.0.6) (2021-12-04) - diff --git a/stable/teedy/4.0.15/CONFIG.md b/stable/statping/4.0.16/CONFIG.md similarity index 100% rename from stable/teedy/4.0.15/CONFIG.md rename to stable/statping/4.0.16/CONFIG.md diff --git a/stable/statping/4.0.16/Chart.lock b/stable/statping/4.0.16/Chart.lock new file mode 100644 index 00000000000..d17a0e40323 --- /dev/null +++ b/stable/statping/4.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:35:53.679813956Z" diff --git a/stable/statping/4.0.15/Chart.yaml b/stable/statping/4.0.16/Chart.yaml similarity index 98% rename from stable/statping/4.0.15/Chart.yaml rename to stable/statping/4.0.16/Chart.yaml index 4431dc82f56..624d8266604 100644 --- a/stable/statping/4.0.15/Chart.yaml +++ b/stable/statping/4.0.16/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "0.90.74" description: Status page for monitoring your websites and applications name: statping -version: 4.0.15 +version: 4.0.16 kubeVersion: ">=1.16.0-0" keywords: - statping diff --git a/stable/statping/4.0.15/README.md b/stable/statping/4.0.16/README.md similarity index 100% rename from stable/statping/4.0.15/README.md rename to stable/statping/4.0.16/README.md diff --git a/stable/statping/4.0.15/app-readme.md b/stable/statping/4.0.16/app-readme.md similarity index 100% rename from stable/statping/4.0.15/app-readme.md rename to stable/statping/4.0.16/app-readme.md diff --git a/stable/teedy/4.0.15/charts/common-8.9.24.tgz b/stable/statping/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/teedy/4.0.15/charts/common-8.9.24.tgz rename to stable/statping/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/tt-rss/4.0.23/charts/postgresql-6.0.34.tgz b/stable/statping/4.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/tt-rss/4.0.23/charts/postgresql-6.0.34.tgz rename to stable/statping/4.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/statping/4.0.15/helm-values.md b/stable/statping/4.0.16/helm-values.md similarity index 89% rename from stable/statping/4.0.15/helm-values.md rename to stable/statping/4.0.16/helm-values.md index dd0a11217bc..aae60c71770 100644 --- a/stable/statping/4.0.15/helm-values.md +++ b/stable/statping/4.0.16/helm-values.md @@ -11,17 +11,17 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| +| env.DB_CONN | string | `"postgres"` | | +| env.DB_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.DB_PORT | string | `"5432"` | | +| env.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | env.DESCRIPTION | string | `"This is a Statping instance deployed as Helm chart"` | Description of the Statping instance | | env.DISABLE_LOGS | bool | `false` | Disable logs from appearing and writing to disk | | env.NAME | string | `"Statping Example"` | Name of the Statping instance | +| env.POSTGRES_SSLMODE | string | `"disable"` | | | env.TZ | string | `"UTC"` | Set the container timezone | | env.USE_CDN | bool | `false` | Use CDN for static context from third-parties | | env.VIRTUAL_HOST | string | `""` | External URL you use to connect to the statping (the one you enter in your browser) | -| envTpl.DB_CONN | string | `"postgres"` | | -| envTpl.DB_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DB_PORT | string | `"5432"` | | -| envTpl.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | -| envTpl.POSTGRES_SSLMODE | string | `"disable"` | | | envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DB_PASS.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/statping/4.0.15/ix_values.yaml b/stable/statping/4.0.16/ix_values.yaml similarity index 99% rename from stable/statping/4.0.15/ix_values.yaml rename to stable/statping/4.0.16/ix_values.yaml index d853cf9c076..56285541fbc 100644 --- a/stable/statping/4.0.15/ix_values.yaml +++ b/stable/statping/4.0.16/ix_values.yaml @@ -28,7 +28,6 @@ env: USE_CDN: false # -- Disable logs from appearing and writing to disk DISABLE_LOGS: false -envTpl: DB_CONN: "postgres" DB_DATABASE: "{{ .Values.postgresql.postgresqlDatabase }}" DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/statping/4.0.15/questions.yaml b/stable/statping/4.0.16/questions.yaml similarity index 99% rename from stable/statping/4.0.15/questions.yaml rename to stable/statping/4.0.16/questions.yaml index ba3fc7ddc2d..0cd2955780b 100644 --- a/stable/statping/4.0.15/questions.yaml +++ b/stable/statping/4.0.16/questions.yaml @@ -397,7 +397,6 @@ questions: schema: type: int default: 10099 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/statping/4.0.15/security.md b/stable/statping/4.0.16/security.md similarity index 100% rename from stable/statping/4.0.15/security.md rename to stable/statping/4.0.16/security.md diff --git a/stable/statping/4.0.15/templates/common.yaml b/stable/statping/4.0.16/templates/common.yaml similarity index 100% rename from stable/statping/4.0.15/templates/common.yaml rename to stable/statping/4.0.16/templates/common.yaml diff --git a/stable/teedy/4.0.15/values.yaml b/stable/statping/4.0.16/values.yaml similarity index 100% rename from stable/teedy/4.0.15/values.yaml rename to stable/statping/4.0.16/values.yaml diff --git a/stable/synclounge/0.0.5/Chart.lock b/stable/synclounge/0.0.5/Chart.lock deleted file mode 100644 index de706f77048..00000000000 --- a/stable/synclounge/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:11.547793724Z" diff --git a/stable/synclounge/0.0.5/CHANGELOG.md b/stable/synclounge/0.0.6/CHANGELOG.md similarity index 85% rename from stable/synclounge/0.0.5/CHANGELOG.md rename to stable/synclounge/0.0.6/CHANGELOG.md index efe17258b7a..e7b2fe6d558 100644 --- a/stable/synclounge/0.0.5/CHANGELOG.md +++ b/stable/synclounge/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [synclounge-0.0.6](https://github.com/truecharts/apps/compare/synclounge-0.0.5...synclounge-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [synclounge-0.0.5](https://github.com/truecharts/apps/compare/synclounge-0.0.4...synclounge-0.0.5) (2021-12-19) diff --git a/stable/thelounge/4.0.26/CONFIG.md b/stable/synclounge/0.0.6/CONFIG.md similarity index 100% rename from stable/thelounge/4.0.26/CONFIG.md rename to stable/synclounge/0.0.6/CONFIG.md diff --git a/stable/synclounge/0.0.6/Chart.lock b/stable/synclounge/0.0.6/Chart.lock new file mode 100644 index 00000000000..8e7ca67a64e --- /dev/null +++ b/stable/synclounge/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:35:56.128791717Z" diff --git a/stable/synclounge/0.0.5/Chart.yaml b/stable/synclounge/0.0.6/Chart.yaml similarity index 98% rename from stable/synclounge/0.0.5/Chart.yaml rename to stable/synclounge/0.0.6/Chart.yaml index e38422e5756..649d4ff219f 100644 --- a/stable/synclounge/0.0.5/Chart.yaml +++ b/stable/synclounge/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: synclounge -version: 0.0.5 +version: 0.0.6 appVersion: "5.1.111" description: Synclounge is a third party tool that allows you to watch Plex in sync with your friends/family, wherever you are. type: application diff --git a/stable/synclounge/0.0.5/README.md b/stable/synclounge/0.0.6/README.md similarity index 100% rename from stable/synclounge/0.0.5/README.md rename to stable/synclounge/0.0.6/README.md diff --git a/stable/synclounge/0.0.5/app-readme.md b/stable/synclounge/0.0.6/app-readme.md similarity index 100% rename from stable/synclounge/0.0.5/app-readme.md rename to stable/synclounge/0.0.6/app-readme.md diff --git a/stable/thelounge/4.0.26/charts/common-8.9.24.tgz b/stable/synclounge/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/thelounge/4.0.26/charts/common-8.9.24.tgz rename to stable/synclounge/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/synclounge/0.0.5/helm-values.md b/stable/synclounge/0.0.6/helm-values.md similarity index 100% rename from stable/synclounge/0.0.5/helm-values.md rename to stable/synclounge/0.0.6/helm-values.md diff --git a/stable/synclounge/0.0.5/ix_values.yaml b/stable/synclounge/0.0.6/ix_values.yaml similarity index 100% rename from stable/synclounge/0.0.5/ix_values.yaml rename to stable/synclounge/0.0.6/ix_values.yaml diff --git a/stable/synclounge/0.0.5/questions.yaml b/stable/synclounge/0.0.6/questions.yaml similarity index 100% rename from stable/synclounge/0.0.5/questions.yaml rename to stable/synclounge/0.0.6/questions.yaml diff --git a/stable/synclounge/0.0.5/security.md b/stable/synclounge/0.0.6/security.md similarity index 100% rename from stable/synclounge/0.0.5/security.md rename to stable/synclounge/0.0.6/security.md diff --git a/stable/syslog-ng/0.0.6/templates/common.yaml b/stable/synclounge/0.0.6/templates/common.yaml similarity index 100% rename from stable/syslog-ng/0.0.6/templates/common.yaml rename to stable/synclounge/0.0.6/templates/common.yaml diff --git a/stable/thelounge/4.0.26/values.yaml b/stable/synclounge/0.0.6/values.yaml similarity index 100% rename from stable/thelounge/4.0.26/values.yaml rename to stable/synclounge/0.0.6/values.yaml diff --git a/stable/syncthing/9.0.26/Chart.lock b/stable/syncthing/9.0.26/Chart.lock deleted file mode 100644 index 50a018d64fe..00000000000 --- a/stable/syncthing/9.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:18.201872613Z" diff --git a/stable/syncthing/9.0.26/CHANGELOG.md b/stable/syncthing/9.0.27/CHANGELOG.md similarity index 86% rename from stable/syncthing/9.0.26/CHANGELOG.md rename to stable/syncthing/9.0.27/CHANGELOG.md index e261bf46c95..a22a057e1a1 100644 --- a/stable/syncthing/9.0.26/CHANGELOG.md +++ b/stable/syncthing/9.0.27/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [syncthing-9.0.27](https://github.com/truecharts/apps/compare/syncthing-9.0.26...syncthing-9.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [syncthing-9.0.26](https://github.com/truecharts/apps/compare/syncthing-9.0.25...syncthing-9.0.26) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - -### [syncthing-9.0.17](https://github.com/truecharts/apps/compare/syncthing-9.0.16...syncthing-9.0.17) (2021-12-05) - -#### Chore diff --git a/stable/traccar/4.0.15/CONFIG.md b/stable/syncthing/9.0.27/CONFIG.md similarity index 100% rename from stable/traccar/4.0.15/CONFIG.md rename to stable/syncthing/9.0.27/CONFIG.md diff --git a/stable/syncthing/9.0.27/Chart.lock b/stable/syncthing/9.0.27/Chart.lock new file mode 100644 index 00000000000..d05e80ed5f3 --- /dev/null +++ b/stable/syncthing/9.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:09.880093537Z" diff --git a/stable/syncthing/9.0.26/Chart.yaml b/stable/syncthing/9.0.27/Chart.yaml similarity index 97% rename from stable/syncthing/9.0.26/Chart.yaml rename to stable/syncthing/9.0.27/Chart.yaml index c9512c1d147..9a0d18434a0 100644 --- a/stable/syncthing/9.0.26/Chart.yaml +++ b/stable/syncthing/9.0.27/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/syncthing/syncthing - https://hub.docker.com/r/syncthing/syncthing type: application -version: 9.0.26 +version: 9.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/syncthing/9.0.26/README.md b/stable/syncthing/9.0.27/README.md similarity index 100% rename from stable/syncthing/9.0.26/README.md rename to stable/syncthing/9.0.27/README.md diff --git a/stable/syncthing/9.0.26/app-readme.md b/stable/syncthing/9.0.27/app-readme.md similarity index 100% rename from stable/syncthing/9.0.26/app-readme.md rename to stable/syncthing/9.0.27/app-readme.md diff --git a/stable/traccar/4.0.15/charts/common-8.9.24.tgz b/stable/syncthing/9.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/traccar/4.0.15/charts/common-8.9.24.tgz rename to stable/syncthing/9.0.27/charts/common-8.9.24.tgz diff --git a/stable/syncthing/9.0.26/helm-values.md b/stable/syncthing/9.0.27/helm-values.md similarity index 100% rename from stable/syncthing/9.0.26/helm-values.md rename to stable/syncthing/9.0.27/helm-values.md diff --git a/stable/syncthing/9.0.26/ix_values.yaml b/stable/syncthing/9.0.27/ix_values.yaml similarity index 100% rename from stable/syncthing/9.0.26/ix_values.yaml rename to stable/syncthing/9.0.27/ix_values.yaml diff --git a/stable/syncthing/9.0.26/questions.yaml b/stable/syncthing/9.0.27/questions.yaml similarity index 98% rename from stable/syncthing/9.0.26/questions.yaml rename to stable/syncthing/9.0.27/questions.yaml index 3ce6b41e478..1863290f72e 100644 --- a/stable/syncthing/9.0.26/questions.yaml +++ b/stable/syncthing/9.0.27/questions.yaml @@ -343,7 +343,6 @@ questions: schema: type: int default: 8384 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -437,19 +436,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 22000 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -541,19 +533,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 22000 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -646,19 +631,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 21027 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/syncthing/9.0.26/security.md b/stable/syncthing/9.0.27/security.md similarity index 100% rename from stable/syncthing/9.0.26/security.md rename to stable/syncthing/9.0.27/security.md diff --git a/stable/tautulli/9.0.24/templates/common.yaml b/stable/syncthing/9.0.27/templates/common.yaml similarity index 100% rename from stable/tautulli/9.0.24/templates/common.yaml rename to stable/syncthing/9.0.27/templates/common.yaml diff --git a/stable/traccar/4.0.15/values.yaml b/stable/syncthing/9.0.27/values.yaml similarity index 100% rename from stable/traccar/4.0.15/values.yaml rename to stable/syncthing/9.0.27/values.yaml diff --git a/stable/syslog-ng/0.0.6/Chart.lock b/stable/syslog-ng/0.0.6/Chart.lock deleted file mode 100644 index 16e75c7f66a..00000000000 --- a/stable/syslog-ng/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:21.262343151Z" diff --git a/stable/syslog-ng/0.0.6/CHANGELOG.md b/stable/syslog-ng/0.0.7/CHANGELOG.md similarity index 88% rename from stable/syslog-ng/0.0.6/CHANGELOG.md rename to stable/syslog-ng/0.0.7/CHANGELOG.md index b7384532076..fcb9586069e 100644 --- a/stable/syslog-ng/0.0.6/CHANGELOG.md +++ b/stable/syslog-ng/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [syslog-ng-0.0.7](https://github.com/truecharts/apps/compare/syslog-ng-0.0.6...syslog-ng-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [syslog-ng-0.0.6](https://github.com/truecharts/apps/compare/syslog-ng-0.0.5...syslog-ng-0.0.6) (2021-12-19) diff --git a/stable/truecommand/9.0.25/CONFIG.md b/stable/syslog-ng/0.0.7/CONFIG.md similarity index 100% rename from stable/truecommand/9.0.25/CONFIG.md rename to stable/syslog-ng/0.0.7/CONFIG.md diff --git a/stable/syslog-ng/0.0.7/Chart.lock b/stable/syslog-ng/0.0.7/Chart.lock new file mode 100644 index 00000000000..3b1ffe34d49 --- /dev/null +++ b/stable/syslog-ng/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:15.810230952Z" diff --git a/stable/syslog-ng/0.0.6/Chart.yaml b/stable/syslog-ng/0.0.7/Chart.yaml similarity index 98% rename from stable/syslog-ng/0.0.6/Chart.yaml rename to stable/syslog-ng/0.0.7/Chart.yaml index 272769c1296..8610845b234 100644 --- a/stable/syslog-ng/0.0.6/Chart.yaml +++ b/stable/syslog-ng/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: syslog-ng -version: 0.0.6 +version: 0.0.7 appVersion: "3.30.1" description: syslog-ng allows you to flexibly collect, parse, classify, rewrite and correlate logs. type: application diff --git a/stable/syslog-ng/0.0.6/README.md b/stable/syslog-ng/0.0.7/README.md similarity index 100% rename from stable/syslog-ng/0.0.6/README.md rename to stable/syslog-ng/0.0.7/README.md diff --git a/stable/syslog-ng/0.0.6/app-readme.md b/stable/syslog-ng/0.0.7/app-readme.md similarity index 100% rename from stable/syslog-ng/0.0.6/app-readme.md rename to stable/syslog-ng/0.0.7/app-readme.md diff --git a/stable/truecommand/9.0.25/charts/common-8.9.24.tgz b/stable/syslog-ng/0.0.7/charts/common-8.9.24.tgz similarity index 100% rename from stable/truecommand/9.0.25/charts/common-8.9.24.tgz rename to stable/syslog-ng/0.0.7/charts/common-8.9.24.tgz diff --git a/stable/syslog-ng/0.0.6/helm-values.md b/stable/syslog-ng/0.0.7/helm-values.md similarity index 100% rename from stable/syslog-ng/0.0.6/helm-values.md rename to stable/syslog-ng/0.0.7/helm-values.md diff --git a/stable/syslog-ng/0.0.6/ix_values.yaml b/stable/syslog-ng/0.0.7/ix_values.yaml similarity index 100% rename from stable/syslog-ng/0.0.6/ix_values.yaml rename to stable/syslog-ng/0.0.7/ix_values.yaml diff --git a/stable/syslog-ng/0.0.6/questions.yaml b/stable/syslog-ng/0.0.7/questions.yaml similarity index 100% rename from stable/syslog-ng/0.0.6/questions.yaml rename to stable/syslog-ng/0.0.7/questions.yaml diff --git a/stable/syslog-ng/0.0.6/security.md b/stable/syslog-ng/0.0.7/security.md similarity index 100% rename from stable/syslog-ng/0.0.6/security.md rename to stable/syslog-ng/0.0.7/security.md diff --git a/stable/teamspeak3/2.0.24/templates/common.yaml b/stable/syslog-ng/0.0.7/templates/common.yaml similarity index 100% rename from stable/teamspeak3/2.0.24/templates/common.yaml rename to stable/syslog-ng/0.0.7/templates/common.yaml diff --git a/stable/truecommand/9.0.25/values.yaml b/stable/syslog-ng/0.0.7/values.yaml similarity index 100% rename from stable/truecommand/9.0.25/values.yaml rename to stable/syslog-ng/0.0.7/values.yaml diff --git a/stable/tautulli/9.0.24/Chart.lock b/stable/tautulli/9.0.24/Chart.lock deleted file mode 100644 index 870fac0f137..00000000000 --- a/stable/tautulli/9.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:31.651647158Z" diff --git a/stable/tautulli/9.0.24/CHANGELOG.md b/stable/tautulli/9.0.25/CHANGELOG.md similarity index 90% rename from stable/tautulli/9.0.24/CHANGELOG.md rename to stable/tautulli/9.0.25/CHANGELOG.md index c005075780c..4e98957bdb6 100644 --- a/stable/tautulli/9.0.24/CHANGELOG.md +++ b/stable/tautulli/9.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [tautulli-9.0.25](https://github.com/truecharts/apps/compare/tautulli-9.0.24...tautulli-9.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [tautulli-9.0.24](https://github.com/truecharts/apps/compare/tautulli-9.0.23...tautulli-9.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [tautulli-9.0.16](https://github.com/truecharts/apps/compare/tautulli-9.0.15...tautulli-9.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [tautulli-9.0.15](https://github.com/truecharts/apps/compare/tautulli-9.0.14...tautulli-9.0.15) (2021-12-04) - diff --git a/stable/tt-rss/4.0.23/CONFIG.md b/stable/tautulli/9.0.25/CONFIG.md similarity index 100% rename from stable/tt-rss/4.0.23/CONFIG.md rename to stable/tautulli/9.0.25/CONFIG.md diff --git a/stable/tautulli/9.0.25/Chart.lock b/stable/tautulli/9.0.25/Chart.lock new file mode 100644 index 00000000000..47416121ac0 --- /dev/null +++ b/stable/tautulli/9.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:27.863986826Z" diff --git a/stable/tautulli/9.0.24/Chart.yaml b/stable/tautulli/9.0.25/Chart.yaml similarity index 97% rename from stable/tautulli/9.0.24/Chart.yaml rename to stable/tautulli/9.0.25/Chart.yaml index 06a78f141fc..06c6ab8c1a2 100644 --- a/stable/tautulli/9.0.24/Chart.yaml +++ b/stable/tautulli/9.0.25/Chart.yaml @@ -20,7 +20,7 @@ name: tautulli sources: - https://github.com/Tautulli/Tautulli type: application -version: 9.0.24 +version: 9.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/tautulli/9.0.24/README.md b/stable/tautulli/9.0.25/README.md similarity index 100% rename from stable/tautulli/9.0.24/README.md rename to stable/tautulli/9.0.25/README.md diff --git a/stable/tautulli/9.0.24/app-readme.md b/stable/tautulli/9.0.25/app-readme.md similarity index 100% rename from stable/tautulli/9.0.24/app-readme.md rename to stable/tautulli/9.0.25/app-readme.md diff --git a/stable/tt-rss/4.0.23/charts/common-8.9.24.tgz b/stable/tautulli/9.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/tt-rss/4.0.23/charts/common-8.9.24.tgz rename to stable/tautulli/9.0.25/charts/common-8.9.24.tgz diff --git a/stable/tautulli/9.0.24/helm-values.md b/stable/tautulli/9.0.25/helm-values.md similarity index 100% rename from stable/tautulli/9.0.24/helm-values.md rename to stable/tautulli/9.0.25/helm-values.md diff --git a/stable/tautulli/9.0.24/ix_values.yaml b/stable/tautulli/9.0.25/ix_values.yaml similarity index 100% rename from stable/tautulli/9.0.24/ix_values.yaml rename to stable/tautulli/9.0.25/ix_values.yaml diff --git a/stable/tautulli/9.0.24/questions.yaml b/stable/tautulli/9.0.25/questions.yaml similarity index 99% rename from stable/tautulli/9.0.24/questions.yaml rename to stable/tautulli/9.0.25/questions.yaml index 53edfadb7ff..80ae2670bd1 100644 --- a/stable/tautulli/9.0.24/questions.yaml +++ b/stable/tautulli/9.0.25/questions.yaml @@ -344,7 +344,6 @@ questions: schema: type: int default: 8181 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/tautulli/9.0.24/security.md b/stable/tautulli/9.0.25/security.md similarity index 100% rename from stable/tautulli/9.0.24/security.md rename to stable/tautulli/9.0.25/security.md diff --git a/stable/teedy/4.0.15/templates/common.yaml b/stable/tautulli/9.0.25/templates/common.yaml similarity index 100% rename from stable/teedy/4.0.15/templates/common.yaml rename to stable/tautulli/9.0.25/templates/common.yaml diff --git a/stable/tt-rss/4.0.23/values.yaml b/stable/tautulli/9.0.25/values.yaml similarity index 100% rename from stable/tt-rss/4.0.23/values.yaml rename to stable/tautulli/9.0.25/values.yaml diff --git a/stable/teamspeak3/2.0.24/Chart.lock b/stable/teamspeak3/2.0.24/Chart.lock deleted file mode 100644 index 21de0022220..00000000000 --- a/stable/teamspeak3/2.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:37.543020987Z" diff --git a/stable/teamspeak3/2.0.24/CHANGELOG.md b/stable/teamspeak3/2.0.25/CHANGELOG.md similarity index 82% rename from stable/teamspeak3/2.0.24/CHANGELOG.md rename to stable/teamspeak3/2.0.25/CHANGELOG.md index ae75f89ca59..2381313d7dc 100644 --- a/stable/teamspeak3/2.0.24/CHANGELOG.md +++ b/stable/teamspeak3/2.0.25/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [teamspeak3-2.0.25](https://github.com/truecharts/apps/compare/teamspeak3-2.0.24...teamspeak3-2.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [teamspeak3-2.0.24](https://github.com/truecharts/apps/compare/teamspeak3-2.0.23...teamspeak3-2.0.24) (2021-12-19) @@ -85,15 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - -### [teamspeak3-2.0.16](https://github.com/truecharts/apps/compare/teamspeak3-2.0.15...teamspeak3-2.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [teamspeak3-2.0.15](https://github.com/truecharts/apps/compare/teamspeak3-2.0.14...teamspeak3-2.0.15) (2021-12-04) diff --git a/stable/twtxt/1.0.24/CONFIG.md b/stable/teamspeak3/2.0.25/CONFIG.md similarity index 100% rename from stable/twtxt/1.0.24/CONFIG.md rename to stable/teamspeak3/2.0.25/CONFIG.md diff --git a/stable/teamspeak3/2.0.25/Chart.lock b/stable/teamspeak3/2.0.25/Chart.lock new file mode 100644 index 00000000000..c818fa1d097 --- /dev/null +++ b/stable/teamspeak3/2.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:29.767240638Z" diff --git a/stable/teamspeak3/2.0.24/Chart.yaml b/stable/teamspeak3/2.0.25/Chart.yaml similarity index 98% rename from stable/teamspeak3/2.0.24/Chart.yaml rename to stable/teamspeak3/2.0.25/Chart.yaml index 836349a50b2..8d0f7b13b68 100644 --- a/stable/teamspeak3/2.0.24/Chart.yaml +++ b/stable/teamspeak3/2.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://hub.docker.com/_/teamspeak - https://www.teamspeak.com/en/ type: application -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - voice diff --git a/stable/teamspeak3/2.0.24/README.md b/stable/teamspeak3/2.0.25/README.md similarity index 100% rename from stable/teamspeak3/2.0.24/README.md rename to stable/teamspeak3/2.0.25/README.md diff --git a/stable/teamspeak3/2.0.24/app-readme.md b/stable/teamspeak3/2.0.25/app-readme.md similarity index 100% rename from stable/teamspeak3/2.0.24/app-readme.md rename to stable/teamspeak3/2.0.25/app-readme.md diff --git a/stable/twtxt/1.0.24/charts/common-8.9.24.tgz b/stable/teamspeak3/2.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/twtxt/1.0.24/charts/common-8.9.24.tgz rename to stable/teamspeak3/2.0.25/charts/common-8.9.24.tgz diff --git a/stable/teamspeak3/2.0.24/helm-values.md b/stable/teamspeak3/2.0.25/helm-values.md similarity index 100% rename from stable/teamspeak3/2.0.24/helm-values.md rename to stable/teamspeak3/2.0.25/helm-values.md diff --git a/stable/teamspeak3/2.0.24/ix_values.yaml b/stable/teamspeak3/2.0.25/ix_values.yaml similarity index 96% rename from stable/teamspeak3/2.0.24/ix_values.yaml rename to stable/teamspeak3/2.0.25/ix_values.yaml index f68c6cbb3ac..efc400f0831 100644 --- a/stable/teamspeak3/2.0.24/ix_values.yaml +++ b/stable/teamspeak3/2.0.25/ix_values.yaml @@ -37,7 +37,7 @@ service: targetPort: 30033 env: - TS3SERVER_LICENSE: accept + TS3SERVER_LICENSE: "accept" persistence: data: diff --git a/stable/teamspeak3/2.0.24/questions.yaml b/stable/teamspeak3/2.0.25/questions.yaml similarity index 98% rename from stable/teamspeak3/2.0.24/questions.yaml rename to stable/teamspeak3/2.0.25/questions.yaml index 9a43bbcf73b..8ab4e73f698 100644 --- a/stable/teamspeak3/2.0.24/questions.yaml +++ b/stable/teamspeak3/2.0.25/questions.yaml @@ -187,14 +187,7 @@ questions: schema: type: string default: "002" - - variable: TS3SERVER_LICENSE - label: "TS3SERVER_LICENSE" - description: "Accept TS3SERVER LICENSE" - schema: - hidden: true - editable: false - type: string - default: "accept" + - variable: envList label: "Image environment" @@ -346,7 +339,6 @@ questions: schema: type: int default: 10011 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -440,19 +432,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 9987 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -546,19 +531,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 30033 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/teamspeak3/2.0.24/security.md b/stable/teamspeak3/2.0.25/security.md similarity index 100% rename from stable/teamspeak3/2.0.24/security.md rename to stable/teamspeak3/2.0.25/security.md diff --git a/stable/thelounge/4.0.26/templates/common.yaml b/stable/teamspeak3/2.0.25/templates/common.yaml similarity index 100% rename from stable/thelounge/4.0.26/templates/common.yaml rename to stable/teamspeak3/2.0.25/templates/common.yaml diff --git a/stable/twtxt/1.0.24/values.yaml b/stable/teamspeak3/2.0.25/values.yaml similarity index 100% rename from stable/twtxt/1.0.24/values.yaml rename to stable/teamspeak3/2.0.25/values.yaml diff --git a/stable/teedy/4.0.15/Chart.lock b/stable/teedy/4.0.15/Chart.lock deleted file mode 100644 index f070cd80d59..00000000000 --- a/stable/teedy/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:49:45.787809343Z" diff --git a/stable/teedy/4.0.15/CHANGELOG.md b/stable/teedy/4.0.16/CHANGELOG.md similarity index 88% rename from stable/teedy/4.0.15/CHANGELOG.md rename to stable/teedy/4.0.16/CHANGELOG.md index 813a6bb504c..41656f17dd0 100644 --- a/stable/teedy/4.0.15/CHANGELOG.md +++ b/stable/teedy/4.0.16/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [teedy-4.0.16](https://github.com/truecharts/apps/compare/teedy-4.0.15...teedy-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [teedy-4.0.15](https://github.com/truecharts/apps/compare/teedy-4.0.14...teedy-4.0.15) (2021-12-19) @@ -86,14 +97,3 @@ -### [teedy-4.0.7](https://github.com/truecharts/apps/compare/teedy-4.0.6...teedy-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [teedy-4.0.6](https://github.com/truecharts/apps/compare/teedy-4.0.5...teedy-4.0.6) (2021-12-04) - diff --git a/stable/ubooquity/0.0.5/CONFIG.md b/stable/teedy/4.0.16/CONFIG.md similarity index 100% rename from stable/ubooquity/0.0.5/CONFIG.md rename to stable/teedy/4.0.16/CONFIG.md diff --git a/stable/teedy/4.0.16/Chart.lock b/stable/teedy/4.0.16/Chart.lock new file mode 100644 index 00000000000..ab4211445fe --- /dev/null +++ b/stable/teedy/4.0.16/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:36:35.483451104Z" diff --git a/stable/teedy/4.0.15/Chart.yaml b/stable/teedy/4.0.16/Chart.yaml similarity index 98% rename from stable/teedy/4.0.15/Chart.yaml rename to stable/teedy/4.0.16/Chart.yaml index 926acccee54..41a6a8bedb3 100644 --- a/stable/teedy/4.0.15/Chart.yaml +++ b/stable/teedy/4.0.16/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "1.9" description: Teedy is an open source, lightweight document management system for individuals and businesses. name: teedy -version: 4.0.15 +version: 4.0.16 kubeVersion: ">=1.16.0-0" keywords: - teedy diff --git a/stable/teedy/4.0.15/README.md b/stable/teedy/4.0.16/README.md similarity index 100% rename from stable/teedy/4.0.15/README.md rename to stable/teedy/4.0.16/README.md diff --git a/stable/teedy/4.0.15/app-readme.md b/stable/teedy/4.0.16/app-readme.md similarity index 100% rename from stable/teedy/4.0.15/app-readme.md rename to stable/teedy/4.0.16/app-readme.md diff --git a/stable/ubooquity/0.0.5/charts/common-8.9.24.tgz b/stable/teedy/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/ubooquity/0.0.5/charts/common-8.9.24.tgz rename to stable/teedy/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/wikijs/4.0.14/charts/postgresql-6.0.34.tgz b/stable/teedy/4.0.16/charts/postgresql-6.0.34.tgz similarity index 100% rename from stable/wikijs/4.0.14/charts/postgresql-6.0.34.tgz rename to stable/teedy/4.0.16/charts/postgresql-6.0.34.tgz diff --git a/stable/teedy/4.0.15/helm-values.md b/stable/teedy/4.0.16/helm-values.md similarity index 96% rename from stable/teedy/4.0.15/helm-values.md rename to stable/teedy/4.0.16/helm-values.md index 09f3de84219..d9a331ac6cb 100644 --- a/stable/teedy/4.0.15/helm-values.md +++ b/stable/teedy/4.0.16/helm-values.md @@ -11,12 +11,12 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| +| env.DATABASE_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | env.DOCS_BASE_URL | string | `""` | The base url used by the application | | env.DOCS_DEFAULT_LANGUAGE | string | `"eng"` | The language which will be used as default | | env.DOCS_SMTP_HOSTNAME | string | `""` | Hostname of the SMTP-Server to be used by Teedy | | env.DOCS_SMTP_PORT | int | `0` | The port of the SMTP-Server which should be used | | env.TZ | string | `"UTC"` | Set the container timezone | -| envTpl.DATABASE_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DATABASE_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | | envValueFrom.DATABASE_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DATABASE_URL.secretKeyRef.key | string | `"jdbc"` | | diff --git a/stable/teedy/4.0.15/ix_values.yaml b/stable/teedy/4.0.16/ix_values.yaml similarity index 99% rename from stable/teedy/4.0.15/ix_values.yaml rename to stable/teedy/4.0.16/ix_values.yaml index 55e53676aa7..46c6854ed02 100644 --- a/stable/teedy/4.0.15/ix_values.yaml +++ b/stable/teedy/4.0.16/ix_values.yaml @@ -28,7 +28,6 @@ env: DOCS_SMTP_HOSTNAME: "" # -- The port of the SMTP-Server which should be used DOCS_SMTP_PORT: 0 -envTpl: DATABASE_USER: "{{ .Values.postgresql.postgresqlUsername }}" envValueFrom: diff --git a/stable/teedy/4.0.15/questions.yaml b/stable/teedy/4.0.16/questions.yaml similarity index 99% rename from stable/teedy/4.0.15/questions.yaml rename to stable/teedy/4.0.16/questions.yaml index c58afd17168..dda596b414a 100644 --- a/stable/teedy/4.0.15/questions.yaml +++ b/stable/teedy/4.0.16/questions.yaml @@ -399,7 +399,6 @@ questions: schema: type: int default: 10100 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/teedy/4.0.15/security.md b/stable/teedy/4.0.16/security.md similarity index 100% rename from stable/teedy/4.0.15/security.md rename to stable/teedy/4.0.16/security.md diff --git a/stable/traccar/4.0.15/templates/common.yaml b/stable/teedy/4.0.16/templates/common.yaml similarity index 100% rename from stable/traccar/4.0.15/templates/common.yaml rename to stable/teedy/4.0.16/templates/common.yaml diff --git a/stable/ubooquity/0.0.5/values.yaml b/stable/teedy/4.0.16/values.yaml similarity index 100% rename from stable/ubooquity/0.0.5/values.yaml rename to stable/teedy/4.0.16/values.yaml diff --git a/stable/thelounge/4.0.26/Chart.lock b/stable/thelounge/4.0.26/Chart.lock deleted file mode 100644 index 98c2c4d9c97..00000000000 --- a/stable/thelounge/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:49:48.840941147Z" diff --git a/stable/thelounge/4.0.26/CHANGELOG.md b/stable/thelounge/4.0.27/CHANGELOG.md similarity index 90% rename from stable/thelounge/4.0.26/CHANGELOG.md rename to stable/thelounge/4.0.27/CHANGELOG.md index b9558930789..9f94a69a7bf 100644 --- a/stable/thelounge/4.0.26/CHANGELOG.md +++ b/stable/thelounge/4.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [thelounge-4.0.27](https://github.com/truecharts/apps/compare/thelounge-4.0.26...thelounge-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [thelounge-4.0.26](https://github.com/truecharts/apps/compare/thelounge-4.0.25...thelounge-4.0.26) (2021-12-19) @@ -87,13 +97,3 @@ ### [thelounge-4.0.18](https://github.com/truecharts/apps/compare/thelounge-4.0.17...thelounge-4.0.18) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [thelounge-4.0.17](https://github.com/truecharts/apps/compare/thelounge-4.0.16...thelounge-4.0.17) (2021-12-04) - diff --git a/stable/unifi/9.0.28/CONFIG.md b/stable/thelounge/4.0.27/CONFIG.md similarity index 100% rename from stable/unifi/9.0.28/CONFIG.md rename to stable/thelounge/4.0.27/CONFIG.md diff --git a/stable/thelounge/4.0.27/Chart.lock b/stable/thelounge/4.0.27/Chart.lock new file mode 100644 index 00000000000..851f151d5ed --- /dev/null +++ b/stable/thelounge/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:41.03778113Z" diff --git a/stable/thelounge/4.0.26/Chart.yaml b/stable/thelounge/4.0.27/Chart.yaml similarity index 97% rename from stable/thelounge/4.0.26/Chart.yaml rename to stable/thelounge/4.0.27/Chart.yaml index dcc4310e518..015d0af607e 100644 --- a/stable/thelounge/4.0.26/Chart.yaml +++ b/stable/thelounge/4.0.27/Chart.yaml @@ -21,7 +21,7 @@ maintainers: name: thelounge sources: - https://github.com/thelounge/thelounge -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/thelounge/4.0.26/README.md b/stable/thelounge/4.0.27/README.md similarity index 100% rename from stable/thelounge/4.0.26/README.md rename to stable/thelounge/4.0.27/README.md diff --git a/stable/thelounge/4.0.26/app-readme.md b/stable/thelounge/4.0.27/app-readme.md similarity index 100% rename from stable/thelounge/4.0.26/app-readme.md rename to stable/thelounge/4.0.27/app-readme.md diff --git a/stable/unifi/9.0.28/charts/common-8.9.24.tgz b/stable/thelounge/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/unifi/9.0.28/charts/common-8.9.24.tgz rename to stable/thelounge/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/thelounge/4.0.26/helm-values.md b/stable/thelounge/4.0.27/helm-values.md similarity index 100% rename from stable/thelounge/4.0.26/helm-values.md rename to stable/thelounge/4.0.27/helm-values.md diff --git a/stable/thelounge/4.0.26/ix_values.yaml b/stable/thelounge/4.0.27/ix_values.yaml similarity index 100% rename from stable/thelounge/4.0.26/ix_values.yaml rename to stable/thelounge/4.0.27/ix_values.yaml diff --git a/stable/thelounge/4.0.26/questions.yaml b/stable/thelounge/4.0.27/questions.yaml similarity index 99% rename from stable/thelounge/4.0.26/questions.yaml rename to stable/thelounge/4.0.27/questions.yaml index 3cab707530d..c636234ced6 100644 --- a/stable/thelounge/4.0.26/questions.yaml +++ b/stable/thelounge/4.0.27/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10061 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/thelounge/4.0.26/security.md b/stable/thelounge/4.0.27/security.md similarity index 100% rename from stable/thelounge/4.0.26/security.md rename to stable/thelounge/4.0.27/security.md diff --git a/stable/truecommand/9.0.25/templates/common.yaml b/stable/thelounge/4.0.27/templates/common.yaml similarity index 100% rename from stable/truecommand/9.0.25/templates/common.yaml rename to stable/thelounge/4.0.27/templates/common.yaml diff --git a/stable/unifi/9.0.28/values.yaml b/stable/thelounge/4.0.27/values.yaml similarity index 100% rename from stable/unifi/9.0.28/values.yaml rename to stable/thelounge/4.0.27/values.yaml diff --git a/stable/traccar/4.0.15/Chart.lock b/stable/traccar/4.0.15/Chart.lock deleted file mode 100644 index c89c4903183..00000000000 --- a/stable/traccar/4.0.15/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:49:57.030407492Z" diff --git a/stable/traccar/4.0.15/CHANGELOG.md b/stable/traccar/4.0.16/CHANGELOG.md similarity index 88% rename from stable/traccar/4.0.15/CHANGELOG.md rename to stable/traccar/4.0.16/CHANGELOG.md index cda4bd972d7..a9071fde241 100644 --- a/stable/traccar/4.0.15/CHANGELOG.md +++ b/stable/traccar/4.0.16/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [traccar-4.0.16](https://github.com/truecharts/apps/compare/traccar-4.0.15...traccar-4.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [traccar-4.0.15](https://github.com/truecharts/apps/compare/traccar-4.0.14...traccar-4.0.15) (2021-12-19) @@ -86,14 +97,3 @@ - -### [traccar-4.0.7](https://github.com/truecharts/apps/compare/traccar-4.0.6...traccar-4.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [traccar-4.0.6](https://github.com/truecharts/apps/compare/traccar-4.0.5...traccar-4.0.6) (2021-12-04) diff --git a/stable/unpackerr/4.0.26/CONFIG.md b/stable/traccar/4.0.16/CONFIG.md similarity index 100% rename from stable/unpackerr/4.0.26/CONFIG.md rename to stable/traccar/4.0.16/CONFIG.md diff --git a/stable/wikijs/4.0.14/Chart.lock b/stable/traccar/4.0.16/Chart.lock similarity index 84% rename from stable/wikijs/4.0.14/Chart.lock rename to stable/traccar/4.0.16/Chart.lock index 4d1745b3459..5bee701949c 100644 --- a/stable/wikijs/4.0.14/Chart.lock +++ b/stable/traccar/4.0.16/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.34 digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:52:39.21459814Z" +generated: "2021-12-19T23:36:54.89920349Z" diff --git a/stable/traccar/4.0.15/Chart.yaml b/stable/traccar/4.0.16/Chart.yaml similarity index 98% rename from stable/traccar/4.0.15/Chart.yaml rename to stable/traccar/4.0.16/Chart.yaml index f8fb86876da..8447c1a72aa 100644 --- a/stable/traccar/4.0.15/Chart.yaml +++ b/stable/traccar/4.0.16/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "4.14" description: Traccar is an open source GPS tracking system. name: traccar -version: 4.0.15 +version: 4.0.16 kubeVersion: ">=1.16.0-0" keywords: - traccar diff --git a/stable/traccar/4.0.15/README.md b/stable/traccar/4.0.16/README.md similarity index 100% rename from stable/traccar/4.0.15/README.md rename to stable/traccar/4.0.16/README.md diff --git a/stable/traccar/4.0.15/app-readme.md b/stable/traccar/4.0.16/app-readme.md similarity index 100% rename from stable/traccar/4.0.15/app-readme.md rename to stable/traccar/4.0.16/app-readme.md diff --git a/stable/unpackerr/4.0.26/charts/common-8.9.24.tgz b/stable/traccar/4.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/unpackerr/4.0.26/charts/common-8.9.24.tgz rename to stable/traccar/4.0.16/charts/common-8.9.24.tgz diff --git a/stable/traccar/4.0.16/charts/postgresql-6.0.34.tgz b/stable/traccar/4.0.16/charts/postgresql-6.0.34.tgz new file mode 100644 index 0000000000000000000000000000000000000000..be835a6724404eab0833be4a4639697122eba645 GIT binary patch literal 72664 zcmZ5{18^om+ike9ZQHhOYh&BqWMd~A+qP}n&YO*GoA2H4`|GcJ>rTy?np4ko_tRZ9 z-CcD~6GcO#gZ$?L(tywzORF-QN-J>6d-HIZuxT=zsc~5URO8`P($wTs(6X~Jb};i+ zS8)`OHn+0}x$OD)wb7c&&FgfQ4|-iHK2qk<}PN6Kd{_uEiSXZWYKHpD6doOU45NK(9bUwhFP4dTHb zL2d`Ibqfguq`YzZ8wo`FOGv!&-BCF#s}7pPrE?4T0r2=^z~d`I2N zz?Y&R;NcT{EcQmC3tS{(C`8+hP+UwXJ7)IfB^GIf8U{=##xs=Q-OI8kBh-}tPApu! zYcMU47&?d=z&%PCJO1lJCc?gvP7l#(S1*Ct#n(}*T?8B-;z6i@KSYeVUPhQd%L`LN z02vZ#ZoJm$ttsOM0fK})kcg*&X!{Cwi5szSYr(3cDUf*6jQgp8Mf|>>G692EWZI8U zp$z!ebuh48HqOS6MwLr>Jb!P=lT3yWu|SOogEQlVp5%l+0&tt4)|CVwE3{%G=lql) z0GHpKBfcFfIC_s1K>W=__=}tnvcQo_lfLtNI8L(GG>p3&jZOXX#CTWX$J*ibDw6$Z zptn?X-2&6KF#2WkR-rJkS5cnT^4S0TfCgXG9a{W0FBr$88=H?121k%}D7K4^dm8|( z<5+d}Fbsh)ZY05l7DeqW={}ypLN!Nzld-zvN(*s|J#ZM2>XixDam2 z=i2&UkRVcVQg+7tPP!s}89Z8PR(SA=)3O``Rrb%rRUm=~8tPUsXuI*39BoL|g<(pI z-gQ`&}As_ zsh9nEPkmHXRU()|>g*)#h%#|)e$;XT7PGm!`U^nNTuirgKM9H*YWw$AjMv>u(4UFv z7gAI>KWcH7*a>cDvcYl7((!x8>aMnlY4U>IILItxZ!%zpujw2eNBVefGi%s^wd z91VJ-`aKQIfW)1I&@)|T<7r}M}nXr}iuOyg6^Ee@b z2mahpvNhhASbB(91V)<&zvm>*La_(mO^)z-7I<^YD+sHmJgel(w4 z)~Vr3EaMe!Q%CNDNG&K{-JEN>#09`pLXY56ht z`!T|_^fnkh$v!2#NPSTjSE%_h@#kF7vY`1kN%2(K7o4)&8NXV|;6tef9s9m4|4wjp zY+!g`l3_L_TpdRI_WV5CDC2tw!~)Ns?t|W>Xf@0w%DsZ+>-*-Vvi(g8-S?GB^i>vY zX^y=9X@neC`KA#;O4bS@!lKvvrL_p;`CyvWyr9NFd}uRz+XiGbx59J1`O~VVUI{_4 zlfOLgi20_PI5|08dHwqV=eA$)@Zl}UM>%8fuK97<4NFaUt6h_)|#p zF_pQl)2bMmT=h5EUF;H9okY-qu@wE|qOB8e^{$2C(vb-2Upao5tmmP6_ z*wqKunkQR4PC<^0zCHUaFxUr~q~yU02XUuLjluhGtY8ZDKl!OlLj0l0HV*k?B>lZx z+ko%)k4qapT;cxy(mKlR-)aRt3`$N*?@)_2pN1+W|0axa%iD`O+ezFm#+CWLuT?3v z@7uh=r#XZHC|w}#{OVfY-#TFUEBd*=!!i~%5X`v2VIBCqA&jhNhsw3`{jck_fp;g( zZ&(Aa{8^oktWf$5gw&5UXi6vN>@V5ix10??l(|jPkVl%k@{Ak@jvR>Bw2*0pSg`O& zgeT{~A9I^?*=QDUp^(HJRp*RelOGLLy5BKl^}#PkCVw!x};XnZFo{ z2TNb;N^7e9Ljo4Z{D}^SR*%y|A+VO}iGPsuPY8GlHuVg$|9eFl-togLPLJAv&!Lv! za{NehOC{jeq`wqo0GHS8kug_+W&ET-u)7w-AY7slk}G@-h&S3ny3U=)Ac@*n4GN4j zwdKu>ZrAG7Io%8)hl^-fkA>aJ$f0qz9J1mqRPgW!#b17Ry-VdzvhHr8yX?;i8smhU zi~@}=ySaqD9HVZa7qv54^UNy@(54S1(;v-V{=~+*%iec}6%7k^mpz?~XyOLyx`+)v zCLA%TLccQYi;BR%3Et}x`k-iSj(Eo;I`S(A5W97I(O-T(S-jM7@kM(J`=L)u?e+s;+OjA1(I{$ylDx z`gHWPKdXA0*bl;cZP_GC(A?e%q#V)+1wFd8Q_?mdj9W$L78PH4^@wIvyQ{tUH9(u~ zVqsRsk#big1w4ao3ugx{F9^&M0H0;lF&(edCuawZ+7?UP$4TbyeV-NZ6Bbq0oI|-i z{79bK&B1dON^+pFki>D#eRpV%4P5ajhP-6noocv+8GA;Nqk5M;&0`b+b}yt@eR*tx zEIg$qryV3OUMW@4e;SSbzt~xyLK0%OAHecC zpm+Qn*&g~B3rvr6#Ft&$i-#=#fIR-1M|UK$(FLxOG&?>&Dr2c4dGT9*0Bs&*en7H7`~EgpXnSSKPo?~acc4{H}nMHP2NuM3-~pmoNpp=EAT@` z1{Dkyw)P-l&&bQ^`;7ltjMa<$vgwIL? zKH#fy2$03=@igIft|c7!&@Or0d^87!pSVEV%#M$^#w>_J$kh0i3vbnz{IfF%Y6k{J zX*-`+&PcylCR#ma>sDNR?@owFL;}1;+O?3HWFex}|K3b_1gatmNtH@4A52iX<+Z@WDCQKVY$cJisUE(i3X);3{)u z{<^3!V;`r+Mi`Hiv}uE|VfFr=rO@tyh*uc^H*?z$?41QSQ-3fz-a$UEp`?ucQqDg; zn>rj*)ApK^w+Iw=koLk-3$Avt`?Uf%XUJ`Au!b~UdN36;zwsn=-(Sc*r`O<2^2Vk0 z2P#`Xe-||Fec5X8S5i4nc@<;cN>4pNa~duvoBGE8`L)P%5Nwx^;HzBqn(wh6tlAIN zf=PrKEtCRlhZqoMgKVc9EM0-?(*vW$>Cs_yDeG`)q>oVhC#T1$C!;aR{r6CQ)ur(A z1fn>k2l3=aps+3;JDTm8-iyEhrATsY*Y>7vjP4fmHEkD?d*g?4;8u9?xieOuT}?)E zQj3BrqvL6fz!XY3dSALclDU*u2tCnH=-UvpUvOOxik;zR@}m1XAtDBsH+gpr69`m| z(>0v?5;D?JcL(v%Q_c}t**p_2uLQ@vOLcO^aN5i{+?KwFvnm*~vfq!25n`8KzQVF% zD%JVjIGy*$N53e?g7_pMSzGr0s;uxg7Onv1!4oo|RC!l_RoSy>TIY1D9&)(9;PX@# zHkayY6Bi}lhdyq;@pD~b6Dio~H?^?0h;q^h06nD3s))jdqr9o}ptiE9N7u+J_0}~A zVa^W|^1)Hv>GZy??84U7U`f`n@l98Dnw$A<$oVv#NnU;DwvppFTM z>aQnP)z}ckf33_{eUbtun1UevP^Ld5jJ8g?gecTTf@%ApJnnsr0(Zb$YzW!cu3sFT z?NmgxdLn4Y;5=NqjRFrKA7Zh}_qk5bROt_D^b@W$cc#s8?jx+o@gxj z*;-28v;B8=HMw|d#kNxR!$Y+fvQulS3A83XE#nS5&TJwQxWxsx# z6_Xk_*ec&aMby52vg*?ISB#07OD~yivoWo+Fh+33MW;}30~GR#Lu7oV_P>4Qq&>1V zEvq(@$QUz>$`ZUACX|EI86o@?G(9@AS@i^5_!1K_hl8a-Xev}}(V$P z6lCUeoiT3anykKW38^8ja5)Npl~#x+EpUBS&5@0MBiH{z9+8u?!L&^%j>-X()EWuk zn^tPaBr=AEllsiw^&*7$xs9Pf%Gw7Xx)ml`W`jwz_i5D{Ni2hr1)Y7V8rF|!jP|3Z z#s%Vdh%z*ZnArGGoaO1|Tc8I>6ggU<`# zq~p=B*uD$T;V!{+qIKNED2{ZJ+?`kA&l;I355-DkY2CNGT83wz#({WK6yaqW((b2> z9s_Uznj#cRgswu^`bZpxotr#q$ph=#=Q&5#ltT-nzA!5an&_P^dFliT``t}Q8s09W zYXWxelL{SEYe@^D+%Uf1t1L8atFlDsAlc{~J=4nEs&CQReMLY7Xwbc;r((YJ1mW|l z5WHdc&gnK>^?{lZV0H-+iYp*vOOK&}VM!S3v?$tyXZuKeJ@<)ijVU+VArrFP|k_ToY3nH_&=fDUtSgK(ebqJcx(AY!1U`aD|qsFaXYyTkJ zbWR$d9oC_@(|J2WF4redZo3b$!>FfF4oKJRicl#P_oFP}-UlGH7bvT7LATJtbtDDq z84;b#9PnmUlrZ(IKZB{#wPImcVDO)sxnibg%Zd@+f^uyrOWKTtu@+UC^ykEkfo(V& z^MawIgo;oV@AmP&b;2aKd%awtd@JEJ>U6xVddk+DqOd94`jWr&~H^Fp9auG~z zMmB8h-KIty;i`LUOd1bi8xI-HXfAYRTu^kpadxGmddPi5JE{;ce#GHiVq?efT|5_%SkE{1E4ay2hh zzHTI;#hNjxr-zl}ZUfj((Y^CaB}Pooge_J5CW-n&RvPb(E{fRMixM~BETZD3|c*VJ+U(Jt3+|) zTUDg7uQ~e?DRs8`;p_S)M9nWS%*(1n5gA3~-2fnG;vZ%@HdyP^CVl8(!m4YxCtQPL znqOK6#jeSx)vM$h6f6u6(`p$a0nPS{^(Uq(We(De37vBIw5s-%Kz=IXyFtJDw&i`a zy)lC-gr0vQVqeA^R7*)P6GmxDa%@EgAB;}x&-I`MT+*e(mijr`ro)?1fep;(AmQ{7 z!13kJ%^$cQRX%?8#RYOQW5beF0vWrrD&FZS0FcOlbAbkI4Pz(Ei#nC znKD}CTGCn-=lIdfXZX?TPO%a{1;-K%mwA@xpeGQzD8j4Idy^Qw{IacSUKE*Oe5^%w zd5hhEVwJoWr0)NKfzOtZ8kZ4JXv=xpJf#t9X2XN^afsHt2e&$Z?f~exQB8{AKo(^k zAjvwIJyGh|*Q1eI--CQ-&rN(3=iiVTP1>B*VV9S&ZB>EdXjx@N?syFfO3(13D{h=! z2@}=b%Ab*akSSIib1Dup$CZMI?e$KwvWS0i+tYL|Xr+y_bKbiYKVBqH_ zq$14)6mIa@kXOiRlo=K){zK3b)8hRZmNH#r5qT~Y9_77o^VwC3gnfx(nf1RQ`{KQI z<}csfV25&q`5*3vnaKS_9=PnZ*lychmM|n3#VL^5C5lkLi-Up%7w<*#W{Neu1+P3W zOM;sC7w>g)|M7LlE3So-rvskF`@8Hv$r>33IrMd4LsR8Snkj#8il5+;{R~dl1ey_I zEW!|(Ik9;)I7O+@3i?IoHKFtrHB+uHi+SPLPxPF@iuUCVGq%83=P=oubpw7TkPvI& zpCxqu!z$T`>bJBK1yWRNa&duPa|yW&=AwF*tE4sN8kp>eMV2~BU}~p$e#ujlkg6b< z0*~55J(`tQCEj>ekgbM;7Zs%1Zb%!h6Wasac-C|sZO@8%zXU9Y(C)oGbp`2PdiO}q zA`)6uxqLz$_|6de=V~||I!wNyG^(oKKVizP#pW#GtEK6Ti#2caTbhge7kQBm!}xc> z9jGCy9H7kHG~nA?ki{>gma%&^!5uJVe$K)98_!YoAmE zr%bIO9@>86%*^Ny+!dx9>E4csqJONq`?dKv4YkhmX{yJM(Iq2wK^pQg4%Uu;9&5$sdF z|Dn6X_wbw23^Ukp26&7*-gm@jl3M`~Kb1T@B&)}F^W+OLu=LjY5SETOl zhLb)mwh6Qj$v}f-Y>k*nrger<>L|(KggeKjFa2nd<5%~?bTw`EzkhyPSdI2yt^gux zo%e|q)BOI5gL>najqahc4x576*p7XbHAWIJY3NP{V10VYzHZ$I7d1GYPz6avM@y2)wift)I4OdDNA<(OqW;OJ@9c(3s9Cg&_u&FK>)06E zz`fI;#qzgy2r8OXx~>BN5($dr@}J3671wC>X(jL|x=uONrI<2N()|yF__3@j!!ajh zCVUM}-t3>aiKK1cbBHg9+xUW??^38>wikxy7kz@`Cn)-s{{#+9A*ZaG(^$qkZ5bj@ zVqq80&zzRgEY43zKb$1}WU}M4aDoR4)d97)eL%0t+G`NfSHsmuqqFNiror_>!E>xV z2Bx(P4TLY&SJGoa!_;r7K7?NA5fk;-L>ynkkml4ytko|Re=?oFC|UTy1EG06m7!qT z7;ixw6ssIb55Q>|%fN|a$UeLXSK>%G7xBwT9}(tXtY&TozZ7vwtP2;j=bcaIu5;8C z_=y=K*I)!r3Nix?p9?*D#O}z6t2eA3#j*K}(UG7Eon})>QNG`{J3JWJUzk`awsTx1$4VqiukcKAA&Fw|6DoVCM^Ng52LK_w>AF+AiNtwE>?c0p{V+N0g;I+ zRlFJw(jK24qQ>Pi^Kg3#*oF!Yw(kn_FN+mXA+EQgHjBY5xV_GH67f*|m^Kq11<|)X z2%|<(w4S&RooNzY*wNE_uEc|`bYV2Y;DgyrotrPIXzLr_r>zmZ#!MS&@;rGx^jPuX zw_hs=a*Jc3i^lE+JXnYxc-nI}_CQ&41r&4eB*W311?h|i}mZT?OhIb)197L{w_J)E+}CK z-Go{{^U9MlW0CiOJBR>D&8#iICs5ayNeg#TRwyr>VWqaR;VEDKwp&b4+J58snH)hiGedcyQRI)AsvpYt`#DkW1S2$(}vGk%ZJBZzdQlMXE@5l(|nND}z zC-3O41Kjc3pc!%V_VdyNU;8J~cpNOl)>c)Y1Mv^K4wPIE%Y05wZj@#b!%*msfSH>) z33s=d)zhtd!u%hd)7V$UfCi`)F{c_E#*cNAEV}j`8V@w2K|2;TebRR2^RvQCEzaX@_uGy4YCPcM-)%Q z1Yc3w_a~y)LDxjgWfverKVD~dKV4jG1K*{>?!>BC&4vuSYJGTijK0CLITte1x$33p zWA2^m1js~Wx@AJN@-3vAPg(a4WEJlL0+I8i22s{J`WmCl3U_`ySl9C*L#VV56o^qQ zGj`=*|C8g9Unw-Y24}zd?+zkpI|-iWM<|` AAqL)3oI@XPH3Uc8FNGZS&P&37Oz zHm)0Cug;LVEk0_6&5hsDVh@-nK~ibt%uhepgTlm~&8S|;JtI7|05Wyx1*M!sxkkqk zhk53za%TrbCVVVZQ5BgbmcGgA(`c6r0x}Hw@YFA=dOO3{j&zPDdl=O{2;UF)(d8p| zu+J80u2{D(zUMozKI=zYaA4)&Vl$0aXk@kz)mri~` z*`djU74O8+HayZ8JHYR}MyPDl=6_WU#>VAf&e~-t|fSCWu?J;c>p}&Awig zg)HEuPx7|YvR52vfUK?}_;S3nk3&=T%X)zxbMkUlaj%K1t(7%OW+wYnvsiT(v6#~J z_V1yEN{r^AMgJceMiQ6MNp{u-@xQvLYIm9XbSe7T`W9tnb3{@~otZIgmtK&^`*@dL zI!s5BZzIXjWp-0{4hHapFCiNhrgzIZGy@L&N0F$;`w}~F-`teGC+Df@X;M$svzyAY zm?nQec$_0KKK2|-_N&Y`-;_|0(k<25y;p^f&Z}LdA&2OEy05P^*!5$=5es6hzIA?g zDGtj4G}QgZ5hM9~)@*kjEaM841YbN+>0 zw+y~$`KIw0Ed)cd`&tU|mN5AHUN-1RciNjvr3IqBw^8GtO6hSr)_c^27noY+6#=@PQ2k@LM%}n{`i+#5q~k zi%%}BzziWYiM@ov#ZENmr-zz-=}CsxsrcZA8^q4TB9Zv5*dAc)ne9^b4s&}>cC(uB z)$-V@D+m;%d=1xs8$(?pAz6~ixuIlvm&1UW*tkjcIM01(N+wR9|NDhXuF|U@|IE+_ zv~OblPQW4%<|s_=+tuIEOvfH8Yc$0B*9?MLsa8i;`d^!)IHmI$0Z=BeGg%yjv}1I3=}YH9%`yvSV>8)l@bvMc`I zuHn7wIX9s>WsiA0&cFwulB9rEm{qCv!(+4!8H*Bn?rg}rtw1zbNA0c}WkuC&jpViT zUVBUXEd;{Vxl-@G=zY8Ce;$sSrWa`jE^@Mo|~tNO z7d#CJnm|&BbTl%#s+u0C{&r`a5*>cX?9P}}aDt0%UVCRZVS8JTXC6|L5nd*^0IXgS zfra{W2c}IM4JIP+DMm&-2p?@;SYGI7%2-4f%kZ1u-1$z-2a5?YT=1rrf{1>+bOM^! zJHH0E@0?5DZ9C2X7=rN`jm5^9rY+!Lz?1Aq@7A0r9Pp~Z2mtjsC34cIX;;R1bHWYq zYft_pCv7s^mF((2WQu>P3xh6gHv!1~Gup(BD9*oh<3bjeVf?Dc`oQ??jk9u?bzVm! zEx21XeM?EZ`19yg5NWDs=FV5)s(r2*dg%acKSxtrCNpdvbhA?7x%s)~)BKu$GriZ$ zu>gMvc6{DUZ*IOLFl)T+AX5vgHK%+!%B&O%0zXIu3#k!HFGVS6Ax(Bnv>4$rIW9ty z@KCq84?UP)2i&`Djd2t2mU0qpsRboiVhL=~!)Ir<=A#M;C?WE$m3^#-zY!xp+^C{% z^iUOGB0WPMQIkhxZZ8c=UEzENaUxN+vV+7Y}qG#gBED+-;%YcD%J{ zd?7p2rs00b$XPACg5FHND1P-aF$7%iV@N8jS$ntFMB#bhm+M1&x8W+!Xl&4~FETDG za{tuy3l9~~%P^viW6Pt13ZjI^5I<=Er1`K#8x*gdSfVyem!kCR06dW7leq*q?->2r z3-lt#@fYIb7u@6%Lf^UW;X%iGh!Hp_xO{Wo!v#5GrcSsF?>R92CVqZHs)Aa-KfqgD zcsLe{VI^EOJ3;a??=hgFjEvxL`%H)=8!Nn^An+o$P}k0eWl;*1u0ST3qs)`I>@3Rh zw<9=0BKt&oXIzaK<$6X2CK~;XKAHpAv#5o)KcDh;f(rkfZ>%`#j^-hIW9j;#MpXD% z*EDSEsZ(F2kWnY<@8{~}}GkxafA7QH4|larw~64x=*oflK0(zGj;E)q~}KX z0d@yCs{bcMbVsad5z6k^(|ua=|Qtp1d)T?8w2%tkqL2pOU4~L3Y#U1Kds8@+u38u+Akork-mR~F8(gC)7p51JIwk?>|%kZ(iE~~ zl439rzrBWoY8O4N=-4Uxe2SM#Vdt2brRV)9BJBX6*y=!b9=;jvM98`P-uIHtR(ARg z*Y(f6w01V5yF7Ea#=~QPPignlZ%)3NdvujUU+$8TkvCwI;wMWkB)Og*b!OQZl1^U; zuFG(SSH*#d$WkLn^GjWUitJ3&U{BKr^RmqcY%)2o*69Y}oD3=rjr~>}ZL)n@x}Hzu z#24yEYbpTTTkvb~{Wm=W+1Ew3cB&9uNWUk+6bVX>+-GVoCgC?>%OE95E{5fgg%sm$ zNbV@ituR0N^cBvs-HTsDqRsg+3u|^Qh7J zHSeZtyNi@u5n$sJR6dM`e@mNmHa)EhM3k1N){%?Dw03W3@%Z5N03Rdk;#x$W6ieQ! zW&{^YfXB(Ar2H`-L6YSZGs;OiPFYD2hZ3O8f`Bj{MM#77lMCY;u{y8)G|QlXi|#!RMqg4^tf8z z^|5gUdqd*4J9`}^H6YkxHI7y;cZ^BKOSypNA;jMJA;2G(q={l1mpKH8RrjjflQOkXco;N$gfCEC()TVJnR0_udyN9x8P+ves)$x!d;$7c(*msP4> z@5k-_;mC)j6wyu|zW#47clYP_BPGj3-?!u2qb^IL*_%8HJQ`|q852r_?0OxZweegc zKFmnTv=c`ONSm;9HqMI{CN>@}IQ)YRG;T?*K+{LCGA!<%{x?a;Sj1kQz@lJ9Fe#{> z{xe8LCZ}GFK=3|+K=3XYd;naw!R{m2i7p2B>A#ZYS^Xma_am~cy8g2@uf9>>t!?*R zVN#y}1C!^{y-VGZ56taJ3dl}ps#dQ+V38Xdw=9#>ufQd^Y)6gV@}1m%m48*Y{HOgh z$XPC0r{?JrS+x5p@z~G&b?U8b+8WQwUkOXm*^Zir)KB8Ei%?1*8ryaEnFCAIE||~lssD|1a|E{~=1g zH)-B|(?q^ErE|akr#@-XUC;cBkH;5-<44xAG#(@x*LV2W|0Nkki&O(Is%2@sJt|z? zw#!6Si3&+D5^5;OTIo?GhT;Kg_)Ku#7h&^2%$^fiJN5ut{YDGc$S_|~dL35_Rv4Mx zaF(W%X|sFvl!WX#JUdt&SyAE7ehM)-pWYK~fVtS4klsP0oLJ!y4nt4$9(!&FTqbW3 zEd?tnCKjq&`N6QeJyoNgknAA(8V`&lwINwKqqs&|x2PO`V;W{&O?<1`Du8RBSjf17z8HwXX!}6aa1e9Di7O^McWbcAfsX|#icjLrGL{-=TVoHa4LOr zsA1frMMDP<0uIMw8f=_TKM|V;E{8x{OF#9;mg0@FK>rLju#7f_DQKi1j4Zk>C6jg&geYzB+c`M?E0kb#J-Eqq-mJO29e@=w%g_A_oI0RuL)VAd!=4 z@981fev`>g_wC(OeY-!HQM-GV_Svys!l8gt0!$h@l+W= z_Fx%x3EIOAAO6DXB~+0WZ&han1!VxAOhlmP=42mAwBrv85SCk%9|;)_s0>98(=6y; z2ixX#X)MR1ibAcVAQ!7p_=#A$F&)wm5;4oP>}GLHJVhCE6khB$Dy$*?m!C#3i}_s{ z%*1x;_sZx4nWlRpuIKqF7Iz{B``UUIF6KRlzObKgx9+8jX{zxAv(rI%0jO2T<3iz3 zX@D-Nu#H?mGX-5p-$|<^boe!fen+9}S3G>3%qdFR0*Z2^-$nS^=Y}*JdHLB}guFn2 zN7YZX0>u2@EAyESfxATCORHfofilbCE~z3Nc2JP<$;O0jLJ1nG#CZmlFle0nzmhGS z>gMNzpEHz{5HRP3Xx2MJ5x2hzr?zSVNm)M~EHf;rH*REDZdFZ6rzM^R99nLjerN~O;3hM-Fp5L13IC9FT{A*#7BM+4MEa~c9bMpmpS;{gVO}&3n8ziscjkA? z|8?_dcGL1Hl7wief0<*DZK!W0WvK<_$hc$p+w0?dWZ(;`l1ue=o}S0Y-?zQaubbC5 z*r2!1_gQ3R7Rewx*FX7XM__4wV(+WTj0}>%{wH+&!sN!JNb3$21i}luW&*L=82#ZUW`N_)c+n=SRqRnZcg zN_D9c8=H=}-TmRFQqb13AX7dxGOO`rXiUOzGt|V0E6I$BLm9>GWvKJ~DXkp~{Ro4! zm(K3BqaH?J&*}ZoUDbchQus04B6NjaT=~bPMmbcE3bmS-F30YxIM@6^#-BhK@`vkp zAuAnzUqI+7%}H+AEX*m!BVdd&+jZZ6aT7ih@^uwvr6;vDg+M^VPAvvk3pd@uMw1v# zEv!m)$f~qX8XWhtwNp^wEw5c zgf&!@g^}uUwQTHrSxue4tsi~+xOqQ49~=!R&2hNhUcbI|vAsR6?Dcj6^?U+~=l-Dc zv&$(eDL$7>(Ot<3q`nx^)V<7~jeJD6rD;t{A?QorT>obcJvGWE223v&U0vW(NobDF zMRu+8u0sGA_ttfAW1nG||w$)x6!%gLw7{+Ws7X@MebEl0<7X{%K!$7w&)IEA|k-Aa# zGXJDyB#N5A{QlF9`l_3PY`Vb?MS(LAVGJ-&QXg3Yf+hzb?H>#=(pb9HZi){>KoGS8 zU1^lJhilp+?EHq6Kjp`}E_v9lt#s7ln2NR`Z1^esO;|+uBe6G1hh&A5u6WfVw0GV6 zc!oC}qw1g>?ye>iqv!NgLdt%j;aA9ovG~}zaft#$TSr|qFaD0@?w=#S7s!#*4(XcBvq( zUVmu|*5Vr-295DMx3{aNja!TJ-y}sH*{%@(MZ!3|CYquuD_kjy(Q@jmOr>Wo^~_ta z+A3`k`ZN#50Y<9Ky8Mfa70xLIZfdiWHEE&`e{H15>U_tKH3`Nwjo_mK^vHL)R#1Ke z4&oHv(Ic=Qzp&*3PQ1JdkKo!RfAI-l-eFR+v6^l&6IMzrLOfm4mY3%K@`!$`u<1TG zHBzS&q>SY9+2OBtX)(sXC2m`$g()w2L^-M_s(6S$@ec57TYf8ISba@_DzBAT$Y=TeK!8@8_e_kIfRw3~95 zU+VF&1AH9!I2ufGc@iuYvewuQN>A$HUFH$!<6qqnSRUsyiq2cl)$YY&7nOX4;etDM zoQxRZU3oJQ^Im%6M8V?Tc+Uh9e&+venwok^V-nOOAn5yWdiuUSRP~`ND*8$*tJ}UN zFvu0`7im#IZ|;_nM+?+^p=9~ndhtu^t%9@U?N^>yYSJ!MfrNu|r-SU5S@D_Vb!nWW z(Z<sPAZL=NYlNfH_KF@K@8ZweP9C$D z$U1O<#j09;XO2>~*Q4pJn`qjg)Bdpkm{JGM)61C}U*<@+4b_uxyxc5mQVAjjGF4!6%as|2&E7>;N!p5s)xowET{b`p#?BUBqOXUV` zL}v{xUQT0+an(i)eGz`Eiu+d_s5;M3;##w~@S`(@{x}~&+!--nY+NVx=$Pb$N12Wd z4nzZjgURm5z6<8_t)=SERwcffXJFm9v<=BEjrIq2$tJTT4Of)PB%Vp~eJS?QkBnx` zyKlO2@?`_c6g+c=Vp&^oXK)%k33;>!W~ke%iQ@AZHi{H3;Jv z0uqeR6D_i$U_lbd)hH?pvchU`D>L{)?BBniI7mQYHYj?w$Y2;USW_7S*cBEujIvnO z<=2(b6_!|%^F!IiM5J-6=2_k4MjFA~#8fe)4;fgG2xY8r$OA~h+=C&S?X|8-gaMQK z6Cw^`J|Z0{&p{Y}eYT+UxbGNPaJ;th^8{P$Qm~+xPzIcgR z7&Hd}La82EbX|Sg?yUm^%FkKXi>Q)6ZlPfj=pZFeUCKnf@Hr}rf)|m2ZPRV0^?&ZK zFp+n1l`A-{D9mgt!x#w0hnd}D>~&PpmzFWaAhk!77cqhq5aPy6B{=Iv;q^5J(s7%G z_(-l@s*eTV9VUM0tXlWYH@X#~TH8sRPKb7vfD)6aEe1rX7Xx_3l~>JlR?X}teyoq; zRQa5CGN8HTn@j}s2SA*TH^YSCs%q$nU}|Edq+>3t7YZ*W!^2o7n#p1tHUH^wBKqBC z9&C*4ZCB38i~$YL`lFLw($qw!m0Sl_9m7aOt%)Q599yoG!Pd;q*p$w$J-l}#jQCbN zm4cYeD)St`%npOoXd_&WBh0CQSJ5BOZi39psg4FJp)%IUz8z)O9@neeD53^J0&yM{ zBM(Qsv`PVaO51Ekj#da}mmU@wUs(Q*4K9|dPH#O-$`c1P?A@U_cJfDWHiwZMj&Bg4 z1Sw+apHD?eKqyApNP}mxtfrJh2SvxrnbT>`%qh!?99_6eJlEP zC$g$&e)Y87^l(BoCjHyb_x9Na_!Se295klkm6xp}i**sPO3O)^V!kR`FwX7P-3+S6h&+ zk8VV=F~Ku3jn{^PIP8WUmNVkQKo?YE_Z{MeOMZB2hxD(i3diE1V715n)1J@$!_%$x zvFJ6+@V{qgO-+`k-{#lx+A2?^|2m-qetzOmfufDprT01WdF9QeM#BGk!3Ee)cgG5 zo1?XrwJm=&R_IjcY;Syyn_Ea^675biNpv{_TTOJd13M$H8Z4+2LlWQ%>?#j9H>wyq z-_Wj`z)-BuyI0S(Hetr8tsUu@Z&O>rg6+-d=!tuKaso0LL*cb^!~SmKWQcjBO3W+g z-;IkhBrcxhZ$TDDDQB^x!LHf>5h5B(%P+Wy-P}m4=VB)&wot*Ry}qmYT4f5ujR*wv^=8Q_6hL+nETJ2LD5 zp}|?<;OH2RGYn`;j4);+@G&cgRZUIwqy1}tb{v;HVE@vucB|>LOJf%-aLYg3R`&Mp z^%QKLz`3x+v%oG3q!V2hU6Hgbkug1Ntjr~Ytn74j#T?UjJ#D; z9L@Iyin}|6!6CT2ySuwX2AALx2rdbd5ZpbuI|Bp{HZZtbU~qT4e82y?FZb#8L-*;` z-Dg#uuI{SZwa<1ZjiZwx-Q(b>z-)ThD+sEx9+^Adg$gqaB` zz7=7A8u0nC1ZljwB9Ap0TID9jfBPLoWtp`rOvSJ#Y@*1^n3%9Nk1u_b%_RYi zaIQA~qz1iYxIm`#1LVX;dDqB}wS3WaSmKocXgY>6r7sMM^VEhbF~e23Jd& z{jU$6&GUh$~oDtxC)Vx=k8N1>hI+x$wMdL5Y|9 zt?kX--Hf2e)4{>vZUKptm+RZPX`X|J&o?`r*a~;Gas2El|08U0z*)xP1TNbO;7QNhaDUn4I1drD;kjb z)qCV5dd){c#?c8HlCjv?x-;1+&?Uc>qj;pj4o;2+jr1=pVpkC<2mgu&{q4Vv(6;zj z@PPH{eP4SCHt@ga(e*FKz`nDic;v9LyttSy(u1rv4eA> zL6b5T`vtXE;06D3DYbV~BL3ZM(+K;&%Wj2}GIK~)7SIBYYcO#D6kROH?7w~`xF8w? zma%|tVYkmM8w5aE#IAo)oF1|7&9JqBW@Ri63;YxI#nJ*8bE<=@qe1gB7DrpY_>HGd zV$TOB@t{Q+i{k>0TQC)EP3f zuFm7%4I<@Z7?LF8a2+AUUO-T6|haHk`8x7j+KjY+ISO~h;IX1fC zqojzV51xny?a5eNZ6#`76>MYWfS@uK*99DpVB%oE#X@YygYV|SebJyz8H@7*j{9?D z=6g-%<40@k;QHtxm74eR5eMF{5d|_5MgG6_eGkJqVGAq^g0{tO0mo&X*w<2X3EYNJa9RxgXV+DIegW6;)Rtq>z z!Nk7Mc#-QtfTJel-NXjGo2NhX|95%Igz;3fgK3f22Z}Co{jPuV2g@Suy>%&BEEaGa zgNc3a`(0{pa7*yBJz8H=U@j%6^h3pAepnHrDuF$}Y(k;K%ZYD=U3;~cS* zA7kqEAlaieW^jF!gkpVEL#O+rG-hx?6i8FXqI}B=osX`7B@LC%cEqXmvxAHt1)SDv zmYOOG-mDTYeSyfgk&)YKVAJZ!-+05(6F3xsc=5sC})U< zuU%tHVRPtjZ))KfeNx5`Q_x@VE=jcQYKX6TUOT{pU0QNjTCsQyeq`8%jsD1QIG4=Id#CcWq3Ap+&`E3;eA=GUUUa&B&a zsY|MZSSMvWBha*26oXhwvyGEcCN_l`^;}*Q=ljd`s#}cbT59#1T^*Z)cA88r{sX?M z9UTW>JOwYR970`u+J;marcuZmFmQ4HhkP-525E5q9Q~O+{u_H%Dz6qa(Sg$~es<$u zI~5rG8aTb*+$&HlSo6OUtk&Gz_82(H3FuFuxQ^*Mcx|-sOS{u?&`T4oWr&{#s!47Rp$n$S<&9Q37|9=43r7xB` zp7U15*$*F+`8$O^ehhUnKBBFT_BEnm854u4DfYXKqOrQeUegj z8O;hS3w)Y!tl#tSeH$YiQ0syv?M|vT!ew>lMZs!pS&qU8^yN$+_yBJ6;t86YN(6O`7dy~?_Wg-|DmLD}%W|U5b^K|$o1KKFCVBR4chbl%qFjq?z z+bTu~wpj=w1061EQSD&V%%lnTAM!DxX?;?~`1KxO>L;XjKI`{XznS?TpSCZd|qhx1%IIo2X6QTUhumE78>~(2@fsOHB{_52yF} zqVOY16G3Ki5IpA6Xugxw_V#C?h|b3}nG}90ilqsIQH8&5a}kW8(r`fn2gjzwLx_(D zUqK{IVjQ{BYSL@+X{xw2<@$(EzES;U#f;jD2H1G>8gri?P4ECGOgXD3&XrE@XIGycxB6> zSGMae-G7J(a~HjZe$(j9y3Q4%xf6m?YRa40ei&JaG*zXQ*p}a%Hn-}#|B4@7Eo2s( zvXc~|Y^}tG+%ixL_h+rq@kT@4f8xx}l@iD9hcXj?_9GrZNjY#=(&{^W=e!0p#w(LG z92AdcA<2@6o$N4SbY1glQaWtY_eEHBYSJa?^de#((f+jvv^cNhr!mqS!yR>eQ0n~G zvL!yP=7RB6DXBD_s9w#^88&jUf!)DSV7$H>Zcy9G$nAzJ<%et-_+q;tygI4C_BAoN zC$q6iZY-TJ@Zr0)K6(thk~25ZLzW7DIm)8K{@~?k)axDmZ?bqizB!8jSwuXwQFKM@ zRucZMrg8aiPGdRCV4rg1Z(!im=?2G|VqZ8VE?E6m{f@&TTRg2M;jYOyu$FxzhmuxK zC@GP>hCP9DGp3gTP56FP7`XQla=X^yl#-{h64L4F|4X}!D7LsTjMmpg`{?A`!UJhB zJ#II^bcHvFq*eG*_aX z6(e4SAC-adb2@14oAfpwc`}e-XLX9kjB*e+<8jla8|!bfz4J3XwWycY=alro8T1Sl{W@eI>$VNw_uxXJa`^JLTK@-)5vf}EA8@ejcr znJIR6WoPxbbf9CxD5aqNjZA5E2{|D8k!c41ciH!-=4*T3%KM?uLvkI|)%ia-X1X{2U!R>5ZQ{3*vlH6sC;2WI=2QHhnL$p| zcLR|D)TanjbtdI`j(_H-Q~0#LyXH8Rp|fH1A!&7MUVp_;a*qP|rdYpA7I-KeV~TyW zPyY|C31uZ63@8>W#ZvE`S}ZE8tjAA^uFPy}gh`FOv31Zw_NSPa={&^2n%+3};KlvN z4oRJ39&i1xrj#y*Et?P9f^O-V$8(r3?5mCldJuH1( z6)yosGqlCA%ezlIx+w`kyuSo%nvqU`RxWa}E-4Hnhv0`6YJDUlfvlNJsW-V^l~=egb+W3&NEdO@QN-tZa4oQ@jj|59>-EhT97mOB(NDSp-Fr7w!>-l=kN)BT+^) zNjuH0bMmL6Z+nv_#B_GK#Rrc+x5oENywa{E?9iH1l2cLbMEeqm2d$6gom+nxa@EU? zk0_kR2{z3_T6 zmW``n(Ineuyzk=84m>Iu1s8(Z4mS28r#5RGm2ofTIDyKvi#R-NaE zE72FC6@ffxF%r(`RBAZ0H(8pu?Ne*+k&Vc^Cx!xiv(GQN>GAFDzF+#{U)a%0TEKS2 zNlp^IRzYd5){=scLLPwQ2W#l_k;N-#I?`2wQxn^Xy-O#;NYR5_93dtdm9B!Ob|p>& zk{!xNkc3ApALa|`DA8Eb#9(hC&jFGG&NsggTygaWKb)=DdJ0{rSZHTstE?irfr`hr zwj#58A`%j>D}xsg8_<=9tm{_Xh>9l00yE-#VS?CjD!!+^+g^XI82kkJkNT#?8m(c6 z;xV!-v<);Jx{>XihTr6;Vl$}Ozlr+xHnHJZ(7Qr>&4?i_ib3ILEwbBWr7p>S>R}l5 ztKSFsR9C3A{%TyR(-B!N8&BdHADgi1oi1V3JW=T|WhdvjyZjty1)w>9&0=Xgwb@ZQ zZIdtvegC3Kv8oGpzQ0T-p6c*q3{byD(ko8pN~1cUY4Y~NXiobt@18&g=M6rCePp3z zKfL6mVMg<*apm%>W0L6fzV>QTYZG*n;zs75#DJ5qLaV3<$uNbqP?qCRNSPXHDwrh| zlQVJO&ofbErg=kkV>0pUk&KlG0A}7>4V_}BFLaitYk#643KuCcqK1-YLWjPMK^KTx zIaJO8HTF>zVqBKR-U`5Y4rVfk=a1~b~{I6n}hIO#^V zxoc#+_9GxA$%aPdeIDzERXuXG%a7CUcO~X5Su6F%A$A>T77FmE{xBrXY0%^lqYn$? zDy_1@D~C>Bhs&1ocV8P7Wkx_JUO53%H#r5keeXA0>h((1-7n7TrNCj-P5R zx`Kbcy&kB(dfoewEbf#9b<7)9D2|;3|GQHIkCdvI{2hHVuCDB$@v+`YU;G&%J6%m_ z&H*>ko4)h3I}YbOnD=~9=BF%P4{pq1?fF@4SxGa;_37J~Gji^7SyMRhng`TZly`EZ z)j-q^66>z*R2vXTDfu&~pPH!{Co?cR&&!Tief<6lNRG3Pi4*v2*6vLx! z)y}Ard3IqBOhf(goWY|g*(T9TPv6b~)z`m~d6(ySso--sdP%qp4QT6iZSW2(r!uN#9c@$~H1pP*Pf#$QB9JEaDvar-O`rNDb>2o5O9N{X7 zUPQ@GEH}W^ty__NxM|qIvdc>Wd*AF4zut*%!Nxn$76CSCtb@hbWNCtCjB)Nr*D%3a z!o5n)(m&S&fe@FBjGMQO{idT}8810@jFVPr4nyfg))uyc4M(Y2(_$Z=}i z(^;>04~}pt!U)w+5?8sSOI@FK#Fehj2?1^0l6Hg{kDDPOm}Sd>uhb^dR%RycMpLen zAIeuv5ujEXDL&Ry8k!&$215#li4-Fca9JNs#GxAGY$D6CRa@~cl%|?Hj^KA$ibdM( z$N}cx)3gw9r|D$NQj8TvDgKgei|A?6qd!!%I(pudqdcJXQv7B6>2_^~pfo z!H$+?qJmb0oSc@ol5tz($yTeE^0$4<7BRY^g0ZQX2mL0zVyfKq-IlSRy+ay@N zX#)ww9tHtKTzWqwTzc42N@O)~HFf>{0t4ftbiRyYg$Nam#Et^VWak+bRTt{Zzkhm~ z|N5TG3woNqt)_iq%81MpWi^(Zp_iFjkYDHCzJyJ3m)E}ygEan`Mp4#GzA2IB^UiEN zQ%$}qi+1GWI2o_kcF0VtXs5cGetpOi!#$+Y^upcka6wr-^rNys$5cn&gIT7)+HEoK zXTI>ypGkQ6aE!(FiQ;t96GHp(w!c$L)*Yy(z)vcYi!TBihIwT^dDx=+N%@SN_3e%M zM9N6V^K3`Fu2nq!mjKRTYprrXA`Q9Vwl|QOhWT$0asvtmW(~kFER(S$_Dnl^;EpCo zKL8y&MVIN*m*&uF?o7{4Iw5o$hhc;foESy(WjhC~ryn;BWV|T$7fAJC`DGLs*BuXz=qLwTzNGB)N7#QJOT&lEyY7L#u>z1lZ#=pF z>Y@Q^(mx}<(3vyQkW1@z85>D>D2@P!u#~?gbfv2*-WwpOyDAF$ysZ4u$v5d=_gqRi z*ap}Au4pJQ%yiA|71P&*@=mX+*@V!ju?RZgaCean}{m3eO>Z_=lSlMTn<)O%wYXgYZ>c&T{DPX}+q4 z8+lK;iELGZ^LfGHZrr*E)76?WgjWK)FeUPbn|G@ z9hT1-Xf@p6qJ|94V=ZeSO<9ZOr zf+JRV5c);!pjOC^^vI+R)rd!uWp{tbDav7?wubep(c956dcjIZt&lI zo<5JpfiJh)+b0?J$9XwDujjXrvN4X~g-4T}#)R7%iZ9Cl^XKW|Uu*#=Xf-&K04<19 znul|GYuIu|>T*)<<7-gf(HatVDEf4%IX6m3C;? zgKc5%r8GojR8MH9uCAu3(?e*9>($3yWQLot+tUXuR=|g7dQ)Ay7Z&D%s2s*L`D`trcfiOiD(M$V+t%8g$}LKcgm?vy`|)ySwm9-asbF`)vLVlR zFRYr#swmWgZxeb_=5hGFOLM9!lsx(}p?1jJS*vtBQy#RRFU_69Z;x``Qn5l2jdS1d zpxEuvN}^m^q$sSmBTJ$pD<0Ovi~%XX8oXdbb2v(Df3|4P$-;nOiDyJlE?uisDLk{fDy+@q*PFo%70CACO z!`z(79hz9C(zxV2Hi>E{@Lnnxv&QF@bY>?KP?6CefdO+muQao6W~92pE_l|<)t_2o zlH@u#MC}`i!w_`NUSde17K1AW(>yYVd~>$#up$1fv7BCN@FP4JaiY6cX5nBDufw+9 zq8bI&F|Xi>yHF`=dGu;LFlRrR4xA; zOOXT``6x=S67a2HAoQ7tVgPu^EymQmmm;Mt;RU3 z%HQxDybDL=IY6D zmTGZ9mE)U@0!VL(cR^8wcqS#9uF3TJ@I^yqTl3{HG(M*81n_&P!2$AZHtKK|-z%ZG z5BT`UGd2=PRfJBOju7&Or$c1V`#YK(BiUWgJ1zEguV0zUKLzq{wij$wN9 zJ-JXaGHhYZ`Cj_+n+-M#j}!U3dvnpjpNNyqRFc>t!Ni7keVVWe`wYwZyx$IDN+^N0um2mzfjn9<{ zgto@IO4MfkIS$RV;bo{sYJ5xxmgUJF`BOHB&!-iIU+>%tTj(fwIMwd4f#ZofEK8?B zYPUy|>wz(mxlP)L{1ye%L>-zLhlUJq+}|hZx&-ikur%F6rQYUF43S2Xl4vKbOBo^7 zc|>e}LHJ~A_^KPP(PJ;QJ8Xff-jMz_Puo*`eT#T3wPnX7%I@fs2PP(c$-U{RZ206I z0m%w_9(ll)oPq;LsAU4Nkp9y{>dM2$5*@I zk`X+19P-7U@*FD(?M9A^66HAKF`%w2LrjzF(Wc}3!+6%e^F0s;h^U64EQIUR+>~@5 zm=|B9MZ;{9wDic*8cIN;!ea(BX^~3$XM*IuCjz%H(2leOIv{4`c&xk;bCGqGF*UoC{96qX z#kGYibYeh(tFX$D?^I0^2BUH52exRuRz#6zE$Y-+#8L`oCC?BJ+Zgu|JH~- zKQ|Yhw)~n_v=CiOQJ}e`jFy_YdS#ILZJ1arR!J*dqRl$cd26W9Rd>8BHlej8%m80htQk5ZwK3HXMkhhF zNiEY}IH1&=Szw?TcAfd6MHP%Fc-&LyN_nW($+E&RY3s2gdNddJr*14{tP8^0B{cXXwF8k2`Ri|(m+`wSrYuuWqu~$b^nL~<(futt0n9Oz z%GkQz6PeBFWbiI$5Ei%d`r0uN_M>_A1zL?C~Yk=}6&Jf41(~ zAm+DXSt+k9WWKl$U~TG%Qt=bbjnJu9QGF50O8v@eoKKjVMOpO z9et-3ko|KU`K>hc15NLta_@|Sg~?`pCmwjq-y9`>3Ho5M-+z(S+yYITgFQXLX`v zPr5x{XS`mjm1j{$x|W7_Np?KCP}zEkl>8i(_F!RtEuH#lPs95xlS~%=;$Q)GLRY)7 zh@$6gF8Oi^?Ft+wDL0h8c>kwm&EIE_<}meBtLW3tWmOT4rPD1u=Skiw?M{T*}^o6=8p2L4Oi@ItuzL76zdT8xctBk*3CxL&dAeT7?Yo z^THhXQn}QrpoL$twE1$+H|$CiFzCVT|Lq7aSR;R{?9DHuXPpKxu0ILHUN_tK^x?zj z>&!AiUR*@&7wUL|?Jvlp^CQ65&+0TbKVIccD8T_F@~XR3;#b2#O`H0)9vqulm$l%H zOLY?nv;MSG8C@GJMyK)=XtTR4DY)arMldVi6pz&=bwV6etLZfx2m=!pDLZ! zw1K|9#^L#2N_ybk@p1kA{l*9Xw2#Lg@CbV}_APj6T)p?mn54R`-so912kGL?b$dXD zmU??>i!2ruf$)w|DkKk46bC-Qp$molH_Ck1kcjYdjyHBx!Omw*=o$EMZKoqon}lc%bbF=O|qQ>Dcl$MKUpm-Nz;PA*djSvb*`4&J`ITCkOP>_I4WY@lAcByE`EG z0_DuOrqB}5&a;#L#kn2+DANjg^X4DcC2#-7fkG^AR(x7D0W+u;LV3Yci-Y6r5QB#Y zayx|JM&>U7L4d;-E!$}%hrgZAJEnT|;qyq&5_4K2i!V-7sZ7X8=t7!^tZ$tfmpcYb z{in=XPx3f#=rR~=25AV@K&A2dpC9_e)+?>bM~NSDux{u2m-Y8fxFF zdCyO==zc7|Uo6^rc<4Qp0|j`$0}V}^k};ZkeEs6m?~Yb{-CVK1h$Mn6D%?(_0$iTb zKv7s&4QCv#r_n86hHgV%9<8oh1D{`ehJMzi`p@>)Sbiiyb5lF{P-sykaJ~^=)Zn^cp)Pe^!VY^(Q6cK zvfQ155|+bou>dmEh&cM}`t@~E+Vm{It`6ahb%5`KV5yC?H7+(BvUDhFSgyR-Sbwe@ ztOsnVb%i#%Im-=zqwnUE$mX#S+Y659D>7MLFsuw06sWFHV^W$pX{sR5On z^}F_F=3;ZciV09#jmu}gID77Z2c2rZycW)-t>Jx)k)M#6Vr4@~6-T~y6Z-F{MGlwC zd*dSv?Qk>S*k??9m(2Wg0F#Vq^}Fdv`6M;N12tE}G7 z-oUmF8X&ataL+x&=X)O>~Bz?lD{P0e4{pOsOCQMxA}SHYAGLy z%p{vu;Y``5A%&m7?p@%IjW?-826i^y#txk)7zGHnFCYB1#?FekSEldBmD)Kof4w6A zr<)EZu8fA4%lMBv(}|Z;LQ{b-AD~fIl4jT@II-IZJM{zZ?! zm}C0LH!?`~Em)qF{)OstN1UFdjRdzw;xX5v2Wc+fJ37#`rG~G4*zPF4y53GRfM++p z8bYs$1dLcU3~Ii-YhOnKOaP;Tlw=*bQofQ=3#6_}-2W6we_gdhGI(lD5)T&HzVmja z4rbdYGNuvNZ!aw0!s(Z-*~@AvdTLQ;1sW33bf6a;7}ZF@%w9hTg*#c9_D3Pfi+spz zb#s-unjdopUc68)Mn#o!<*;@t-EJ`Jf1jlVWSYUzd5`eaeG<-a{t4&i`1&k3p>X-8G~NJ0bb+fok#gEf;XpFtcjlLk&*Pn^;<4j&viy*}ma> zrF`?0?WUsaZfomuR?z=2o&m^gxrgv?oiphu$DBr;V*nPb95}Vm)tbT zm0_eWbpfXCS;dqe;Ezd~mq-u!-}2q|ba+tsAG0iwfC6A?JqWaZ1e@`WP{viUJGQhP z8k8TDA|;0x#H*V52J84@Ko_xQFw_=sE>+FaTO0NQ5=F)4PwbZ;GK0N%ZRMrr@5&WS zvEd-CzrTw1<0!@Vy2siX6V1iiWVM`)_aHYjOis!tV*LdfQsO~|u{_!09XpVn6?}Q~ zGINLY{H;IB&DX6VCf>VX1TKiGPo|t)3bMrT&2aM~w}gDGg~!?_Li}zl$PYV?KviF`OR0zC!_3gA@stpWL#B9$&`D%G`jTlAOD6A`&TeH9RH)!(TSS- z7DcV2G}++yPT#2I9gaS8)Iuu)qbUXC*L+?E7IVI@lx-OYTX${-s&!5g^Ln;F5>eblph>?ZNLC&4k!_ARI3 zNaUB?0o?BmlC0GM#I`bX!~W^Nr3N&Ls1k-)yOoN^79+L)1UxWO^;6tjzJ?e^w+a?J zgg!CZrPL}*jIMD~{h)k84m60yF*Q9^JAQ5EVx#3MTr$gEUmbLSqDI9+0W6;opg1wH zB%SO7&*P~>rwR6?9$cL_ruDK64SlmF%0D;QWPV~gC?ms;4dg=q3G5IqJbgolebn=F zFucFv$EMA+7C?De5}CH~^}RFjkk=xii^5qs%`~PkTlxhtPZHE6gzGJ z3jJTBrIu$h?kpov_ONY9yg@1(ko6-yXqk zgZXgr))w${uu9;WzN8fveH)6%tv2BqQI>4u$MxqxEqB&=E&9;aT3GpZH<}e+pqTjYsG+E*H30{aXK=5!Oplp+RWd5pa6t$M5ykAwo65_$tuC&do^DL<6`tW0nXlk#F(|2&*gZNUbWjTVd zS2z&tDSX_A2h8egoY-7aM4B1`lnt$DoZYRPndcmLKNn_2Q{Hl@i)TVNCx)loYHG{@ z=HgvPKJsTz;zKVHjbO`9iK7EPPgX=Y708?_~{(4KfCnCvJr76*sX_Y673C8nRTm7W9Z{ zo)%wfU&m8}wq)9fwn}};yUwMqgI;TP;YPuyZ1QS}X)+Jyuc{imlPL?-b z#9<+RVs=VNp8o<#gl^vdy7fP^eA`m%dLP&X;*&^$>j#t(AKd&!h~&{z0B@Sr5!`!kP;pvIJ8-CA1q@{-BqxRWW-(?Da(3}r>@b`0 z3LAN&D{3-WSX$YT0-POciYkA$QmRW>1o3}QdwhCnRe0i%$OBLW-(N}v`o26sw@MzA z(S&~`hW2XT*mH;wyDW(CQgJ5t$@NUX{{D{UNsUU1WkV!OirH@|Nh|%Sf#I}AStb0Y z_BLUPee4fSz=_WrnWAu>J(9qZakhQKOTb#Q-;HsL#eP#`6*8BKetG{tbgn3ysStg8 zQpryqjz%uI^OZ7H)anJOEAbFCX#L>9^!~zdE!IZ&{P+GTjtygjcTL9x3G?h=(VoZ4 z%k$-+2=sCmCd1BGst7VovU$-F2iD6~DZ%+J*1P-38PKz!|U^VIEdxBdHC<(2P+f6Yh{tmfF6#ZfESCy&q z`skB$C7G{xhluz*+i_;;Dak;CnL#v4TQ9fQ)MpG#y#LP<&|~cz_*N`ng-{g#3tah9c*xEX%Akiuv40UC0#du3@9e+rNxNKC92<(a2#l~V zo;;RJ2k}|dFEP7JMOAs5-!R7V94`(GxPH_kd^8#lIZC$B4tRpQ%~#x@^GKOy)MB*Lw7#lOB^-X^Pjk&uX`Lup$^9KN z!{Z$oD!K{VpjQ0!lVOGpLfT^FwZhurLbS#o@0uld*H1CNLeSxYw#FannkC(;RtV&h8%Lfx{ofVCu)BXWhAhsb40t~00?9ln*AK`xFMQ{neXUA_3QA7(YBuB&QkVl zvG^nKv^74*wGhEIM&UknN|h28_}R?#OEDY@jBa%LZ}yVp%$X!>`EI6zHl!bO>%CG0 ziE#=qrR0IBTO_GG!=!C!wlcXj*6p1E9cbqaCdW4iOQTjjmffD%D+%G4Qx~u|`FqQ{ zG99OumNpX+1bzfGV^`$(lWU<)R?fTGD((UJGg_>UD{YbuQ`7 z9~c6QTNkS?&@mpX`cRNFu-=jw6EOqcV+b4%ni z7~n%I|D`Y8r^bdB4Z(M(tku7=bX(jG8Gcn0cPho7WfhJY4ZN|G`f)A)_A&FK)bZvu zOhuIt5*6$a_s9A7$>a4~kyF4=nv=pc}R^q0UZMkqFfn`ft4&&+D=%op@-jxyN=~rJoiiRsfXzB-L)^Q>+7Rz$1 zPzcwD#c(mq-{sM-Zt!l#0u9K{fbp@9hKLQuUt$EGyMhoDAk^8PTB<@9ldhBSH}nD& zp^;7$_~hCxBN>IH`Wd0^As$}d@8E-JHtvW%wc)4gl}JA{;|}>4v~zXy3AmO>gGQ|S zC<6%B_)^*k8N67F!PWM^o15XIg*D{UroY6bWGxvHoqSPRT)RS3)Qhm#;gJ-6%fTs{;O9hWl zg2Inl1AsC+OpoEd&NvaQ74=m;9EsdEr#5eATklmb!rjLpH~7WK10h4mB(l`}8@)dl z3Vhl%lGN?nIr@Rhb4Wii(ygeo^oDGWokNSO)XE&{xw9Hiy@Cs6dq*XyEp=?xJMBTT ztM`u5i<3}hi4W+rpTWz(9 zY9Z||DxnGMGB@0Nifpc6iP=fF$t|0Y*_dOL?AL}bk$SsI2e$O4P=JW@ z^23w}Mq0a{q)913=c3kRp~5wLxX76Vox)8h-a%spr6mrj=ood%eHI^{dNzbG24!YG zh)0{OiG>E+`gXKX!=}l>875*t{0Mew`)HJU+<7Z{rg_d*nK7w!I0-k%U;HFqWG}CSvs7sdTym%KZ<69>MSmFITHMbOkz;wE1`BrM9 zG!_l*+~I|GOgu$KEY22Zo&iDfNouSxyt|G>oXN2mQ&A{~sWnHb39+Y|l~pzEL#(2b z3uYhtkQnC4QOFg)em70D22w+2F=gu<(r4+x+`nPX3_kPPI%HN_g-$d0ZBaj-3S%b7 zcyDltZIa;#&LX$$(dOZ8JCJeZJHWu1jWvck*i^OWx@zTFexik(!vyQ4oU8)lDQ3bG z>LOi8o1=|yIqYp3f$_eCh(T_~Q*W;&?R5L<=FycfytTy$6{aWAQW(zFfRz{T1w(M> z0Jd6Lz!*GL@-YbOly{8NaxYiVpt z-6s>2WePqfSkT$Zq9CTF+i<{)7a z`Mt`Wa0vDjr39c$MDY0%#bC`q>p!Z)jn&)Z^?mp49^^>nrT^jP$(OQr9Ryl@idi@7 z4tP1hRrabWwloW;fc0oMcXI<9BprRY?y&KWMfR*yBe_m7HVp4jCr76Kun3NV5v=*= zI14k&pLBMZu+x@<@mM+{5`_d?emLqp>3C{bs=`u(?Xdhv-&5-D!v1CCqw{wd8ssxF zsolC0=@`NRvLP|>wZoY@dj2p`yP`<*IR44`CV98`V|kCbNI=NN!{ORsf%li!%We7q zzvRvzVZ*sUS}khK%_vDI*Yg(^miHSq0-!xcyOl zH6%5)Y;^+6EEQ?_2OTH^^Pu!0HJKehq}l+<gck%~;Y!L=(lO6ZJ#r^0YBKl9==AADilmeI{5&{OH??n@AzoQDl{{H{d|Qzl zffVUFH366s%+@nRt=0$l)|53cXC#aP zNX2K@AIWp5WkAQDiY@U&igUjjO)WaWMal%G8s`K0Mi#lOKS|qQW4GKO1B!i#{USL5Bn&Hf_15r}a?FO|DM6DmTXLku&X?siz(vpl(P=5${ z9>cu}3%cIkzHE@+j^gqi3k!#V3$p_^uY|LtoSI3Sy!pdl7qejb)-Y5C90GlE@vVUH-N_T79WGJy zS9K9~Us2!n(DZqbI85F#xV<|w;_;(nk?uLrku4ylcL=-SoW#i`p1!%)i($E)o93$>#X0tKpF)Q@K7HjnOm%x9>7X*E>t~{vJNS zt~d9lx4pILrJJLdD+4zP(;okOCL^UjBs>Njs24JTO@$<5fIG9}Xjs5-i;?^0fVbtg z?#<^nCRhs~_{4mMM36Id&@ghm`9x&-misD*po{Ok?7K$)YXCug|HCO>z=xuM>nDP= z{X7XXKz2^|?9@gN=&{T9((Y{RV5KN+xzb>7|1OVW>!9}+f#_|DsYQ^m$g<2Z^1|7A z*W0yvh(C~oW22`_kh>?yzdD%ze_+{pkvz9Ysuef+G-IW8m?DIX5f&XrAU{04Jl;1q zob9;l=)*UB?>`HYGiEFv-}E(NM{dzO-?t+dTlRU`*=lvH2Gti>QDGOBP89AA;;8qK zvh=@)wB$XcN4xdU1r{J5=qP0IS zN}>M@ieZJ-GK5)lbuKUpt+OZIDEmSy^yoJRtX;4zHBi+yl-+Tb9Z)yE85+DMk0TU} z5_+%UI5BI2t7wecgCx{qg{r$2lM(5f#~7=s39|3*SmVBK^_PxUT?67EISbZ1!x#pu zapdg)5gXiB2<|o^2%lt>K9Oy3E%yjY=ogsX@z**o1$>rNn@i>o)~@Xq60A(r{x4$8%T>X|3$RUJ3*gF!YyJa0qf+^7du@| zJV-AXjai`IE6ZMyV7ZCZ1^ViVa73KU3Tg5Er&eypzTi_aHMR{C{tv384=u05EW!s|a< zvQ9G#PYTU=;;tA?His8Mzk4!yUc1+46BTp0|LPL+bi_E2%QTjz4;}aQcsyXX{|Mzj zZ()6(`RcA_du4n)vEL(1n|vCb2rVgoNA$^V(c_*_Cr9d@e-q_>nFt$6?7_>n<$9}D z_@Z=hg1#6|6C=OPSfo{Ie}@{JJbh;L*2x^GuOQex`tw3;k}^EE#(-J5(Ds0|lTi%b z9-`4E@%Vh7qSQeOEp~IE$8rEx5y1H4CZkKLB>yu~3+1Kdw3qkK*JN$!RL zk=)on*tFrLK7M@uT>g7WcQ$I z79N6iED1M^2du}b5JcyUrmP>)Aav!UlMwc?=cSYh$0XaFIm}h&>osjU;&Lc~QbbbZUSH3W5gegJa~d<)4P z(F}8xV(dxm^}T>)Y2fC*`CZrNrJ#zL{J zfZqD0*)iZ!=TdV#dRGD#+pRVJI_GO~6~`eN;viCA<7m)-6@*m1qNAjWN9%KWvmxw4 zGSaM9anreQAogG8gZ@Flk`Uhu@g!=sIuO*hZX2j&r&IABM>;4cP|n@2dLL=_#M!j8 zr#=3&I869f zAuh0NUDplWvk7s07eU|9Frk*=ScdOFXd4)!aW%;Y!M;dbwtY7TIx5hM*uG`0_Xf`# zTnnR})APa2oBl6`p_#S%+e;cPx1*LC@)=GGE8d0x>9CCxU>bHq9stSP-HWDh=#C=B zu(1yiMUL)z!18t5qKKHf?-PKLmZ_-~*D- z)m5kyfGo?fP2jmYG+f;=49l`H)F45YV<4pYCM2#+OspHgb~Mv~RNvsFJRk|(Z>*XQ zYIS2(v~MZs5fnWA0Fu6`-y1s6GR&6F@&af>CRi~CYurTT;LB9n=0}p}c)G3`rh}jX zd~Ex^X;bJztXrA~ZHo}i_bhADhq!t4i?!1Q$An`~R4H51s^bNILq!eUGP3QWjWAAW z-6j=plZqQ874Q7@um8a5U;nzZBe`Ygf0ff%`7r4XQv5iNYCiIv|J_wr{rlevs4bzS@f08IY` zrUrk4Iy5ZP1Uj;Q0?>q}{*waM?zzFgoMkxu39Q}M^x*y=|8Np~peYODXji#KJ2*+I zKV@>@jz^{6Onmk#k3@Et5(aLH(|g5_Q{^hnsbCkjGmJ-cSDCZqHr}} zw>|-ilBeOA{3!t0yr3YvPv~w*-p*}Fi`{d2NT1!Q5A$!~{=dZ`*J?K*0G9552#|)* z^#0co+V20y`1e#%Rpl(9(TDR>g(Z{(en1owM}9EKQxW*sd8+)EM@4!kZ+uCq;?gj_ z+ldnz-6qk|2oLD)j-m)$mjcJVk`1X+G*Czw&?r*^-f%}zQkujp$l~;VR~ZaR+6&^k zd?=t)3Dp#@l3~6fGdw6I*MG4gMuxfT5)B)siwJZKth+j)1~Dz)1q1=d*KDAf27=V} zG-!H0!j@;+u8s`XA-e5qpfLqW9)?O1hXJ|YQN&;8;*VYB$Ulv<^OQ0^pdEqjW02C< zIZnN{vwjz(bie@@&-)m6!zr(DHo#V&=v&wWJ*h)My_|0idf0&w85XuoOl)M?E}*)J zd=GgTAZlZZiKaW)*NBg>fh>pUE^!>+fWF;`hE`LZr16NWb8Tn3gj+n(73PNXT()10 zYhspBPw&BUdTq@mlzPa-re?bcLeDf@liI-3v8H(ddc;Pq4XLRC&#gx^qZZ*3R&Db!Gv$nHa!Y!WN3UkBRE!(fgwOCjf!0)0|~%W*t{9mgOJ@O0`LmTCAzfY@*y3+RTWAzdTbrYh)Y}(>OLSy2M*Bzw1MtnXb|Gth+4oxnD{;hu89eT z9&vpOVH3c)>^swa)2ZGWgt3dm@f^`i!I2W*(liY`Dl9Z9z6@t&zfp zIV)OEVBzg(lm#gjZ4{6CK@^CEQz`^?$ben$?;RiRDn1Sw-Pz%$S{jETO)I=K!fr^5 z4O@QO+fj-yyj@|uO;a&$s&K2RC%*rH!@yHwVVN=or<}kfjPFM@%APA8rlUAwG*jYK zVHwV-pNEX{!$BHeTQ(ZRiF`YKM9gNhjToR1;!#`WlC7p}xEIObe&FCzOF?xyYKuiTkqXdH} zPWjde82_%MpKqNrO=Xk285&o{^5x&Ji$hV$=s{P#t4a?JkL?C{f0 zs^b%4^0=66HJ1F7pDz^2#erAK!h+>SBOG~uVb3ZNT%L8D8-;^ur)VU0)GP{|4%iZ4 z{nzNbbZsnb)wa%LKAa?Ft0w+a50eL(rWtx*UU%*UYt&y_l zc?wqE#A)ywpUzM@k3D5C&tgV!NYg3B04gl|=hxR+5C*@AnLMW{p;5+pnm4q^?M~<@PVbjC zm80I55{xU!0il?XIFGW0N?6fsPd1yoMNo(hdIk=dJ%_G%GdsW8AM(X z4Hiy(>S9t&_o3i0#n?#EV=^|GYt_{HqB7E>~FY{)3W?m5e+~gJi`ZB4O?o%Zc6iw%RSz zJ5;G~);nxp)$Jd9u%9A<6l#u)^Swy>_`!9Tt7eqW06dlBO(H%}bW$*lm1M@9j#vpHU zm!=WTDC-4r--`(oH{@7f*6L6_oM9CwNm(SLUt3kRTvbu>gHbh!JvE5@I33Bhe3TzJ zX<{MDv7VkC9DY6BJ2~7fOhP}Pp?5+3^6%o4bDRx##Xjgou}AqV?Cg}QTIzq&WpsiQ z0WYD;Kq~)69pOYRR717cZ!=Bh$5k^`*%yLJNzx!rgX~@*A!bt9_5$ChDQD@7i(|pu zu5{8cGNfM46~q#5pM#x>E|jMVyJs04seCLdNrNmPI4m{JFpTe5x#zh?feT?d#wuvt zss60c;=3EZxT=Sv0ZrqasbfMGVW;2uf(Dr~jG0hCIooIa04zT!t(K2N8WlYz zNkAdqo-F8T9u(K&dOH=NV)p9brJV<_UaKsFu>9 z%?g)`tY|~)$BsO#`^7;m$Szb@PITcIM?Ib;321M|6#>(bU8;#;Z&TwL5m z$_*7-9XCv;aPY6Bw&2l>rlTN|Lx@w4rak2i4QpzNLdF}Qw=+rPf|1nxE2Qy&<^e4m z*D@-{xaQJ&p2jYni2|u=69FW(mJ(L#A{D*0&%@xBMwBs?b7~-dV;N4fJW&(gJ?lSP z7V~!{0}85+3sg!nhi=|xJ{CnOX{fnE567X8a02a))MY2*9}^C2X;pmVUwz}J9zT)q z0yY#NWV;>csW3IxTs2~7iW>P&r}1tS{gS@nfceD32Q z%u{+bOey08^KZt!b`J-gc)i+Y^O?Q+`a!t8!oFqqHtaq*Z5!tI`N)4XhQE|<h#} z&XW1e&gw`v%<2X1Eu*(#^!lW2n9b**-UO3RGczhaf66t=fGH!2Bc^cE9y0|iBm6xW z;*Dd1ogJyM;)xjTq$)1f7H7)c zFd)+5=?8pk#I;W*mGhsOQbVg0&)k(BHRUc1vW!N(vOB3KE>jazD%>}O*1lA667;#P z8phaDxf!3Qgt9(YA#Y*-X=Na&@EJEa3MzzusuCDSk;hG2stn`1<^vhW!b-2Ow9qVt17Oe#S%<}~T;S0YL!-<5Mg zl|hOL_46>ie0JLSd!%qKH_}vrktb-kU>0VN+qxlMa7Q zrjXk;6ONmbEEokLPD_{m&zvQHF43%{dRIiCgJ|X~n+^UH5Oa>SG3*JxDPthw^a)0s z%rYGN7jZ@ekvufmbAB8N*Ly~Kz238$a2BBqenO07!V8WRSfY7eb4-e0NgRduhU$rw3+XA%eLwgv(U)hNT)KcwOvGdY+#HnEDO3cq) zb9-Q%XA^nKfM#Pk8AKUPIV)XX9E)#-R2_#UYNM9~?+WZwL#o`GV~Hrzoy1V5Y$X}9 zn-HI3)H2LFq)II=A-?HNuI{%n>Ti6-ihOnI6~;hq8LAT@h^o|5=`pQY2tmX$iajOv zYyI%n-xASzd#ykWXn# z|NTEZwO$u0cSV~f+TFP6dg@()XR&%$W~Ve)@5(8d5T{jM&r(@hfUc|G6=)X8(z2Ha z*YB#yU8dkw;nuiJ%f?Zam7|OT&kOHxO6&9aD)>&l6aI~OOP$ToDR?{fCA4f)%9t$0 z)DLdz-`vlCgBuGQHZw{ivY1ejp43FpJyk9wa#l}b5oIwP(V&j7N=$kp7OGf+ zr%$I&#$n8|@u^rpVZ=A%O)5!$6Ekr?KoB(^8RH*LjY1K7qXEkft!$QTn*+?IX zxT)UfQdniBHqiTPZM!P|62;F-Ebaj;*8F9=5f7JynRUNSvLabs}ah0&T3fG<4mVA?iKxK`-KqjVhVqQr;x9oPXFaSpHAwC$0t^ zRvT+-yo*%4*+r@a3ufYqyPOk~ke+|oe_s6h=KQ&m+>+-C9VOZQL6AN#&bsI0-S%9Z zQ(X7q>>)$swLn60TeqmhQ;X%j*F@ZH=3}W%{l_2-h1MfXrs%#ZNRSrxxU}Rrp3~}1 zU4{Rna2aH=Jf~#9KMwN|EseFwSZq1L^_25({r}|Te2x9D*^qvf;D7)2yl7gaf%BF> zt3MZ~C#(15=Go*fk)NM%ie!g^IC-f-d8!mCiM5q0oN|F*M>`G>3vlX*{24Wl!osmp zCfv>lN><&P){HbjvPkC?aFWJx95s?AK_6zxJD)~Wb?@k zSUF?f95A7Ms9#=PetSNVvr(a-=^Xz-F|JvBd{2ufixnC&Dp3xCTN)`$j!F({7Cw)J z>y~=TUutAL6RaswM|l`NSE6_VlTb%RI*JGj^1U;RD^JC|(a1jQIHVb+)>*yCPPxPK z>S{`JaS=kH-vcH%l!Q1KJs&T6k&aS*&o|zLbyAD;l#TW|4$=92oTsWlS)<{)aOIIW z`bSyvQ8+KYO(6Kzt6c}i3d>zpCig_FWXsAX@Wvaq^o@(W;#5{_5_cS{t;3g6Ww|TN zhk`7*xzaengCe1PLM-lyI|e6lz2r$LAhRjfJsGe2N7S0HWW9G5uyV+vJCAuBISsGJHWUE{bK+OBdzvG*|zGJ3{U*YWVLhE%~) zIL3ZOV>t?b@K81mB`lm97W_tc6~}R22NiPZREUKUBRP@_S$Xf_!@iOyain}3a%C)! z_~PO){8k7q-f;T%@qT5Ol!s5r8GJE@IOY0Ec1LNX;IN*?zEhj!Hj`YSrX_b8@m$*dCSDM4JD&|w1N#c94t7ONMqDBOzE`#5w{PLyf{ezsbZ;DUF zLs-h7xFuiA$8#Z}2#(6La~!G*ev|ueB+x0vXo@8m^H@=)LwTw|$!UKG*0{xK7!O!S z-nhkSpM!6?T3OzbXVo|fWn46_5&0BX|=4_PwfD2r#?w@aQA8+fYd9=I85N@#b z(>&VpMRUHWs!;7e4vc2!|H{>c+=29NF!>f^brUx6<{ukI7!J>h1Acm=dfSI^S>!YZGn zwWNwKR4roV#UvM3XQfLlPD@9~27Cb8%~E%)<*k&7z??DockgVY`}V@el0ktBv>J9DWDFO(k7& zawR?#C=*JAmuC%ML@8UO&q4mh2QU#wsl3Cx)kjL{>5>i#9f8_c(hEPjSIa6J3;3!G zTQy;=vTYeHUBzD$QKs4K$eIgnOonvAa}F6VlYp0BoEF0xSD^U=^Y25m@7xtHLhGxS zyQtjLY^`PE)eBwp-f)$tv2Is*k%02X0;)=e6mvAH`(Q{^(w21*#PtX4*q8((=c(@X8+$_<|l>81R=MgQn^Ape?(agZU!iCTQ7iX^{c z)=xQKNDn-pa1uu>OK~8|lD0a;WI?PT8mRPEhT;2|v0xC1G9ldV?LUpg!wB;7)w3P` z*X6`jtQy}j1^XhK|Gq|(Ecn>ETv8L#%HC8Qc`A;wKrKIcwp0E#hsZ2W;xHcEUnYD@ z?ypH{dACwrsg(CB%MMf~dQiuc!4-u?-LtBA+X#QZyrFly%6|q?Mh7(gyI_wJ@EzZ) z|H-m6hz9bTyCIFPBZjkp`Jz_U)b}DJK3=x}l#=@IQ>Ab+F$q~57B^1V2G&gA6zem_ zE9Ri;WU3k@*U$ID05e)8z7$#;jj}Y5pY~}+`ZAx5&sLIfv43=4CPK0c0wAS8MX8izs`8{v zX(RFIN%`5`-Cb|u^PLH&Sb4R#3|ld!FUx(i1qGgZJJoIA-5uqr@{uYz%W)XqD=8)M zXhb7V(6p%9UI#xo8Z;NXV;(k46c@o4q^CmT`R^`)O8GlEDI?|T@mtJVL2J{&QF3U;LF=9gTh{1#f8gp z)WGscj#bX0ABSOlCraKvRYEQtNROEkQ7+SQdM^u!7S&Frd69TMFucMR1^zV0Z>ZBoA)RM(aHIK@jF^Iq8~5;~q&ub{=L zQh!0LdSRnzSig(2{G~bBZt-o=qQkN6DFX){jj{mC4633KVd>Z5on1~`Ko`4C#m_1n zT#+q&P-Tr<>DP|)L7BT;>WY<{MXB136P0d)Fuc4AGBT_Mi|BVz<=HEWRI;x}=eK&5 zs5b9gbLuv4DHZupYUSC=8Jw!xw_pw@7hai$n$D#N!&N2FPBUe`Dkok|L|160V z7I>84v{rX-?9~z$!Gt@ju*CSNA| zB;x<|I0?nKQ7mlKiM}`PN^S2Q9hKsVww9nN=jybAP;3 zqegU-Gh_U?+-w1?G>@X$nHbBgVEib@952qK#KY13lG3$x{FU4DA;d)e6}~Rgq6Yt< zLStg?YMmAj%n1EY!RbIySl#*J7F)nsuk<&m!Yd+6f_s5TUB~rQu`n*~&}Xrdq_UHV z#V8RGQKVK5OuSQ5xo1=r=aqa>l_-vCQec{Z+BZ*%blQIJmhm3zDU)^8r7&|8LH-bD z)w*)!fuH|F8cmX%6)!g{f&%*xMG|~J$*p*R-VX{1$%_Rsd0OiWIR>e zrBqVuGom6AgRg=gz-(#LQz|; zFO~f-)0Qe4o2p7mb4{tjJy%WYs1=Q0)b64aO}#e#7#dM+hUe)+V>P9AgG@5m^~EtC z^>KU?h%Y#EOeR}gRkz9o?+mKzV^RYspeAt_qX^^jc2IR`yijsDK>x2j-e9i1UJShU zx&UamFRDkWYx^RNbItH^;q~r`52x)-6^WcvT^857Sk1XZ@5w>yW|x3!i5`UWlreQJ`qlFu{jcL^QqN;={77mqOTtEd004lg>*6N>VEQN0Oyei0L&Gvnpd;%i zfHX@-KPlkBNB`4LKjqx~{|T(!*Yx22ApidP&;DO`#5qtEQV?cI5&Lw*oF-`y$qF39 z@q4*REbCrLRw(kNib_M=-Y?&M9Y3Brsgd+{{@VZ7zjprl&njo=iEPjtCisb>{)->M z{M*1+dLN|LP^y#46?H<4+V9Lx1kg)4*hjWy}!NF}1`6s}# zeh$_sht%nZ`$^v26`dgHF|AD?s$)jKV~jq6D8M{C2V-27N1G>2-H_g~^m_m(SSLx= z+YZ?I6~^}N&eH$F4GJq~j0ylqxSIxwQWks^mI|5H1b~tj*#bo>BY_$)0CEmx8-SvW z1YpDfpgavcnat)%SDlublcUQFH&^VqoQvx0XQ4Q=B!iiFZFJGm}y8Qr6wHSkip%71hjr{RD9-c0ukdg|=|Fbr$&^`>Xf{@=_YL@-WnyOrd>Hw%!ouQOf76p?25tW$xj5N|Wq_NaH9J1w zVoW78ykxFrh<{|(QfK{(TM;d}z@GI#7!F37{6FYVCQs}CF&?u1ugFT)Lcxi}z=KwC zzY@v@tP5Do7TYqWq0Xh4cu;CXS$QdpmIyq<6`q4<#pRrn7eYuVUaG=PQM#lmFp*yr zppY<7sfq5VPY0rO?;9EiNIGwm<0qBE+0m;egg`}u>;Ob>*Hs`DI5I5XVZ3nTC43#Z zqC=^q^ilAn10y`(ydeWj!8zd254;?Yq8L8C$&N-soiUPACwWX9@T^iUlf<$=AnW|M zccdWpnwWjWBy)_$ z6=tTOCJKRp*@RNdd~*-m3a>ysiKUH*UlL>C92H)f$Nvr2p&gdsjq*{yMF5qGxcthF z5zQ(jEV*$hMKrM84?&j4>5c{PkW_f7JyTf8XT9` zeQg-4DFx5xH3KhA7ywG-wl!xWxr@o5HhH8DxLd?0UPRIY zI{Z58I7Jhk5}kplPiHATb-BBf(5f*VQyFofnY2d^lQb?7G_Sf*k+u}VP{0ccjg-EfHVO`@lHJ})d!wPCY38PQK=$}X!tt0<& zukyBMfP3Y?k#7I#Po}dc`R_3vV%(PP|L5$cLZ$T|*n~JXRjN(@MHa)fg7 z0vrM^h<&~7e!X>olZUiZKKcMuI+y0ozGE3vo24d6t5p#9Vx-AEr4cM>XqpUFnD0LV zLTUa(9Qr7Aq;`yC(%*#EvQ+4wHxAs1mXS5VyhVw_)O!6%`V z?8ZGdg%SeK5vxt|LRBXj=a0+~NR569Qi^e~xXkO`9+8`{+ks*jyoaH$nN5+amr3kj zOQwX%&Pru1M!P-bX$_1!Q--aUJBba3nXsOe%pCVKa>#pjjn3eIZgvS`VxRQlq;cQ& zw}&LX0ZCW3AGQ@mJyEWPH)`kZvpX=?;s3(n@$>k9jK-6p&i@C)C;tB^58?mU$crN% zOKg%8FqZbXAQ#5aXSw)tEl8e~aE-)-&{Z(RyyUZiqIXa%(BqA|`RZ-fA-ZqKq;iX43Xh1ezwLZ~!je4l* zm&zNU#;evxjn~+N+P9k^^b7yYHB4kwO!i;yyeMyNeP97v_`6p-jc+~G0ln;_PJ)n} zdS1MVa;@ybbf{w@)B>R2Ol8R&bhIN@yB;qWEKvb4?@}y4>}ybQ>Z)k3D0iRcq`2G; zsBTdyTG^%o#(vDFBSTO2EU0#Lvj>?trTJUJI-Nt$HZMzs$wkVVW!dbjU0zuFTwqxw z(wt>snhF+ZXr7vk%Fqm}+P-AnBu;Y}TCpmN@Tyu;>ioaIMWB}axAi{f{jb5WKhy7j z&H7LGKOW^N-T$~Og8i}FG9+0++uI;y-!mTuC0lRr0T4eixcuo%Hm}N=&&xJSTw3go zhv+wOC>%rxI^;WL!{kMW9p#W}a(ZL^+~b+lu5^Zkk?ZOwLppKwa$TgUV$vo67!?G2ae21Hygef7OO_DX3nvhvA&8s*>Uy$P{ zL0okiwRkqwau~I>(AeLz#I4IPNuC+}nf$>`-F5>f1BfN^`wic>LF5O~@@W*CHIv36 zVu4^_5`3S=o1}vB2RtZ@ylxsFiEJoyz-@LJylchUL6F=7RJD&>$iqnMW(o9|_vaM~ z5zLT#!CxEPYR$yuxE5s$bRAkHnLnPMSZDvI+If2kV9);FpY-+f-~PBidfNXV<6-+h z0@sF&h-?$LZ`IsxW7v!Z&!&KXA3jaJ<=-Umw+$+9V9YLsSrkby_L8Ajwe0`h)R%he zpRnG~<^MYz_e=8sWb(BBALS|8e|WN_mi8WDNUm}K=0Vu&`v3CC?~(-z}v&eZi0R(toE;)93*R-3D9CMv2o_53`LJU{ul zbf!$!eUq}v+w+=F$$ieA6?0K{_S`cWOU|AGhtK5eDWP6!vdYzy*OOg6HIn{*uAZU? zPoAD_o(B6rq^ehQF<_tkKhw{DhQq<=>HhblJd*q`>(`C-0M&V+Y`arSxGZCKwcenZ z2#opz-~{LA6NmYwf+lViB>wmp7lQ-4F|ga z-+0=8TK|vnw21$3&8EXcM}SgXa#)dPTOq2mr6sWNJyRdf=tK{ z6+xm3@B{LqFEj{*61(6&ks#hgFHwj-Vx$q zVi;^=ya!RrI)c?e?;bG_1KXf48ZP(h_zk6HXA84n2=riGc2AKPic#AZN6t4~J}G#X z<}3^)s<%+E+4VYggMt}`ux_D#YICcQvrzp-O_}S^FDAuf`Br;0LyptW9%a( z^|HFYE|6@EG51!=z$9Smx&qe<{=288%>p5|Bz{CFYCENo+#IA*+!isMR z|4;HM?~naox~F6C0d`Hok0t%34j(Jgr~}lm?OMds zvWy}FT|I=dqcXdGbBlK3Fon%r2RM1UK@M<8Qt?ZeuN>fX@oSQ4$?-N>9Gxvl%sTwc{;fpM{|EE=cNCCnyOqJm(ppp^|&2J z3Zo-8Q^&&F)j*Q0;dSODxi_SIAUMkKm~QdzIe4~;vs{iH#h{aX+SW6^L#k1b$}Y_o z-0w)Ulg(Dz7eNmP~0K??44kF{X?`}dZE{;W@H`JYJ~bq)mf z`Txvjy8qvJ+JBP&ALS9}e~O5pC$47afI*a@wDKUZN+QO~oTWSz-w#NZ>l5H821EY! z9Dj6El*Cz($LS7y`gBrJFo#R<>61fYUT(sW2IJ7Ik!qbp6e9-ha+Y-^!#exP+@|{n zDB7MJNZSL;$z8qa@It!rnb)Q!B=L(VO|)=VG8ZX@89!!ezU9xfwqlIAQ=-2JleKe6 z&QDm1^BrlbN2@R5R2nm5K6S@-P-(h3V5AAJ!$^7i96Z|+LYDh}Yv}M+?xfi?M0WX; z0}e@=g`k+~c%N0%P&Skr2x>_h=dl-uC*bDn@&KmGOr9rp(6}TyyrNNz&0XpOr`six z0siw|s5-1AD*zT&>1B}0Hol&t+z2TNXObzGDk(o=y@pwx^E6l!BcA+;`rS&twyt3u zg9V7w3S^f-UZ`<(%Y6$oG#%G1eJy;3izzAeI(jI;Rk#z-OXE22xmmXA1^&Abx>3@U4)BTS}c?ADw=Ip~1 zEl`RgFNl_48RUg<)6tYb5JY(_9iULNd4tm(v&H=}c8JEZ9^D8Hfjk>Xixh@%IB5Yv zRopaqbsSif%}a4kV3Pfhv5!u`a5BZ4K#taIZ|j0vv=j0wHE$*+5%$Td_eXo`^M4+0 zuc7g;PW zF!E`HirzekdfAHn-Sx;nS%^>qf@l#$LB89M^aC4dKI7Ad|BG(cybQ93|MzE;68|6c zpYDG=%475Yk|X&(rt?=3)YtC%RSFescKi}u_$*#urfu#s`+OC&sr2}2B#hTz|2z^j zk^fk{)rXP)#$)~d7yj|I{vYEJ@}Gz*PDi()%~u2#m%?Y;7qBS|xz%KQMj-wOllJ$t zy1YTfX4}YO%i9&G@8CK-0Uzm!4pH2>1h~rc3r9qA*yl5d6tZ7%ln#L+by-VOjqlJmr6SoTtqH@2mgITR~a>7o6Cj|MPEq^nbNj z9sOUeaZmlffl@E+bALpoUQCIHQtD-Te14^VkJpVrrnb)w-L71`Gr#De+$&h3A{96# z#}?ihUW`F1xr^9gs*WS&Pbq@_n<(6!fIO8$-L>@0so{%LIlg}!`^TUCX|w-}VSX6< z&tNvv&BP;bj!s3Z~cjWY(LjkKW(S~>=*u8Yp-qieeIUmlYYe_>BI?&XfD;(saOjTz$~DM#@+`h zT5e!^ugtG95JQ6pwIq&h5^-6>fC>HdT@bQJ*MC-X_tT?2&Gp*m%0pA3m2w|bA)M1e2AYK?%>jN11q$V`nF2bCY+MgG}{=)^q znawJH%r7y04vn9+{fG*`=xt+tKf7mOAKusOp@aE6?KNN4(~|!`Wc-H_7WVb{50fYT z|52XO{m=Uz{~EYtar(|ejtvPQl9I43F zo3}Tw-VKxzgW1p>Ox?cQ?+u2IIngyGre#umpw4&~G;4kK?)-8)RxzW^-rW&#i$$>= zn&@H~axo-kf|xLv7S*5e?<}u=ww=Z?HIIF=+7 z?9a@p*}Lr7i^vY$?2&~URAOp))3f}D&L8T!?JQB<>eD8nQyB_;n0EZXpz zb^IN0*)Z6m2xZx28qY~X%8R-#58XYjd^U%Qmh#_2#{cL~2YUX$@!%=`@8dk5A^wN1 zJ9a-;cF<=syQ%Bh{mkas{nO>eyVJKfKb+8r>e{wahvn8|w;#cLI!2NAWw<#tTmQmR z-N*vCcl}Sx_kW-Ke;((t+5dj#BmE#2K*lnv`G#~1Vz%xTINj5}CroxF_ec#B#n#vP z3>H4A&$aJ#J?QwiUjGd&K>O@J)6qm*|C7PwDgM`^JYxSZ7T0|(K*rTm*nq@mlNCsO z++zpQ%GI$1X;qrof+o`=%^F1C+}j>hC?(ggE>EvcZ{A!f7K8tEo=iq%lhGg2X7so7 z*RQXCKEFBpK^bA<252>(jEVU~wHtjFTgtemEoE%BrIb7Q?$!Tu_WJG1S1&JK-TeIK z>TlQY&M$u&m!?x0zDE0he>+r7+D$du)uzh+$^1t#&!F6sB#`&Z{-4QE^O>F+@*hh8 z(EQ#%fA;x*%u4d#a58+-{~qP3%>N3t?5{B7PWV5<l_yERo7n?BT`9b#E zpu75=h96n&6cDyH_E(iC3NpvYO zN-f~mMcF(F!666NQH+?j4W!=w(S-l=+(S(rz^nQHpg%6%{~r#APx1dAm+`?}z9;Oesfj z%(&4ToZsmc_`20RN;JSUOEd*kYExknxJ4xiHGy76^o3%1cn-*f{6Az)mdfhHD`Dr{ zZssVBP>wP$^&QYraVo5PHPI2M+_&LE4pU_^Z5Y?K5!8oeZ5)wx!@*eB8;5n(5UlS( zeS7;>!Z&EHOmmIX8iv1v->#Jxf|c&0mwCpPVF_B`QK?!)6%A&l#yX|`>gtTaC&9=D zi#m)EQYDCqP8JnN-h00|1*oLnIC%=uBDfWOE@qP(#Jx1$@E=+_ci@iQ7Fwus2D&-ExhD39km3R?V-gOo~#TXd@Oc1k(_&gv1+_@sTl-s*>M| zq-?-RnYona2|pPjG$#=yjT2v<>w+(6-*N35k`C(buHb~1DOv;{910wNHi0c+2EZJ8 zwgJ9)M_*qhGRngA&C#I7GjhOFCUg zOOVfzEgQ4=m&zt}A{4z5297vYgafTrbFl&%R=%j-WSnyPIg?qb;?2o)ic`^cigFl4 z4NrBXF0%SuSy`cQ?PjYUKlkq@#KFut0k;Sxra;^GS4XO($d<9r_iB%g6(s0+D9e6~ zeIzo95s_Z>T6~w)!7Bv)pVJ^mZz2yl#C2X0u@vVDKqAo~NqNcgI3@0dl3tYs|56$_ zK0f|FaC8N+L?{M|GA0Kc0%}8*c!pCf+hrKfVd#Kovb{o@GSu0on3TnD1y!k->7Lkw zd5SdI|GA+2u;+jM*PJ&oTOj8;ic6g+mQn6YOb2>%;=yWQ5OW2IGNB}Y! z?rT=nSh>C_@;y=eUbR7%M2tHTTkKGwubZTC9(!@94n+qzKiu40UJHY1wY`*+ohB^F zGH-=2omP3CWF`yae$k|rq4Y3LsiexMn{yU!vK*!7mre&9(r`8WV~6ddG-tLbSRM|K zf1>5ZPi0@#3f`$&Tl!Ew#4xsYe(CHf z`8tOFw=jf}htg`i^l2+qaC3HfV6p%gC5p})kkyY-j1ZJIiVB5vV4%+-5zQ1< zdlCD@x{Nm`YGt826hSUxA3GheQMisbPZoJUoZxA zNjTKW3u;v@zMJ`)tMIjM6=T!9u0>o1wPDJ>?4H<`$lrZ%7@|mp)sfjAx%_;{jWQQ8 zW!uD3#u3Ei`%H(buUmp3GnNiB$PD;tRs*fz5s`Xmm)6o z%<64P%9~+m-*nYdE3J~$;t0l(FZn(eBz*x6>Fz@db*R^$6=s!+D#s8ZTc`O}j4~J| zkKl6s@>Ljf<&Hrid&W)<=<;2~@hyfJ#_{bY0nT>d07qQnb>w!PqJ~rSOLFkW9aBBK zwRt8=%Cez&`NCLECuErcv0fAIAVHQF!;7jqyb*rYpiCcm%^WfoP%cJq^2$9@AS`>bJggjV9U@{j;2)GmdSu+ZNzYhQPEIhZp75grOAG&%CF)p zMc`hEVBkU0wO<;u>5JWlnf`gw(4UmO$xy=4b{z)#n>F- zbTU}R5KYB2u-$I=pm{(53Q+T3YI06na@$JdFl6Sc6h{7On5^K%W(_8?a}7sAGe9f0 zXW?y6X{)&AsMa&>8}}He#8bX)(y(;H;iT95dVBKqmipsy6lkLq{4+Kzd&B!wt3oy8 z|1g;MJe20WcliI;O(Or&XP^J?U^vj_|JmRv|No;rCix$wxe~mWd%K8>Ew!Cp#MZ2a zLqTc&Lmc`_q)W+<$5vSNk1-{mVXiR7yF!jq$kvGFHOp@gS&J8Ui8{tp;Ckq(xV39l z@l#T_titrAyGSujrvNP?9d}euqh{1~2!gZ|MQ=*iuR2D*D(3!D(%JB|gj*Pd^oBWB z9#|ILBBdS2?C;Un+211vINffS?6i%8Pd`&Ge0A^cK>4nid=S)Vi=w^(s&7snW?~D< z!_4*AZek_`Ih*$WhIW(?A3+{p=V=fvi}=#YCW9f~qFoilG}yu%)dhL?7}05;p3nU> z-v672|JfV=cTlqb4W9Dq1Km5^n zwB+zwV=ps!{T^c0x!z>?ON5fMIN3>7vtn1{{<9Pd4C_roq<>|D`y1L(ZwY=jz89mS zG2t97_w-$oq6|fO;r-v0RYv}U(o^S?%E8EiIt-M#gIlx%u`&$RgqQY&FOHPJk+8$l zOzi!p&8VR0K1$I|t2wEp&F+h%RZG$|Sju9Ff*=CHhqK~qR!O&F#+y9!#Y@$%UD&^s zcEF)<$<@i{N@SD7kj~z9BlmKV#%mExnuv9kJ=@cxXAC7WIocy$C^^-%5zQ&>>pu21 z>&h170m5PIQ){Iy7C|X)_W%z)*jCPr#~I)@qb67 z;Zy$qM|nt&l{0!zOTOSiBX|SorLh$3(VF-{niucm^frv4?`8>N7r1MgU$s-5;Dd18 zjB=DNpog+ECV`TcNK`9a@%AWlw*%LU0@sVY1=gi`%yrV_KjR<*&U4_jfNim()}=wi z?*9&Kvf27qqFvQy0DJxahW(QN-{2|#+oL=*$5I%^@4??TbHr?9EaOW|?Vvu2T_WnlPgK>y1ae9QYApzy+uv%1(FXVOp-KC(f|uDh24+1+v(A38}&*K z>sEA%UXOJc%L$^Tiy2Z7_qGE^wQpx=y+!F+yiQ2`z5g1xgJZ{FjoV96R}JOBFqoqp zDoq+yP0H|B$h#H9$a31=t{FLsV4q#>thZj5lqh+fY6`Mj2kFKXI`v7yZ2vUl|Ll%N zLkr+O{@*YA{|!e^{(q11$nqb%uiQ-Z<7XUr@$vX4WVTeK@Fd?^XiV#|iQy)Y%x2s( z48%Q663*YrDNmx^c-~5}JIhsUp*6~I)-Zxg5I*(l zLjqZjRdSUhUeNF@c+jovNoFjPs{oCEbRm0D=(kiPSC5~xs7Z=XhXK?Ja47CJ8$NTj zfqqhaIXc#RBZXE%wg)Shr|EKo3>?mPWQbp0T;sAqv?K`{JMO{x0;F^Ypg>p-&y39m@-ASxfaeHo zGK^;iAVHpCTRmk8Cn0ItM3sI;hV&kE2)<*9ARcJ0mB5wfTd9aP=Xme-&pS0Uo?g$| zo`QBnU2^o<+7Osx-k1Do#n`h;a*Al6-3DWrn9GzJP%9O2*@@S>3Zw4rGNB^UHAt(~ zTZw?JL}`j+e#m4;JiW;@XKRL*BGTC&=E&q+%~l|FRN^@7??N(7Q4$jW`u}i%^Ui6` zUwE%{w$4P>Q_qVxQI1&x<{;HQ$&@-5+Uk|ewrW9_1_e__kI&VTk)Y&4*s(#4)S!~3 zsVf2`iTe~a0a*kM^PZGXo#!;TeVTe)^0A}9=5v6Z-iNTN}<)dTe znBTmQk}%$_#Zjzg3VK=ke5ZyHvIB-_9Y-0mz$IU=QDd-K4s*2Fgaoh&@--`9g59mS zR+|F|wlEBQptpJWb=Glg7@4@Tb%Vy^>d-m)AHZ?R|Hb_m2P}T`qkUW6Z+=v)(t-=P zmn;#(@h>PQG`;w@`~9B5}0N0 zt1`ksoCDYLGyv)z%uO0rcnhYK_6r z+pA@`X}11(NXUn@{|<+9I`+LDf$TQ;^}!bFUxT3#VFYqMjaD>b4kB&DxP)TFO#5mJ&Z z!vemImJ;CFWDMcFOvO^OI`|42N|k}bk8o5nhH!4AVo}pLNsXUX>KcnQr8KNFb?q(H zBYjcdJdw@#RJB`oOrT|cs~GJWAbqy$Uu?tjdFH+me$#QNyAq6zRWcRBDo~nbw5Cyv z3Z7CV0VwE95?0V;B8wjf7qOQI9fM%eN#4wk&@U^8v1A(>?hwIB1u5@(1(`%!YNct z8N>D|C94s@47WXt{Zh_UA#-_@@>vaRv)U|)7{4p*r2d?imZc!J8hnP6!q8?VlcKO{ z?GzQz>#?YOosd{-dXttesQU@2U4?@YXF^l!PN6j>gx@mmBIty55|qRy{nMijeT}V& zg4rvH8DX{`MU$AFwSt!OkBez#KHHb_==R^j9Yz$_k2rbiO4 zWI`;}62(^^ZNImDTPBLz3I!PA$by7=SdJd__SM_4&|&VIK_3arfKfM{YTPfBAOb(%{8R!_SZ# zkHMfnv*PB(>v<4SR}N~LC{l`+z=wh=X?az%gGnW%jAnKxVdP7Dv;BvdLvWMFYnTTf48t91guQSvsdN4`V1zgzHiuVy-k+KYwKsi`>bF6T?E&GXZ_BbewoHe zRoj;Dym8CtqIGkD3K2}XsRn)D(&HB`0O&zcYeDdF2P_@0iG&KmhJ_%xt^3M+cu~7v zgZ8w(s*|9yMPnDm`b>i@j}cA-qG-HM=b$<(Wa$*7xFF>mUNmy5$eCFrxO5w-h|m2t^6f%6t8S%KH{B!n6w&{iG6c_O(6ENo#EP za>HWB5D;xli7^F7XOZQ=yww7wyw+@@WWfg&Ig-6rIE#j*0)uli9SC`^@&=s;DqD5w z&+?PSoSN{l-iAkEkWOR1eCJQYFfr6`!eS|xt+ZM_FZ@BZ>V-8?#L`(a`9^5Fc_8?}6gkB57yZc?wtn2?LPQrWd zu%ww3Q_S7Lb+tR-9{=CbXr{-1o{XnY@jo8rsm%YLuaK4j9=}<~n@Hv{;GglFrhyMK zkZz)bIaycIlN@Q(=_LhbBbFBBB(ZE;TV%vmQdHs$>qm^WnrEym z;*qY|&MLdQyhn=*m6!cg8F1xwtwZ`oQGFSd(xoR!d(^tb6j+M8{aVAPPX}EV-dH2? z0RX`oF4_HW)^ivpL4?lndpAW%oCSHD?!c!{Cze7v6j_CpAz=~tH_>VKHbdzN=#v+P zLHdMB<>W04!}$Fr|MV*JAe}jK8CgK!X*01v!v6-K3r=6ZJ^&y^8A;zPGV>C{3P)ai zl}!XSlMUl(3nQO4*#%B-9z?xt zQIEIqpTJwKV;_HC{>OXu8~FGU&_2;J3mEWZcH1OkQDUEyTc^8tg9kps{k-_@dOHTE zXRovWO*%*n5=}hI5)`3#m)RV(1 zt(vHQprm6WpR>(e{m5Pv07@kc*guS{^zZnzkpI}NV3gLq2U0En4f=!eP?P`0{o(XU z{(Fq)j^0VS!Ezl8A|M8rUpewY5a~BtrHe^+ISzw6wL#pvV+VE-(lQjHz*p zT1MnO(ND}Yacc_GQnK3J-BrjY`*cMGN0=@dtHysl1a=RHo9?$@7bqJDYo%7gV1c}y z$L$y5=lvn)SelEdva?26h9{KRoTQIG7T-=J(l!S!O-2KFX&#$Q8z|bIC_DD$_vbI! zd?VIGWeHShTgoyjzMgsh;VXe*`L zlqD|~mRl!Qo`f9CGXq%~woU%}E{)gqFu)}XHSJCgPR=q;{SED|(4weDR=;>()Ri*z z6g^U4P!(G5BYSu%99vzCy0NN!Xu>LbJe8e>xcq(};&R!hh%0sXBd)z;!}^i4yn^8! zm8zS3?R*eBLs{!4ZkRHl2pSE_dlm~O;at*aM_Gcr zV6h_&_9zIf9inI(q;a&y6yXkIrc9CIhnaVyXlqcXZt=3BnFbW~MYv2nyVX93Mfhx6 zQkc}!I+aYS0V+kmZGsf}z%g|%qXC`B@mRb7YnWub27pp%DSjkq@XL_&FKGzrfIKS~ zmylnR^s=;@T@8IbeF96-?5Imbq0|eGqZuM!$|kUwS!tjp(Lk&lzFemJRvUdQrIw}* z*cV_KqMo$4^n&HqKQvIYqeC;ud(V``XCS7sdsJapEK4@%8f3eYuKhsKmhT$nlNk0< zHO&IX$|ZK(1>#k~i4{Iv)G@MOd9DB>$M0JBz1qrNKCez3BUvnQmoWPE`dd@?QW_^7 z4}1_x;hhVukNGsYECP*LekPo;93;AcA{)&LU~C4PENW6KHc`3?=`@}rGuFZ-toO|U zpn($TxyVhrK^Ldj;QH+J^((;RdH8_1wnmGXb`qB?+nX^DH~@-=K=F~EP&g!JAMueZ zImLbyM+l^->`74o5)Ns_D~svdY$t!#-a!6jX#1l)E$n|u>^F-5v*-MG+Aqg{nvS00 zzdp)C?SBV1D-s@qn)8A@h@%SopLZi`TZ{kXqv(~L1G zE4?@Yzx?9?o07W^0RPpz5$R8QsCvz>wnQvVRH0MopKF+7mnrnnB}xOrE8@r}m825i zmkLrfl zvo-J$Y@*;d@DXHjnv*PA9nCsYoL=!%i55_*ZBo*l3lORc4k)|f6pgXqpk<&X{ah!^ z3jpa2I{kwL-J~M3nV*EuPKvDQ>sQbk7 zE2ZcV7h^;9wy^m&g_e6l_&%yBBUEu9Vb}WDg}jQbo|IH}`BGsDgT{enaShlzTD#ly z@PeieKp$}JUW!F+>OjvA)}$NWcl_3x=!eu<(u-%}&Y?~q)v-!CjJqq&TIG9!hb1qc z;-h3qRwM1d*`(B=KLdVDR;cJHNgC&|7l+DQ;`M=klfF7X+}vC`#I>XR{@V26=8Tl5CnN0b z3Aj1CES=yKUoqlkgvz%u?Ld`n`GGR7x8eWfwB+IPe~+d!-T!kmnmpxye3Xase=?$g zW*Q9Q2!!!6@al1Wc6280+azhQhUt#yMPz!o&g@I-3H#u(>LSOj43l5tc8ccMO<%c1 zc>|K_F?)bonC%;7WhsPNR-j9Z6}TPJ13LDVT90e>$l+npH9R^U<05`WsC%Gke=FCQ=)lVCj}|KJu3B?)Yy7k0Na{i#lqxbiGnq_^S1D_f-rLtx zK+$hmf;^K8#8BB|HHX;3lSrEa%D{I^-V6mwb~2 zj&Ev3ONnKHNH+g!bQL27C@JkecxtY;lO`*^Zq;Ue5#E?x3>TmZz zwJ}$HW53&lQ^i0%olZQ=(|Z4JU;x^)|Boj#-T!YinM|Jc|HpWU z{b&FFU&|IG&XqO$HD`$OPHz_ggho}owwStQE?KZ`eP@^9&<$P+0>zc>t#`qLlB*qh$PYFpOJQ-CC%`$hq+^htt6Ru|f1%gG zI?zw`jE#uGrgq3rUiL)muEC-?E>kj2%j<7mnDpiuD5+$XofZdx^f#TK1^bsE8?D5Y zG_)4|`(j^RRq`y)8@9Ln82h50^y;J>C1D>xOl6@4kRK<~bTs(sOzom^<-*iLP4b_# zwS>#)#l=veY8xb54khJ&}gxcQ|dXAtl816JD7pBt4H9c4`c{!Ob z0~<5Tmr$Uox<<(uB83G9*oCzF9L|4+t)r}#gQ z@)+Vj^1F-~fLMa}JNJ| znHNW)OUz90b|xgTZTIV~1KcY_F7UgAnL7-G1Nb?q&EJD)JrX~XNEJKEy2z1k8?RzQmGukVEo}_3S#2e}-700)m z1UTD)100Hg*1s%)UeQSc$l)yInLodTS;kJt`O7qpbM-at4i`Kn42pwu2I&Pj1XRb8 zin+MHK%vX0h66g_BbZOeKJuj4;6?j&fZ@Vb5cNjMKGFL195A5_iahoDxV>XVYo?mY7Q9JAMhkJ=`dfI?>wUdF`Fi_* zzTS3OD<`8-e@aa5`T}GBzRgfdFS#?M)wOD=^%CZA4l@M!_?LRQNy8}4vSwKR?<@<~ zv5#J`Fo}54e;zej|m;(<( zCEQkby~AT^K!SdF1Oymx6AJ9pXGDUE$Zrz(+Xfxn8KdSiNMbxM1w%TNSOkSASk!(n zSByyrP!iXu3(Vc5A#lj7#2^|?$QEtjng1B=;FW7=r^cdf*_fqc58j{`uagkvNNwwP zWckg|$BR-${d2J^2``g6_lG=*YNh}2O6O6K*Ej~+cmHEJ)%`yv{r=Pak4Je7`XATt zlGx99Dmp$%fS3q7u!36zAn;KLcgP2rjy2W1(p}@mT3!LckG+#Md%5cm)_zF)fz3~QMO?bC93<{bVi`e>KZ5iC#Pu^+^^I!p6RvD$YlksS%XpPn4 zL$&T`tlQdXSQmG@`S5q>%U)ArB~N@9Lt-6>Hd~@bbn{esID*x%r%5V~)U%dWH50Hz z1|^nS15gdkYWncBYpJer?O|H8nb`20_>4{33~isMS+lwAi({dU`(?4ieb%M^?`V;G z+^3cPmm)u?tNhit|3BzYb^UKJc=G>#l;_LR|H#C;kLpJN7_~kM`u9@!NbC34`3f+5 z)INWHPL!6DBH5_ZcQj&<{|kotV9Fr@TcyCM1@e3#4hd`6}Y5HP1 znjI@!v_$4T8?zX&hm-i(Qg|3)zY@Zy>D z;0@Wt+y;$330ePcPfhu6lLuked&i<<293f$?T!CG9hTz%4W8mZJ^9j7PY zJd$41Zl08)x3I{F^s@>{g)7}Qd5?nSDn9`Og->haxPqyFuW`fxKJPfv7H}1Q zHKqPA%29%EP|B~?bpJ?WSuuL|7&tLzc(FUcp{wPyjG&|Dt3tm4esPVoDPIVy$2D9D zpmb4)Uvnb!r3qA8LxF0DqiEuQN$hj__we6Q9yA}1B=$9a=*8E>U8=jgYlXawiXBOxAM`=##W?CAKxIIGQo0y+5su?U7 zCCEGg`rk0SRSCiq#5CN;9&R-%yV~!w8jEf3@m6E=4Yq4ubq}}ZN-1b-Ex7wHH^X9U zxzuVeG_A?MXE|CG}vd>2X92+R_6^8q!|)aDs-kr1!}gkFEbT)BlOLW+UDI z|5qpe|6ru&{~OMRPx}93JoWT{nK$Gs1dC`pkAbL5|ZO@@Hl zZ<DI}&SSy_;|TaD3F93Nw45>ZLslnQ*R0Yh}Hq3wTk*)VMTmM-er{tDXBL=W%{SQZD{r=x@JbQ}&{3uUz`A^<~ujzaM zBt5ZdH{}zCB-ALjP$_bfSqzi|krl!qsN5;FwnU?H0+=#1y~X`C3~h=$uOH4Z z8e@@z_o zBZ3o16reHvh&smb>B^oef1IuOcX^ua|9KK_S(ecT62LzBf7&m_f9{W;o$|4!pD#Q)}SS+(%RykX^U;IhK}dlkod)fzWKlZAA0M5xTfyOEdP2h||9pCNaendr3AieH1$>kvFGoH&yt@Ok z^_ay0p#eWS&p|>&8{9TyjRB40o~LoN40j+!7=6r?e2~WgZsWi&Q!xVpIetrHe?xOI zqG%hWakNHJ?jHO{5G`V`%JU>U>Gk~B%iMX8M{pguUcBxVS^ayf_cv6aRmV=PPgt^BkoS zv98kb2JcrW0`pA}`j{&v(7PpP5C>lYa#M_De$GI)LSYE7ZbyASf@t|1q$q@Wutg-O zxbz-I{=ruuLM(^VVUnUn@B#TWu+jhOxPWAeiX&1JqXZI^f-s1Xd*Hsjes`V6DLVKH zoRJ9%emc7bevoDd?lQ=GVWVn}qCr*}*q% z_C7iI#+}34gKyk?jsK3*V0rM(|9kKi_z9-uKGgZkSJ{D^r13wImmj!+k6@1$Pvd_c zxZBK&eboCSFi`9IKl|bI;`>*x-+b?`{d=}iz5XY|*`Tkl|Nc|{pT~K=0%t22Em0UR z|7)K9_2A&(zaTl$f5D`!?vZ=!4#&=4|EmZ8dhpd(Ux8ng5C1si(#SH%SDQJJL-KTk z*mQzPLgrKgQ`D1dj$GGOAa%guus!DKgcT~~ep{>8e*8Lr5{T&+nTX&3A@+^W6j1(lPEv3hxAw32a z^cdLaQLhmbJ^C6w1~NTH?dJTbVV_4;eeT=(+;7|G!LioozTD?wyFL$&n)P{bWbgCf z*wW|0aqB)GseK+C8~e;AG83mj7OxTTg9W*Gl#|#wV3US_$;hhbk(&ACcx!i#Y~86x zGp##0%JS~W9l0~DOGk2-2DV`=#*Gaq8NPl)Hr=ma(}S6rCovUuV;K zx?^fQ1Q{ZCgb+wk6mLl|g*3*pB_==-IW4? z=%_3zDeoo3CMCqy@fHCXhCmpjfVg%^)X|%>vnz`2xZ&IzehX--B;Jit;pAE>X%}VNDpp3|WU@ zT5my%PEDtzQ)Xb}h7)&uTm`I|Tsa<(Du4}}ar^ObRt2mfW4|Id2mW2d%_IvA8uAVIYf$hBfqnGwVU9ViO<-tprFx6-|*C$U*rwMk)IvVQWG-p4bpCvvZ_plJ%CV;k*KXFA(^pqvfehta9Jx8;2&?a%V z7C5yHy%0AC-BG`02U~GjO9ySjS!>x$6U`=42ZzVH*@LD?CMj(J#F8{zBjV4SA}>X_ z>+u43D9yVWyY>)AoG6qO^$ZpTDTa1Z*hIM2b}!BBHI_-Cs}>2&y%m=xxB?gk(Jiv7 ze>S64dz+Pt??}eiYOzq~=IE#%wfKOHj>Z)x3Y&$ZwceoFCyX6r1Hu@(?tTWAcotHJ z6XXLgPE+LN;g0pbnWQ~Bs*<#A+iTn2YZj@2+bt-*dDbV z+aq;skJPapl(=pdW5FYSPjw#Z{S!n>5JVtD={E4N78F+4o{lVochq+9X6oP_se?Dr z2d}`MW(XGOvRf*6n_xZ3TsC|S8Pm+lm}ZvYo3$OjnL2#4>fvK7hfdpdkmc|e5myqC zJR7WFP}P|m?wZ>PqIF)%?;mYq*%j*UJjzy z1m%kcG$(k*$kK3SPpvC^YLTa=ZRM${Do;&Sc}kxeLByn{B#q~YrfVV;$b&VCH#G74 zdjxM$3bI|6qjhHMhgle!wiSk^sxUNFgdzL!khc3w8ty(5>+UnPNKezY($iFxo~DZQ zG?>=x;JBGMI~rTX*{MZ(nzogmrYeV?D$>)SrnO=;YG$n%ji&Yvnz`__Ef=1uTzIN* z;i7{o7Y=vCnUbB|(&HPNjou4kuoj-RWECb`?=Otyj2iAnBkOK7wQ%BTTTVPtmGG&; zi6uHn?3U{*{CF#bJDb`vv8dFOwkq{RRjDV6NMM-#W@@zF%xgeUG)re#Tl#zRk!MlP~c6sSERY>t!OxP#2_^i=-j#4=TWg5r12uN@1gLxyLwB5)j z>P9|MHuAbhZo^qKNo6>*N-7h}Mm}k~kx$f(e4=dR{j#KTO*P{k`2OuVKiv-F9af#6 zD>5|`wdG8hlo&_Nn8NU=f+?6c{Yl$Rf1+;s6J^sk5CgM3==&rh77PIl1DIuq?)$`q zfWRuwa^epw(}vQa*`_c&vf6DYmQ8=scGDm0bm$xDz*lY%<>b}^vzwsHpU&v;<6pZU zE>*(FgvfUZ${0Bsa=#<1EI781W89V;Bh8m-yoVmAzR!oBnH@;vFqi=dUdPb?7KSkL zPzp{lU0C;`!PI4!?i&~-1fXI(&ZkGXB-B{T0 zqbyFSi8P4FmOx3+Oe`8st%~c&<`p$+?G-iByrM?3S5&_{v})(-I z{9uW)98+jI8_gEuDWyik6Ud?JQ=vG~k$Yl?a#4Tc(ZMiO-lKL3~Wf=&087Y0d&KmyYo44(t&!-Sko zUYR#0+WTFjuyRD8pIJfl*nO@7Mn24P;MO! zv%rr(v>uItHX1{DH1xCRvpCrSHDrieItR^T;H`qtr#ZhYcI1)GcWTtqcZ$^17v8|! z8773IQX_bx|S&~tlugEb<2A07VMf50X(C`>#U_V9~*}SMmExo94 z&0~!`eVIHnZLI&VO_qZsjkkf10K08XJMXR5u@4q7pvP%&lg9~4*8$C=Kq)b4rqK*0 zR*hz4ao`%Yb>JGgngDw&lc8*{#+uz0rkJO&X+brbJVkIF1`z`O9Bk4s18`||=^j}; zqDE~!qBLjxk>nA@dSOPxCPlUuA~hLuW+bLqa@=Gf?Pi-aap(9t57-fOcetoBO2ZD-kxU&r{{sX(ke`K+Yj@nvAN3JHb$s(Km-j23!Hng7) z?5WvC9yP#u)96%F&C4BHOMP#u(^Iw*ED%!4v)J17I4 z8vQzG3@p?bw57&CrN%&|hRqj!V4=pKEj9Y?V5H*FuY*V5rq}gb>veriuj@;CUH_Om z_*zggua|ynrKYbbHGN5`*@KFCc>1kH?!GE=_a%|L8WXd~+ixfGGP}e;m0bFT+>3EJ zvf^SET>EVW*S;#a_6xxkqcOFjVHRBbZ3Wl9D!BFw!L=F5& z+sZ+GRSxPGau7ztrcLxMa!|jW93%xEOR_XzlL^p~6*7#!|U-U0C@2l0Z1u(Ec^#0h4tg_@Zv)Xa3D zrqm-`KSVhq(GSVh#!a-zkS}^i?Dt~Dp$N`H1e6ksIK}j^_0S|N&Dsh}GgUyDX>wAj zd#q1!Xz?wVZf>$}uyVc3OM}F0AD>y|ompFXXQs+KGfmzx3>rPC*d~$gxnslEBpA)w z3Pv+kFq&zC5y97thRFg(-nT_#tfDcgA{*m9FpA=wTo-yBWI3JTP)y26 z5LI55rYG@~n9ck#j;T8aY3+QSr16$`IFY{)@FO~~c!{uR)5K*s+eJD25U|l}iG zZlcrdB92I~>O7WsknZl9^NW?lb6FdhW(vlnLcy@fdaXpgsXG|!BO{A?ec`MjPtz-u z<>|)DY0wKY*@GycuH2G?Y(c7GD*FN7^_t!1I<{TsqCGIsgnnpA6xC~jf-;gtY*BHV ztaEx_LZ)WRDGszjoHcin4>H& zT$cjs@q64X^2o6*@CZZD+UxcMeyn%eGT>^2fK9?~lEaXg7ZiUkACXJQBnAxh@(m2b z9iAk}rzB}67?JyaZR5XMGSu=v4knYq^eO)DV?1AhbLO^B z@_8S8w~44`}Etd}R?*T23PxPz(N@AiKs zMPEwX?BL)dxGK^^d?XoY!AI~DO0jebJ|2ARO3z2-AN&`AcrLDIk$w;|9UPFb>p=z} z_yL7$@S2f@-c~H~R^0q>ehtokIK8?7=hxuk%?wra&X1RON1=k3XZvOIfa2wblcMiJX ztU&2yka=;p20%6iBZOH}a5oP;+>}^OC9t(>avvHK}0wM zOXt9tB4L?iO5+|7oAP{D>`S-;K_-udr)vfyRNUGpmb-Wvcyw3bl=%q$hA?-(*(I2} zbL!#0s8v_y^<^gCRrY{`kCI+=R@enTGCLsn2!6f$^egxXt`p=1iyeT`&ZtUdV1-h0 zxeRMk_+z>QL5|j$3tmBQW!As4RlEs(s#OPhMhp?RXy?*xrU+Ev!3fN$W!?o0Ypl^o zcw$yQM|d;;NH`-mc90P$GKS!p0YhBB8%LRoi{c%J!l!!rCPh9Vd5h?5AP5zWx?b#4 zCY1H4ywRPN|J7h!*j4v4`g1 z7d+Mc*kd~%AGu zpA$N#3?YmN4O^9@$U{EK&RhqzYkJyNM(x#yAS2g=*m)cqc>G4Ezzx?K0Q!)S1DJs5 z8gmk)HNz8`FL(rg4g7a$27j&KOl}ZisVb|n7GVTfVabZAGbLLy>|(K@87$h$t%x9Q z%^P_ir?)}0d>N!Fk$aB3GhvvlB=Ccjom{gu87C-0KD$FAHB2;%44l)PedIn3ofR-i zXl1_Fv-P}=H&LFz6%$bP0Mpb}m}ddASVvfjGHnt05m3^=fkQ zB#qZO48jMPDgu-=RfKR6#!D(>W~+e2n76VX<~X(H-1oF*$?u2X!%nw)duU|7y`CyL4D!RzPrqX0u@{3TNuA&WE`{0mWM08TbKv&bRQFm1d5px*tH4{)B#Ufr;hJ2fo3pJ_RoHB8F=bY2k5EI}-sxmf z%0u7BQY)PRbF{#7B2P)lJf^MFl?C&aOD1PwOV!pOUTrLbLI6i=CxdqR#^uX6&>)!mYCY z;-;>de0oUM3dxAjg&mp{l!ZZHLBBwd0TjiXfn#UhA;d}mk%FG*tTtSI8eQAV;$ z?02Ks zN4>9jTU{9WT^Qv-m%m|5I!uBHos+3(nO(F<<>V@WxXC6AFXJ%qGCx;lE;5=lcMHAL2Cl7p@y( ztp}X4iVRMnSyoOG*>Yo_C>pSKlSS4@%`--CropU{fY)f))R=J&4c$JUL-XNaG=%e` zF`P~3v*TmmgU81c@3`-e(R?zSP8NgFa5@|Jj~27z$z(j3BX2tEFBZe0=b_P24Yc?~ z!onKXSt{oeD|DE3_ROflFUv9q&bSy_#4(qwBt)Xco2ZNDon+nSC7Ccwx7PWt5PBsW z`7PRs!)LY|{e^<~3&Y7(ab@z8TX_1K?DeP8SFH2-l0}k7WH*BKVGa%Oidv)qaf6I< z%}~!A0(}d{dzHfs6t2iw9b{Qx{W7|*>4!Z%&(k;zQM!ke6{U^h7STtgaEuagCMXxd zDtkQkPKNTH579b~GL-8r+O2EM1C#ZRm)GlC$z(2Ar&mQvgEk#X5%H_VC}C0IBlvZI z+ql?}V5{*0_$Ujo@|VPZR<67avLKFr2r|q7Uk7Vq>}G&Q#K=tHUz1A^v@}@J;vl5u zHJCB+d3Z}4#@qy^c|cjb#P*^f>d zsx4MXoGP=5v`>`#Gnl}65C(aGv?c67-*--a`Nwm|PvZptMHcm0aac-D%JFv~*~`~K}YUe@Z#I!1?j4XVuHmwza`q!d(@lrwFWZy8=}m|-Nd72G&tDR2TF zT8^Y2#_Bw#{oCtrh5w?o>yo2p`-V$DOZ%)G{*`nt%4jz<5@U6eN+KC0H5*Cieeq=H8PZM5;lANC^HD6Y^}cJUIuv#oU?F~^2i*M633z*R2EOfp%hT)YpI@GUzuesc_lkvACq90kKK%up6$QwH zqV0ESyk@@ua9utYSbbxeWf;$4=q@&4h!=+t%PY1E6y-sR zh&MGB)3GMcw@(Hw$QTnUPa3&cod#h9VqSzZCz=IQ9OyCB31mE_NpxgXR$t#{NcqlW zO_uu!MR^*~w>^}5JzO#aU9g5pg3&s^#HCY|v8wnx;WhW4!_fD;tod#p6Uzz8y)MC^ z`##850aZytg5+* zMmnLOrVeXSMpP_W$6LW5>ds*ncn(>=L_mob6gyUdoj>L&M2p~7{&IVi5f+st&_jH! z!%ZHqVIFwIo92uNG#Qa-gw96|$;5L&f<`VRB?*dr3Yq$blSYeHGU0O|YSNG3Qusq| z_yt~7T;uo^ljSf&3EoRlM?nN*7jKByNt`hWWX;<}k>A~9%vPdMn(&fe`u`w*sB$rx ztX=d0u9FbCVeG+>2*`NpbC#!@4cPomU?v>=%*~M_P5y_;8RU|j^*jjp@|n~n*(gXm z=VX@qSnP@79AFmB{p|nx0u0>2xZAJO5ci+4@jiZbxLY*h{WO9G7uen|T2}6f4%oAD9!A zy1Y*aQVgYZ8{I6h__K%XrG}_a_Rg>w{D_4DQkzOwv>fN!^mr|ZXga{`IbJ{bAC!Bp z>vmjlPUNr@VPw`+A%_tdZ~)IGp@ZNYN8zscOlraO7Wn{j$MKy3{X8sBiDDnVd3`N* zUqOOz<9x+j`7U@$Xe!oW2E*bh@GCN$`6x|S>dtbReLH_cWmnxXgS@tqR z?%RE{LOKK@oiKO19Hr|Zq7yVueU$F^1`mS;@^+r?i}C5#l5ka&ck@zG?m z4OX$Ekk8%cz=ph9@2spB4ZM;9Yh1uTqM^zR{~imK#ft0 zeRR$9C|isU%yXe~;@5B}k-@Y($K@^*UKkJqrf~@<%`{j6tX`J_uh({|y*-Oz?v3DN zIv;w2;|Uzk#~zw^)7fI)_lEuB#ptL%nofoTH1|h?slOP)nLj<6kB5`_u{S=NkNWkn z;!8rY!R}iS{~vot*W9*^eD|;5Fb{2JM2V7ROV+fVN!&KgOwwv%r+w;#5CK}aP$Z9_ zlvC6E_Zuue2!4S2u;Ti1(L-X1;O+ug0K1F*FdN_Rc--^yRr|OanB~2rjan6qRj0M- zmd9+Mk6C>tIyg;jpk+M5b&Tk$O*niRfgR@qN@SojWI0J3^`ZmyV|%6SC~ao?`TY0m zsav&VG;F-G4hb(RY9nk*4C51$|z=NEkOnAAHW-SQe7NOzXD0}}0 zh&L72LFp|km4T|L(61QLgTZ&4w0CLru2_90=p0-jIsq>BZjlA_>CiKO+sLrPm zLtq`c6U+Gmr4?IF5C%uM7OqswoknJ-8g8Hthv9Ky-HL_LziOOtb#?WEYA<9YCMJz^ zF$~q2ocw!DSfP7ltchY*-zr6q+LTm@OEjn^`q8joMqvHqjNk=52X7O!qM?ZFWHe1= z!4~DJRCz(yfeCsQUlsi_$y-c3atcjIEL{;%8-~P;2w)J>QZ4LczPV1o$7uwSm&*BRrK6QP zp?*2Lr`ahnP|ZVVwH0l>70Q}2zH#`K<0!{mc-*UPZ#M;>dvgV*@#G}$!x)0gEL>qg z`yv>^?9T(vL|*{lP_2H|g1y9S{4VkF_Asyq-4cqedmxkA$}2yUG`JDOWV088=q*Xi ztfb@^LY}C)#CD2o@hF&VjtE2P#L%?(|AP@It(3MeIM=nTH+c;1Ty4P6C|<+-2C9pJ zosO1;qO8BQbpj+Dv`RD*MvA$SF1=+f)+8T&5oqk>nZb#YPHtHFN%|P7qj08P4u?b^tC+^XAzhsO_%^rt4N?pSpaPEsE4}Uz1gu zZ{3pLkW;L(h&kWBdG^{{pzuAx!hE@91z9~cwP=_-X(~}5m#A>~Tk?`1#VuACNhhO! z5#`C>W|!muf*bl55i~vrT7*!{0w*E}lK$TDDS+rq8PvE<*IQd7IBNKQO10YBC zN{(ogzJjdm;Xy~wIqX(sm8BwcgB-Uu+-)2Xn?q}XF&))x)FQ9#c6kTaXIa&Z`V*@LR`4JGxs+rYw((~6)M7|+jF7X zf%zW%@RpHWem4`IL%TBWrs@Hth;tNmYVPN{11ckJ*IjI*sl1VBO9qD*VNS5{m8rk? zaQ;Ch(oRPSqdIzruS5;laqbcZs&-e2I+g>xCCXQKqisXgjCmi9`@=HkeS+}SViYdI z#pQ4u`Qd2nUxj0TIQ7RE4KKnlnvTfCpNvo#MaW-Vq7V&nxQHerbm%1p0u)Mx*%2|XU?D2rqc8Fu_G6Vy@vx$EF*|0(PyFYdrUVZA&hxkiK6fqg~MT`6K!znzU=P66-Os>e!0D!%Qw}Py^39heTzRI@PBS}4BS)0DObJA*?e(0GpRTSch7X!S`o|0U8vZwYzcvucC(Vmz^t7CRD9<76I?aF82Qn|U>hUi8<-oc>~%4zvi0&Q@oLbexg zvPuV9pgbsFDx@doN^_)6#*B)9QDWjp^_x0=ZlaKJi0`e=hMY#IK-D1i%T-~@fe+-V}FRl>1Z(>lFM@+ zUrfk!dcGK6`6%?miwTLwy9iQpWWGRFzEy@0M+WS^Nn;V;Vtjv26Rg5*IjnwIKI_(Q zoBF1SrVXCNbq}yz)XHa_`th@-YP~1)dw?zB9pMFh$kah@J`0I&;8_=OY%Pn#wxpfH z*wK&W)oGKEzC)8RUaJ5@v`9BZmB&`wF$zO{VVDz4yF@X{x`T1x{RdRFbHdVf9yao| zK7SZ4C2UMzjo(rP(?b`;Ba`LnGxO31^_d z*ms^22SLaqm?aA+*kR=P;U^PG!hD+*!Y(II)}E~Hy^gU10fpd(u%V2~NOhEK7b)Hf zN94iYYnX4$2yB`}X}%JhTVtRF&|^n=Srl21~QvnR-}qSFC!c#xEqcj9Sh-)xcg zw`yP#k@~I^#(@#n0Cz{YwKdvW5@CzB7My4ewYGO5Ez%H(H{@ZihKcMA9I9&5SCs+H z%|765gP!>RhW~MUJr7{IgSS7 z@fa$>w^SER{!-hM^d2g=enW?>-3eD!6uFaR}8D906!u}!H!j<;P1I`m_6=QA41xUpxf4=G{aYl)GxlT5B zNtvsT&7`~Qw|sM5$j$X>ud>(n91X8m?zsjT&y*zJse87F{nhu6PI#+Vy&bg7MQHUK zqXgN+_g z1PhT|f+P+Ah% z;w;k-`**KgKT0#iZFy4zuKmcf{$~`&3lzS;O<$#V?6>5nJWuoBVFxCSrF78DYoNtd zsDxm)yl*)KfC!}zN~rQ$wMerxPVcri8CMyvbtQ%-d8%xK?Tuqk0LArs@KzC*3hGS*c zJ|ALqH5`sECTMbr!s%!-UHD{tIg0QIBY#Auh@kL%e1)R(FdCtY(c~%|FT$&<=wcX6 zcT*Q?Ei<4wf?sNP~>#8?T3uHpwE2o7UVz0 z0KVrW{@!K9HYRLINZ~qzAE3Z?SqYqfee&dqa}%P3Zz}7!U}tA%XMa1trp{~1D!V;D zOx6ijd6xNxIrDaX{sxR?W;KQJM^cD;U-MBbHUIRyef@m>eEod=-1qa}00030|8iKH I-~he|01OtAPyhe` literal 0 HcmV?d00001 diff --git a/stable/traccar/4.0.15/helm-values.md b/stable/traccar/4.0.16/helm-values.md similarity index 93% rename from stable/traccar/4.0.15/helm-values.md rename to stable/traccar/4.0.16/helm-values.md index bc8df93bb58..0b5a497f5a8 100644 --- a/stable/traccar/4.0.15/helm-values.md +++ b/stable/traccar/4.0.16/helm-values.md @@ -14,8 +14,6 @@ You will, however, be able to use all values referenced in the common chart here | env | object | See below | environment variables. See more environment variables in the [traccar documentation](https://www.traccar.org/configuration-file/) | | env.CONFIG_USE_ENVIRONMENT_VARIABLES | bool | `true` | Set application to read environment variables | | env.LOGGER_CONSOLE | bool | `true` | Set application to log to stdout | -| envTpl.DATABASE_DRIVER | string | `"org.postgresql.Driver"` | | -| envTpl.DATABASE_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DATABASE_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | | envValueFrom.DATABASE_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DATABASE_URL.secretKeyRef.key | string | `"jdbc"` | | diff --git a/stable/traccar/4.0.15/ix_values.yaml b/stable/traccar/4.0.16/ix_values.yaml similarity index 99% rename from stable/traccar/4.0.15/ix_values.yaml rename to stable/traccar/4.0.16/ix_values.yaml index 7a9dbec1d36..3c3a8142cca 100644 --- a/stable/traccar/4.0.15/ix_values.yaml +++ b/stable/traccar/4.0.16/ix_values.yaml @@ -13,8 +13,6 @@ env: CONFIG_USE_ENVIRONMENT_VARIABLES: true # -- Set application to log to stdout LOGGER_CONSOLE: true - -envTpl: DATABASE_DRIVER: "org.postgresql.Driver" DATABASE_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/traccar/4.0.15/questions.yaml b/stable/traccar/4.0.16/questions.yaml similarity index 99% rename from stable/traccar/4.0.15/questions.yaml rename to stable/traccar/4.0.16/questions.yaml index 29b7166cbc2..e9a374cdc1b 100644 --- a/stable/traccar/4.0.15/questions.yaml +++ b/stable/traccar/4.0.16/questions.yaml @@ -357,7 +357,6 @@ questions: schema: type: int default: 8082 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/traccar/4.0.15/security.md b/stable/traccar/4.0.16/security.md similarity index 100% rename from stable/traccar/4.0.15/security.md rename to stable/traccar/4.0.16/security.md diff --git a/stable/ubooquity/0.0.5/templates/common.yaml b/stable/traccar/4.0.16/templates/common.yaml similarity index 100% rename from stable/ubooquity/0.0.5/templates/common.yaml rename to stable/traccar/4.0.16/templates/common.yaml diff --git a/stable/unpackerr/4.0.26/values.yaml b/stable/traccar/4.0.16/values.yaml similarity index 100% rename from stable/unpackerr/4.0.26/values.yaml rename to stable/traccar/4.0.16/values.yaml diff --git a/stable/transmission/10.0.6/CHANGELOG.md b/stable/transmission/10.0.6/CHANGELOG.md new file mode 100644 index 00000000000..707627da05a --- /dev/null +++ b/stable/transmission/10.0.6/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [transmission-10.0.6](https://github.com/truecharts/apps/compare/transmission-10.0.5...transmission-10.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + + +### [transmission-10.0.5](https://github.com/truecharts/apps/compare/transmission-10.0.4...transmission-10.0.5) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [transmission-10.0.4](https://github.com/truecharts/apps/compare/transmission-10.0.3...transmission-10.0.4) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + + +### [transmission-10.0.3](https://github.com/truecharts/apps/compare/transmission-10.0.2...transmission-10.0.3) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [transmission-10.0.2](https://github.com/truecharts/apps/compare/transmission-10.0.1...transmission-10.0.2) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [transmission-10.0.1](https://github.com/truecharts/apps/compare/transmission-10.0.0...transmission-10.0.1) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [transmission-10.0.0](https://github.com/truecharts/apps/compare/transmission-9.0.21...transmission-10.0.0) (2021-12-11) + +#### Feat + +* move user/pass/secrets/keys from `env` to `secret` ([#1501](https://github.com/truecharts/apps/issues/1501)) + + + + +### [transmission-9.0.21](https://github.com/truecharts/apps/compare/transmission-9.0.20...transmission-9.0.21) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### transmission-9.0.20 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) +* ensure port settings are correct inside transmission ([#1445](https://github.com/truecharts/apps/issues/1445)) +* correct typo in env's + + diff --git a/stable/unpoller/1.0.15/CONFIG.md b/stable/transmission/10.0.6/CONFIG.md similarity index 100% rename from stable/unpoller/1.0.15/CONFIG.md rename to stable/transmission/10.0.6/CONFIG.md diff --git a/stable/transmission/10.0.6/Chart.lock b/stable/transmission/10.0.6/Chart.lock new file mode 100644 index 00000000000..cf528e5c4d3 --- /dev/null +++ b/stable/transmission/10.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:36:57.502593282Z" diff --git a/stable/transmission/10.0.6/Chart.yaml b/stable/transmission/10.0.6/Chart.yaml new file mode 100644 index 00000000000..74c400e050f --- /dev/null +++ b/stable/transmission/10.0.6/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "3.00" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +deprecated: false +description: API Support for your favorite torrent trackers. +home: https://github.com/truecharts/apps/tree/master/charts/stable/transmission +icon: https://truecharts.org/_static/img/appicons/transmission-icon.png +keywords: +- transmission +- torrent +- usenet +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: transmission +sources: +- https://github.com/transmission/transmission +- https://hub.docker.com/r/linuxserver/transmission +type: application +version: 10.0.6 +annotations: + truecharts.org/catagories: | + - download-tools + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/transmission/10.0.6/README.md b/stable/transmission/10.0.6/README.md new file mode 100644 index 00000000000..7994eef2483 --- /dev/null +++ b/stable/transmission/10.0.6/README.md @@ -0,0 +1,38 @@ +# Introduction + +API Support for your favorite torrent trackers. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/transmission/10.0.6/app-readme.md b/stable/transmission/10.0.6/app-readme.md new file mode 100644 index 00000000000..151894ff6be --- /dev/null +++ b/stable/transmission/10.0.6/app-readme.md @@ -0,0 +1,3 @@ +API Support for your favorite torrent trackers. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/unpoller/1.0.15/charts/common-8.9.24.tgz b/stable/transmission/10.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/unpoller/1.0.15/charts/common-8.9.24.tgz rename to stable/transmission/10.0.6/charts/common-8.9.24.tgz diff --git a/stable/transmission/10.0.6/helm-values.md b/stable/transmission/10.0.6/helm-values.md new file mode 100644 index 00000000000..d2bbe40cbab --- /dev/null +++ b/stable/transmission/10.0.6/helm-values.md @@ -0,0 +1,34 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.TRANSMISSION_PEER_PORT | string | `"{{ .Values.service.torrent.ports.torrent.targetPort }}"` | | +| env.TRANSMISSION_RPC_PORT | string | `"{{ .Values.service.main.ports.main.targetPort }}"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/transmission"` | | +| image.tag | string | `"v3.00@sha256:9a4f48483b93f74394b69555c9324c746414836de247fbeafec5f53c0b077b9f"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| secret | object | `{}` | | +| service.main.ports.main.port | int | `10109` | | +| service.main.ports.main.targetPort | int | `9091` | | +| service.torrent.enabled | bool | `true` | | +| service.torrent.ports.torrent.enabled | bool | `true` | | +| service.torrent.ports.torrent.port | int | `51414` | | +| service.torrent.ports.torrent.targetPort | int | `51414` | | +| service.torrentudp.enabled | bool | `true` | | +| service.torrentudp.ports.torrentudp.enabled | bool | `true` | | +| service.torrentudp.ports.torrentudp.port | int | `51414` | | +| service.torrentudp.ports.torrentudp.protocol | string | `"UDP"` | | +| service.torrentudp.ports.torrentudp.targetPort | int | `51414` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/transmission/10.0.6/ix_values.yaml b/stable/transmission/10.0.6/ix_values.yaml new file mode 100644 index 00000000000..e816ec20548 --- /dev/null +++ b/stable/transmission/10.0.6/ix_values.yaml @@ -0,0 +1,103 @@ +image: + repository: tccr.io/truecharts/transmission + pullPolicy: IfNotPresent + tag: v3.00@sha256:9a4f48483b93f74394b69555c9324c746414836de247fbeafec5f53c0b077b9f + +service: + main: + ports: + main: + port: 10109 + targetPort: 9091 + torrent: + enabled: true + ports: + torrent: + enabled: true + port: 51414 + targetPort: 51414 + torrentudp: + enabled: true + ports: + torrentudp: + enabled: true + port: 51414 + targetPort: 51414 + protocol: UDP +secret: {} + # TRANSMISSION_RPC_USERNAME: "" + # TRANSMISSION_RPC_PASSWORD: "" +env: + # TZ: UTC + # PUID: 1001 + # TRANSMISSION_ALT_SPEED_DOWN: 50 + # TRANSMISSION_ALT_SPEED_ENABLED: false + # TRANSMISSION_ALT_SPEED_TIME_BEGIN: 540 + # TRANSMISSION_ALT_SPEED_TIME_DAY: 127 + # TRANSMISSION_ALT_SPEED_TIME_ENABLED: false + # TRANSMISSION_ALT_SPEED_TIME_END: 1020 + # TRANSMISSION_ALT_SPEED_UP: 50 + # TRANSMISSION_BIND_ADDRESS_IPV4: "0.0.0.0" + # TRANSMISSION_BIND_ADDRESS_IPV6: "::" + # TRANSMISSION_BLOCKLIST_ENABLED: true + # TRANSMISSION_BLOCKLIST_URL: "http://john.bitsurge.net/public/biglist.p2p.gz" + # TRANSMISSION_CACHE_SIZE_MB: 4 + # TRANSMISSION_DHT_ENABLED: true + # TRANSMISSION_DOWNLOAD_DIR: "/downloads/complete" + # TRANSMISSION_DOWNLOAD_QUEUE_ENABLED: true + # TRANSMISSION_DOWNLOAD_QUEUE_SIZE: 5 + # TRANSMISSION_ENCRYPTION: 1 + # TRANSMISSION_IDLE_SEEDING_LIMIT: 30 + # TRANSMISSION_IDLE_SEEDING_LIMIT_ENABLED: false + # TRANSMISSION_INCOMPLETE_DIR: "/downloads/incomplete" + # TRANSMISSION_INCOMPLETE_DIR_ENABLED: true + # TRANSMISSION_LPD_ENABLED: false + # TRANSMISSION_MESSAGE_LEVEL: 2 + # TRANSMISSION_PEER_CONGESTION_ALGORITHM: "" + # TRANSMISSION_PEER_ID_TTL_HOURS: 6 + # TRANSMISSION_PEER_LIMIT_GLOBAL: 200 + # TRANSMISSION_PEER_LIMIT_PER_TORRENT: 50 + TRANSMISSION_PEER_PORT: "{{ .Values.service.torrent.ports.torrent.targetPort }}" + # TRANSMISSION_PEER_PORT_RANDOM_HIGH: 65535 + # TRANSMISSION_PEER_PORT_RANDOM_LOW: 49152 + # TRANSMISSION_PEER_PORT_RANDOM_ON_START: false + # TRANSMISSION_PEER_SOCKET_TOS: default" + # TRANSMISSION_PEX_ENABLED: true + # TRANSMISSION_PORT_FORWARDING_ENABLED: false + # TRANSMISSION_PREALLOCATION: 1 + # TRANSMISSION_PREFETCH_ENABLED: true + # TRANSMISSION_QUEUE_STALLED_ENABLED: true + # TRANSMISSION_QUEUE_STALLED_MINUTES: 30 + # TRANSMISSION_RATIO_LIMIT: 2 + # TRANSMISSION_RATIO_LIMIT_ENABLED: false + # TRANSMISSION_RENAME_PARTIAL_FILES: true + # TRANSMISSION_RPC_AUTHENTICATION_REQUIRED: false + # TRANSMISSION_RPC_BIND_ADDRESS: "0.0.0.0" + # TRANSMISSION_RPC_ENABLED: true + # TRANSMISSION_RPC_HOST_WHITELIST: "" + # TRANSMISSION_RPC_HOST_WHITELIST_ENABLED: false + TRANSMISSION_RPC_PORT: "{{ .Values.service.main.ports.main.targetPort }}" + # TRANSMISSION_RPC_URL: "/transmission/" + # TRANSMISSION_RPC_WHITELIST: "" + # TRANSMISSION_RPC_WHITELIST_ENABLED: false + # TRANSMISSION_SCRAPE_PAUSED_TORRENTS_ENABLED: true + # TRANSMISSION_SCRIPT_TORRENT_DONE_ENABLED: false + # TRANSMISSION_SCRIPT_TORRENT_DONE_FILENAME: "" + # TRANSMISSION_SEED_QUEUE_ENABLED: false + # TRANSMISSION_SEED_QUEUE_SIZE: 10 + # TRANSMISSION_SPEED_LIMIT_DOWN: 100 + # TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED: false + # TRANSMISSION_SPEED_LIMIT_UP: 100 + # TRANSMISSION_SPEED_LIMIT_UP_ENABLED: false + # TRANSMISSION_START_ADDED_TORRENTS: true + # TRANSMISSION_TRASH_ORIGINAL_TORRENT_FILES: false + # TRANSMISSION_UMASK: 2 + # TRANSMISSION_UPLOAD_SLOTS_PER_TORRENT: 14 + # TRANSMISSION_UTP_ENABLED: true + # TRANSMISSION_WATCH_DIR: "/watch" + # TRANSMISSION_WATCH_DIR_ENABLED: false + +persistence: + config: + enabled: true + mountPath: "/config" diff --git a/stable/transmission/10.0.6/questions.yaml b/stable/transmission/10.0.6/questions.yaml new file mode 100644 index 00000000000..4f4b340a7ba --- /dev/null +++ b/stable/transmission/10.0.6/questions.yaml @@ -0,0 +1,2339 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/transmission/web/#files" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: TRANSMISSION_RPC_USERNAME + label: TRANSMISSION_RPC_USERNAME + schema: + type: string + default: "REPLACETHIS" + - variable: TRANSMISSION_RPC_PASSWORD + label: TRANSMISSION_RPC_PASSWORD + schema: + type: string + private: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: TRANSMISSION_ALT_SPEED_DOWN + label: TRANSMISSION_ALT_SPEED_DOWN + schema: + type: int + default: 50 + - variable: TRANSMISSION_ALT_SPEED_ENABLED + label: TRANSMISSION_ALT_SPEED_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_ALT_SPEED_TIME_BEGIN + label: TRANSMISSION_ALT_SPEED_TIME_BEGIN + schema: + type: int + default: 540 + - variable: TRANSMISSION_ALT_SPEED_TIME_DAY + label: TRANSMISSION_ALT_SPEED_TIME_DAY + schema: + type: int + default: 127 + - variable: TRANSMISSION_ALT_SPEED_TIME_ENABLED + label: TRANSMISSION_ALT_SPEED_TIME_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_ALT_SPEED_TIME_END + label: TRANSMISSION_ALT_SPEED_TIME_END + schema: + type: int + default: 1020 + - variable: TRANSMISSION_ALT_SPEED_UP + label: TRANSMISSION_ALT_SPEED_UP + schema: + type: int + default: 50 + - variable: TRANSMISSION_BIND_ADDRESS_IPV4 + label: TRANSMISSION_BIND_ADDRESS_IPV4 + schema: + type: string + default: "0.0.0.0" + - variable: TRANSMISSION_BIND_ADDRESS_IPV6 + label: TRANSMISSION_BIND_ADDRESS_IPV6 + schema: + type: string + default: "::" + - variable: TRANSMISSION_BLOCKLIST_ENABLED + label: TRANSMISSION_BLOCKLIST_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_BLOCKLIST_URL + label: TRANSMISSION_BLOCKLIST_URL + schema: + type: string + default: "http://john.bitsurge.net/public/biglist.p2p.gz" + - variable: TRANSMISSION_CACHE_SIZE_MB + label: TRANSMISSION_CACHE_SIZE_MB + schema: + type: int + default: 4 + - variable: TRANSMISSION_DHT_ENABLED + label: TRANSMISSION_DHT_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_DOWNLOAD_DIR + label: TRANSMISSION_DOWNLOAD_DIR + schema: + type: string + default: "/downloads/complete" + - variable: TRANSMISSION_DOWNLOAD_QUEUE_ENABLED + label: TRANSMISSION_DOWNLOAD_QUEUE_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_DOWNLOAD_QUEUE_SIZE + label: TRANSMISSION_DOWNLOAD_QUEUE_SIZE + schema: + type: int + default: 5 + - variable: TRANSMISSION_ENCRYPTION + label: TRANSMISSION_ENCRYPTION + schema: + type: int + default: 1 + - variable: TRANSMISSION_IDLE_SEEDING_LIMIT + label: TRANSMISSION_IDLE_SEEDING_LIMIT + schema: + type: int + default: 30 + - variable: TRANSMISSION_IDLE_SEEDING_LIMIT_ENABLED + label: TRANSMISSION_IDLE_SEEDING_LIMIT_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_INCOMPLETE_DIR + label: TRANSMISSION_INCOMPLETE_DIR + schema: + type: string + default: "/downloads/incomplete" + - variable: TRANSMISSION_INCOMPLETE_DIR_ENABLED + label: TRANSMISSION_INCOMPLETE_DIR_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_LPD_ENABLED + label: TRANSMISSION_LPD_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_MESSAGE_LEVEL + label: TRANSMISSION_MESSAGE_LEVEL + schema: + type: int + default: 2 + - variable: TRANSMISSION_PEER_CONGESTION_ALGORITHM + label: TRANSMISSION_PEER_CONGESTION_ALGORITHM + schema: + type: string + default: "" + - variable: TRANSMISSION_PEER_ID_TTL_HOURS + label: TRANSMISSION_PEER_ID_TTL_HOURS + schema: + type: int + default: 6 + - variable: TRANSMISSION_PEER_LIMIT_GLOBAL + label: TRANSMISSION_PEER_LIMIT_GLOBAL + schema: + type: int + default: 200 + - variable: TRANSMISSION_PEER_LIMIT_PER_TORRENT + label: TRANSMISSION_PEER_LIMIT_PER_TORRENT + schema: + type: int + default: 50 + - variable: TRANSMISSION_PEER_SOCKET_TOS + label: TRANSMISSION_PEER_SOCKET_TOS + schema: + type: string + default: "default" + - variable: TRANSMISSION_PEX_ENABLED + label: TRANSMISSION_PEX_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_PORT_FORWARDING_ENABLED + label: TRANSMISSION_PORT_FORWARDING_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_PREALLOCATION + label: TRANSMISSION_PREALLOCATION + schema: + type: int + default: 1 + - variable: TRANSMISSION_PREFETCH_ENABLED + label: TRANSMISSION_PREFETCH_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_QUEUE_STALLED_ENABLED + label: TRANSMISSION_QUEUE_STALLED_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_QUEUE_STALLED_MINUTES + label: TRANSMISSION_QUEUE_STALLED_MINUTES + schema: + type: int + default: 30 + - variable: TRANSMISSION_RATIO_LIMIT + label: TRANSMISSION_RATIO_LIMIT + schema: + type: int + default: 2 + - variable: TRANSMISSION_RATIO_LIMIT_ENABLED + label: TRANSMISSION_RATIO_LIMIT_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_RENAME_PARTIAL_FILES + label: TRANSMISSION_RENAME_PARTIAL_FILES + schema: + type: boolean + default: true + - variable: TRANSMISSION_RPC_AUTHENTICATION_REQUIRED + label: TRANSMISSION_RPC_AUTHENTICATION_REQUIRED + schema: + type: boolean + default: false + - variable: TRANSMISSION_RPC_BIND_ADDRESS + label: TRANSMISSION_RPC_BIND_ADDRESS + schema: + type: string + default: "0.0.0.0" + - variable: TRANSMISSION_RPC_ENABLED + label: TRANSMISSION_RPC_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_RPC_HOST_WHITELIST + label: TRANSMISSION_RPC_HOST_WHITELIST + schema: + type: string + default: "" + - variable: TRANSMISSION_RPC_HOST_WHITELIST_ENABLED + label: TRANSMISSION_RPC_HOST_WHITELIST_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_RPC_WHITELIST + label: TRANSMISSION_RPC_WHITELIST + schema: + type: string + default: "" + - variable: TRANSMISSION_RPC_WHITELIST_ENABLED + label: TRANSMISSION_RPC_WHITELIST_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_SCRAPE_PAUSED_TORRENTS_ENABLED + label: TRANSMISSION_SCRAPE_PAUSED_TORRENTS_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_SCRIPT_TORRENT_DONE_ENABLED + label: TRANSMISSION_SCRIPT_TORRENT_DONE_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_SCRIPT_TORRENT_DONE_FILENAME + label: TRANSMISSION_SCRIPT_TORRENT_DONE_FILENAME + schema: + type: string + default: "" + - variable: TRANSMISSION_SEED_QUEUE_ENABLED + label: TRANSMISSION_SEED_QUEUE_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_SEED_QUEUE_SIZE + label: TRANSMISSION_SEED_QUEUE_SIZE + schema: + type: int + default: 10 + - variable: TRANSMISSION_SPEED_LIMIT_DOWN + label: TRANSMISSION_SPEED_LIMIT_DOWN + schema: + type: int + default: 100 + - variable: TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED + label: TRANSMISSION_SPEED_LIMIT_DOWN_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_SPEED_LIMIT_UP + label: TRANSMISSION_SPEED_LIMIT_UP + schema: + type: int + default: 100 + - variable: TRANSMISSION_SPEED_LIMIT_UP_ENABLED + label: TRANSMISSION_SPEED_LIMIT_UP_ENABLED + schema: + type: boolean + default: false + - variable: TRANSMISSION_START_ADDED_TORRENTS + label: TRANSMISSION_START_ADDED_TORRENTS + schema: + type: boolean + default: true + - variable: TRANSMISSION_TRASH_ORIGINAL_TORRENT_FILES + label: TRANSMISSION_TRASH_ORIGINAL_TORRENT_FILES + schema: + type: boolean + default: false + - variable: TRANSMISSION_UMASK + label: TRANSMISSION_UMASK + schema: + type: int + default: 2 + - variable: TRANSMISSION_UPLOAD_SLOTS_PER_TORRENT + label: TRANSMISSION_UPLOAD_SLOTS_PER_TORRENT + schema: + type: int + default: 14 + - variable: TRANSMISSION_UTP_ENABLED + label: TRANSMISSION_UTP_ENABLED + schema: + type: boolean + default: true + - variable: TRANSMISSION_WATCH_DIR + label: TRANSMISSION_WATCH_DIR + schema: + type: string + default: "/watch" + - variable: TRANSMISSION_WATCH_DIR_ENABLED + label: TRANSMISSION_WATCH_DIR_ENABLED + schema: + type: boolean + default: false + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10109 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10109 + + + - variable: torrent + label: "TCP Torrent Service" + description: "Torrent service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: torrent + label: "TCP Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 51414 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 51414 + + - variable: torrentudp + label: "UDP Torrent Service" + description: "Torrent service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: torrentudp + label: "UDP Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 51413 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "UDP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 51413 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/transmission/10.0.6/security.md b/stable/transmission/10.0.6/security.md new file mode 100644 index 00000000000..58cca13c401 --- /dev/null +++ b/stable/transmission/10.0.6/security.md @@ -0,0 +1,176 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: transmission/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-transmission' of Deployment 'RELEASE-NAME-transmission' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-transmission' of Deployment 'RELEASE-NAME-transmission' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-transmission' of Deployment 'RELEASE-NAME-transmission' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-transmission' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-transmission' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-transmission' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/transmission:v3.00@sha256:9a4f48483b93f74394b69555c9324c746414836de247fbeafec5f53c0b077b9f + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/transmission:v3.00@sha256:9a4f48483b93f74394b69555c9324c746414836de247fbeafec5f53c0b077b9f (ubuntu 20.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bind9-dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| +| bind9-host | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| +| bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| curl | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
| +| libc-bin | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-bin | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| libc6 | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
| +| libc6 | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libcurl4 | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
| +| libgcrypt20 | CVE-2021-33560 | LOW | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-20231 | LOW | 3.6.13-2ubuntu1.3 | 3.6.13-2ubuntu1.6 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1922276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
https://linux.oracle.com/cve/CVE-2021-20231.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
| +| libgnutls30 | CVE-2021-20232 | LOW | 3.6.13-2ubuntu1.3 | 3.6.13-2ubuntu1.6 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1922275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
https://linux.oracle.com/cve/CVE-2021-20232.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libicu66 | CVE-2021-30535 | MEDIUM | 66.1-2ubuntu2 | 66.1-2ubuntu2.1 |
Expand...https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpython3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8-minimal | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.8-minimal | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libssh-4 | CVE-2021-3634 | MEDIUM | 0.9.3-2ubuntu2.1 | 0.9.3-2ubuntu2.2 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1978810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/
https://security.netapp.com/advisory/ntap-20211004-0003/
https://ubuntu.com/security/notices/USN-5053-1
https://www.debian.org/security/2021/dsa-4965
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| +| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
| +| locales | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| locales | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| python3.8 | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8 | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.8 | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8-minimal | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
| +| python3.8-minimal | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| unrar | CVE-2018-25018 | MEDIUM | 1:5.6.6-2build1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25018
https://github.com/aawc/unrar/releases
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2018-204.yaml
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| gopkg.in/yaml.v2 | CVE-2019-11254 | MEDIUM | v2.2.7 | v2.2.8 |
Expand...https://github.com/kubernetes/kubernetes/issues/89535
https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
https://groups.google.com/forum/#!topic/kubernetes-security-announce/wuwEwZigXBc
https://linux.oracle.com/cve/CVE-2019-11254.html
https://linux.oracle.com/errata/ELSA-2020-5653.html
https://security.netapp.com/advisory/ntap-20200413-0003/
| + diff --git a/stable/transmission/10.0.6/templates/common.yaml b/stable/transmission/10.0.6/templates/common.yaml new file mode 100644 index 00000000000..f6d3b6d3a08 --- /dev/null +++ b/stable/transmission/10.0.6/templates/common.yaml @@ -0,0 +1,2 @@ +{{/* Render the templates */}} +{{ include "common.all" . }} diff --git a/stable/unpoller/1.0.15/values.yaml b/stable/transmission/10.0.6/values.yaml similarity index 100% rename from stable/unpoller/1.0.15/values.yaml rename to stable/transmission/10.0.6/values.yaml diff --git a/stable/truecommand/9.0.25/Chart.lock b/stable/truecommand/9.0.25/Chart.lock deleted file mode 100644 index 022e1a23aa8..00000000000 --- a/stable/truecommand/9.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:50:23.17825824Z" diff --git a/stable/truecommand/9.0.25/CHANGELOG.md b/stable/truecommand/9.0.26/CHANGELOG.md similarity index 90% rename from stable/truecommand/9.0.25/CHANGELOG.md rename to stable/truecommand/9.0.26/CHANGELOG.md index 06d271a066d..ec0178ab99d 100644 --- a/stable/truecommand/9.0.25/CHANGELOG.md +++ b/stable/truecommand/9.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [truecommand-9.0.26](https://github.com/truecharts/apps/compare/truecommand-9.0.25...truecommand-9.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [truecommand-9.0.25](https://github.com/truecharts/apps/compare/truecommand-9.0.24...truecommand-9.0.25) (2021-12-19) @@ -87,13 +97,3 @@ ### [truecommand-9.0.17](https://github.com/truecharts/apps/compare/truecommand-9.0.16...truecommand-9.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [truecommand-9.0.16](https://github.com/truecharts/apps/compare/truecommand-9.0.15...truecommand-9.0.16) (2021-12-04) - diff --git a/stable/uptime-kuma/1.0.25/CONFIG.md b/stable/truecommand/9.0.26/CONFIG.md similarity index 100% rename from stable/uptime-kuma/1.0.25/CONFIG.md rename to stable/truecommand/9.0.26/CONFIG.md diff --git a/stable/truecommand/9.0.26/Chart.lock b/stable/truecommand/9.0.26/Chart.lock new file mode 100644 index 00000000000..ea4d66e9e96 --- /dev/null +++ b/stable/truecommand/9.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:37:15.365501227Z" diff --git a/stable/truecommand/9.0.25/Chart.yaml b/stable/truecommand/9.0.26/Chart.yaml similarity index 97% rename from stable/truecommand/9.0.25/Chart.yaml rename to stable/truecommand/9.0.26/Chart.yaml index e7aca2addcf..468ab79a8be 100644 --- a/stable/truecommand/9.0.25/Chart.yaml +++ b/stable/truecommand/9.0.26/Chart.yaml @@ -19,7 +19,7 @@ name: truecommand sources: - https://hub.docker.com/r/ixsystems/truecommand type: application -version: 9.0.25 +version: 9.0.26 annotations: truecharts.org/catagories: | - Administration diff --git a/stable/truecommand/9.0.25/README.md b/stable/truecommand/9.0.26/README.md similarity index 100% rename from stable/truecommand/9.0.25/README.md rename to stable/truecommand/9.0.26/README.md diff --git a/stable/truecommand/9.0.25/app-readme.md b/stable/truecommand/9.0.26/app-readme.md similarity index 100% rename from stable/truecommand/9.0.25/app-readme.md rename to stable/truecommand/9.0.26/app-readme.md diff --git a/stable/uptime-kuma/1.0.25/charts/common-8.9.24.tgz b/stable/truecommand/9.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/uptime-kuma/1.0.25/charts/common-8.9.24.tgz rename to stable/truecommand/9.0.26/charts/common-8.9.24.tgz diff --git a/stable/truecommand/9.0.25/helm-values.md b/stable/truecommand/9.0.26/helm-values.md similarity index 100% rename from stable/truecommand/9.0.25/helm-values.md rename to stable/truecommand/9.0.26/helm-values.md diff --git a/stable/truecommand/9.0.25/ix_values.yaml b/stable/truecommand/9.0.26/ix_values.yaml similarity index 100% rename from stable/truecommand/9.0.25/ix_values.yaml rename to stable/truecommand/9.0.26/ix_values.yaml diff --git a/stable/truecommand/9.0.25/questions.yaml b/stable/truecommand/9.0.26/questions.yaml similarity index 99% rename from stable/truecommand/9.0.25/questions.yaml rename to stable/truecommand/9.0.26/questions.yaml index 93955f37162..9b1f78d0e29 100644 --- a/stable/truecommand/9.0.25/questions.yaml +++ b/stable/truecommand/9.0.26/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 10031 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/truecommand/9.0.25/security.md b/stable/truecommand/9.0.26/security.md similarity index 100% rename from stable/truecommand/9.0.25/security.md rename to stable/truecommand/9.0.26/security.md diff --git a/stable/unifi/9.0.28/templates/common.yaml b/stable/truecommand/9.0.26/templates/common.yaml similarity index 100% rename from stable/unifi/9.0.28/templates/common.yaml rename to stable/truecommand/9.0.26/templates/common.yaml diff --git a/stable/uptime-kuma/1.0.25/values.yaml b/stable/truecommand/9.0.26/values.yaml similarity index 100% rename from stable/uptime-kuma/1.0.25/values.yaml rename to stable/truecommand/9.0.26/values.yaml diff --git a/stable/tt-rss/4.0.23/Chart.lock b/stable/tt-rss/4.0.23/Chart.lock deleted file mode 100644 index 73053b4c9ba..00000000000 --- a/stable/tt-rss/4.0.23/Chart.lock +++ /dev/null @@ -1,9 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -- name: postgresql - repository: https://truecharts.org/ - version: 6.0.34 -digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a -generated: "2021-12-19T18:50:36.437230801Z" diff --git a/stable/tt-rss/4.0.23/CHANGELOG.md b/stable/tt-rss/4.0.24/CHANGELOG.md similarity index 80% rename from stable/tt-rss/4.0.23/CHANGELOG.md rename to stable/tt-rss/4.0.24/CHANGELOG.md index 43fc33644c3..16b351b5bd5 100644 --- a/stable/tt-rss/4.0.23/CHANGELOG.md +++ b/stable/tt-rss/4.0.24/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [tt-rss-4.0.24](https://github.com/truecharts/apps/compare/tt-rss-4.0.23...tt-rss-4.0.24) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [tt-rss-4.0.23](https://github.com/truecharts/apps/compare/tt-rss-4.0.22...tt-rss-4.0.23) (2021-12-19) @@ -86,14 +97,3 @@ ### tt-rss-4.0.14 (2021-12-05) - -#### Chore - -* bump apps to generate security page -* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) -* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - diff --git a/stable/uptimerobot-prometheus/2.0.5/CONFIG.md b/stable/tt-rss/4.0.24/CONFIG.md similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/CONFIG.md rename to stable/tt-rss/4.0.24/CONFIG.md diff --git a/stable/tt-rss/4.0.24/Chart.lock b/stable/tt-rss/4.0.24/Chart.lock new file mode 100644 index 00000000000..2af11b65a53 --- /dev/null +++ b/stable/tt-rss/4.0.24/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:37:36.559614046Z" diff --git a/stable/tt-rss/4.0.23/Chart.yaml b/stable/tt-rss/4.0.24/Chart.yaml similarity index 98% rename from stable/tt-rss/4.0.23/Chart.yaml rename to stable/tt-rss/4.0.24/Chart.yaml index 4668cfa7875..00e77baf492 100644 --- a/stable/tt-rss/4.0.23/Chart.yaml +++ b/stable/tt-rss/4.0.24/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "1.9081.0" description: Tiny Tiny RSS is a free and open source web-based news feed (RSS/Atom) reader and aggregator name: tt-rss -version: 4.0.23 +version: 4.0.24 kubeVersion: ">=1.16.0-0" keywords: - tt-rss diff --git a/stable/tt-rss/4.0.23/README.md b/stable/tt-rss/4.0.24/README.md similarity index 100% rename from stable/tt-rss/4.0.23/README.md rename to stable/tt-rss/4.0.24/README.md diff --git a/stable/tt-rss/4.0.23/app-readme.md b/stable/tt-rss/4.0.24/app-readme.md similarity index 100% rename from stable/tt-rss/4.0.23/app-readme.md rename to stable/tt-rss/4.0.24/app-readme.md diff --git a/stable/uptimerobot-prometheus/2.0.5/charts/common-8.9.24.tgz b/stable/tt-rss/4.0.24/charts/common-8.9.24.tgz similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/charts/common-8.9.24.tgz rename to stable/tt-rss/4.0.24/charts/common-8.9.24.tgz diff --git a/stable/tt-rss/4.0.24/charts/postgresql-6.0.34.tgz b/stable/tt-rss/4.0.24/charts/postgresql-6.0.34.tgz new file mode 100644 index 0000000000000000000000000000000000000000..be835a6724404eab0833be4a4639697122eba645 GIT binary patch literal 72664 zcmZ5{18^om+ike9ZQHhOYh&BqWMd~A+qP}n&YO*GoA2H4`|GcJ>rTy?np4ko_tRZ9 z-CcD~6GcO#gZ$?L(tywzORF-QN-J>6d-HIZuxT=zsc~5URO8`P($wTs(6X~Jb};i+ zS8)`OHn+0}x$OD)wb7c&&FgfQ4|-iHK2qk<}PN6Kd{_uEiSXZWYKHpD6doOU45NK(9bUwhFP4dTHb zL2d`Ibqfguq`YzZ8wo`FOGv!&-BCF#s}7pPrE?4T0r2=^z~d`I2N zz?Y&R;NcT{EcQmC3tS{(C`8+hP+UwXJ7)IfB^GIf8U{=##xs=Q-OI8kBh-}tPApu! zYcMU47&?d=z&%PCJO1lJCc?gvP7l#(S1*Ct#n(}*T?8B-;z6i@KSYeVUPhQd%L`LN z02vZ#ZoJm$ttsOM0fK})kcg*&X!{Cwi5szSYr(3cDUf*6jQgp8Mf|>>G692EWZI8U zp$z!ebuh48HqOS6MwLr>Jb!P=lT3yWu|SOogEQlVp5%l+0&tt4)|CVwE3{%G=lql) z0GHpKBfcFfIC_s1K>W=__=}tnvcQo_lfLtNI8L(GG>p3&jZOXX#CTWX$J*ibDw6$Z zptn?X-2&6KF#2WkR-rJkS5cnT^4S0TfCgXG9a{W0FBr$88=H?121k%}D7K4^dm8|( z<5+d}Fbsh)ZY05l7DeqW={}ypLN!Nzld-zvN(*s|J#ZM2>XixDam2 z=i2&UkRVcVQg+7tPP!s}89Z8PR(SA=)3O``Rrb%rRUm=~8tPUsXuI*39BoL|g<(pI z-gQ`&}As_ zsh9nEPkmHXRU()|>g*)#h%#|)e$;XT7PGm!`U^nNTuirgKM9H*YWw$AjMv>u(4UFv z7gAI>KWcH7*a>cDvcYl7((!x8>aMnlY4U>IILItxZ!%zpujw2eNBVefGi%s^wd z91VJ-`aKQIfW)1I&@)|T<7r}M}nXr}iuOyg6^Ee@b z2mahpvNhhASbB(91V)<&zvm>*La_(mO^)z-7I<^YD+sHmJgel(w4 z)~Vr3EaMe!Q%CNDNG&K{-JEN>#09`pLXY56ht z`!T|_^fnkh$v!2#NPSTjSE%_h@#kF7vY`1kN%2(K7o4)&8NXV|;6tef9s9m4|4wjp zY+!g`l3_L_TpdRI_WV5CDC2tw!~)Ns?t|W>Xf@0w%DsZ+>-*-Vvi(g8-S?GB^i>vY zX^y=9X@neC`KA#;O4bS@!lKvvrL_p;`CyvWyr9NFd}uRz+XiGbx59J1`O~VVUI{_4 zlfOLgi20_PI5|08dHwqV=eA$)@Zl}UM>%8fuK97<4NFaUt6h_)|#p zF_pQl)2bMmT=h5EUF;H9okY-qu@wE|qOB8e^{$2C(vb-2Upao5tmmP6_ z*wqKunkQR4PC<^0zCHUaFxUr~q~yU02XUuLjluhGtY8ZDKl!OlLj0l0HV*k?B>lZx z+ko%)k4qapT;cxy(mKlR-)aRt3`$N*?@)_2pN1+W|0axa%iD`O+ezFm#+CWLuT?3v z@7uh=r#XZHC|w}#{OVfY-#TFUEBd*=!!i~%5X`v2VIBCqA&jhNhsw3`{jck_fp;g( zZ&(Aa{8^oktWf$5gw&5UXi6vN>@V5ix10??l(|jPkVl%k@{Ak@jvR>Bw2*0pSg`O& zgeT{~A9I^?*=QDUp^(HJRp*RelOGLLy5BKl^}#PkCVw!x};XnZFo{ z2TNb;N^7e9Ljo4Z{D}^SR*%y|A+VO}iGPsuPY8GlHuVg$|9eFl-togLPLJAv&!Lv! za{NehOC{jeq`wqo0GHS8kug_+W&ET-u)7w-AY7slk}G@-h&S3ny3U=)Ac@*n4GN4j zwdKu>ZrAG7Io%8)hl^-fkA>aJ$f0qz9J1mqRPgW!#b17Ry-VdzvhHr8yX?;i8smhU zi~@}=ySaqD9HVZa7qv54^UNy@(54S1(;v-V{=~+*%iec}6%7k^mpz?~XyOLyx`+)v zCLA%TLccQYi;BR%3Et}x`k-iSj(Eo;I`S(A5W97I(O-T(S-jM7@kM(J`=L)u?e+s;+OjA1(I{$ylDx z`gHWPKdXA0*bl;cZP_GC(A?e%q#V)+1wFd8Q_?mdj9W$L78PH4^@wIvyQ{tUH9(u~ zVqsRsk#big1w4ao3ugx{F9^&M0H0;lF&(edCuawZ+7?UP$4TbyeV-NZ6Bbq0oI|-i z{79bK&B1dON^+pFki>D#eRpV%4P5ajhP-6noocv+8GA;Nqk5M;&0`b+b}yt@eR*tx zEIg$qryV3OUMW@4e;SSbzt~xyLK0%OAHecC zpm+Qn*&g~B3rvr6#Ft&$i-#=#fIR-1M|UK$(FLxOG&?>&Dr2c4dGT9*0Bs&*en7H7`~EgpXnSSKPo?~acc4{H}nMHP2NuM3-~pmoNpp=EAT@` z1{Dkyw)P-l&&bQ^`;7ltjMa<$vgwIL? zKH#fy2$03=@igIft|c7!&@Or0d^87!pSVEV%#M$^#w>_J$kh0i3vbnz{IfF%Y6k{J zX*-`+&PcylCR#ma>sDNR?@owFL;}1;+O?3HWFex}|K3b_1gatmNtH@4A52iX<+Z@WDCQKVY$cJisUE(i3X);3{)u z{<^3!V;`r+Mi`Hiv}uE|VfFr=rO@tyh*uc^H*?z$?41QSQ-3fz-a$UEp`?ucQqDg; zn>rj*)ApK^w+Iw=koLk-3$Avt`?Uf%XUJ`Au!b~UdN36;zwsn=-(Sc*r`O<2^2Vk0 z2P#`Xe-||Fec5X8S5i4nc@<;cN>4pNa~duvoBGE8`L)P%5Nwx^;HzBqn(wh6tlAIN zf=PrKEtCRlhZqoMgKVc9EM0-?(*vW$>Cs_yDeG`)q>oVhC#T1$C!;aR{r6CQ)ur(A z1fn>k2l3=aps+3;JDTm8-iyEhrATsY*Y>7vjP4fmHEkD?d*g?4;8u9?xieOuT}?)E zQj3BrqvL6fz!XY3dSALclDU*u2tCnH=-UvpUvOOxik;zR@}m1XAtDBsH+gpr69`m| z(>0v?5;D?JcL(v%Q_c}t**p_2uLQ@vOLcO^aN5i{+?KwFvnm*~vfq!25n`8KzQVF% zD%JVjIGy*$N53e?g7_pMSzGr0s;uxg7Onv1!4oo|RC!l_RoSy>TIY1D9&)(9;PX@# zHkayY6Bi}lhdyq;@pD~b6Dio~H?^?0h;q^h06nD3s))jdqr9o}ptiE9N7u+J_0}~A zVa^W|^1)Hv>GZy??84U7U`f`n@l98Dnw$A<$oVv#NnU;DwvppFTM z>aQnP)z}ckf33_{eUbtun1UevP^Ld5jJ8g?gecTTf@%ApJnnsr0(Zb$YzW!cu3sFT z?NmgxdLn4Y;5=NqjRFrKA7Zh}_qk5bROt_D^b@W$cc#s8?jx+o@gxj z*;-28v;B8=HMw|d#kNxR!$Y+fvQulS3A83XE#nS5&TJwQxWxsx# z6_Xk_*ec&aMby52vg*?ISB#07OD~yivoWo+Fh+33MW;}30~GR#Lu7oV_P>4Qq&>1V zEvq(@$QUz>$`ZUACX|EI86o@?G(9@AS@i^5_!1K_hl8a-Xev}}(V$P z6lCUeoiT3anykKW38^8ja5)Npl~#x+EpUBS&5@0MBiH{z9+8u?!L&^%j>-X()EWuk zn^tPaBr=AEllsiw^&*7$xs9Pf%Gw7Xx)ml`W`jwz_i5D{Ni2hr1)Y7V8rF|!jP|3Z z#s%Vdh%z*ZnArGGoaO1|Tc8I>6ggU<`# zq~p=B*uD$T;V!{+qIKNED2{ZJ+?`kA&l;I355-DkY2CNGT83wz#({WK6yaqW((b2> z9s_Uznj#cRgswu^`bZpxotr#q$ph=#=Q&5#ltT-nzA!5an&_P^dFliT``t}Q8s09W zYXWxelL{SEYe@^D+%Uf1t1L8atFlDsAlc{~J=4nEs&CQReMLY7Xwbc;r((YJ1mW|l z5WHdc&gnK>^?{lZV0H-+iYp*vOOK&}VM!S3v?$tyXZuKeJ@<)ijVU+VArrFP|k_ToY3nH_&=fDUtSgK(ebqJcx(AY!1U`aD|qsFaXYyTkJ zbWR$d9oC_@(|J2WF4redZo3b$!>FfF4oKJRicl#P_oFP}-UlGH7bvT7LATJtbtDDq z84;b#9PnmUlrZ(IKZB{#wPImcVDO)sxnibg%Zd@+f^uyrOWKTtu@+UC^ykEkfo(V& z^MawIgo;oV@AmP&b;2aKd%awtd@JEJ>U6xVddk+DqOd94`jWr&~H^Fp9auG~z zMmB8h-KIty;i`LUOd1bi8xI-HXfAYRTu^kpadxGmddPi5JE{;ce#GHiVq?efT|5_%SkE{1E4ay2hh zzHTI;#hNjxr-zl}ZUfj((Y^CaB}Pooge_J5CW-n&RvPb(E{fRMixM~BETZD3|c*VJ+U(Jt3+|) zTUDg7uQ~e?DRs8`;p_S)M9nWS%*(1n5gA3~-2fnG;vZ%@HdyP^CVl8(!m4YxCtQPL znqOK6#jeSx)vM$h6f6u6(`p$a0nPS{^(Uq(We(De37vBIw5s-%Kz=IXyFtJDw&i`a zy)lC-gr0vQVqeA^R7*)P6GmxDa%@EgAB;}x&-I`MT+*e(mijr`ro)?1fep;(AmQ{7 z!13kJ%^$cQRX%?8#RYOQW5beF0vWrrD&FZS0FcOlbAbkI4Pz(Ei#nC znKD}CTGCn-=lIdfXZX?TPO%a{1;-K%mwA@xpeGQzD8j4Idy^Qw{IacSUKE*Oe5^%w zd5hhEVwJoWr0)NKfzOtZ8kZ4JXv=xpJf#t9X2XN^afsHt2e&$Z?f~exQB8{AKo(^k zAjvwIJyGh|*Q1eI--CQ-&rN(3=iiVTP1>B*VV9S&ZB>EdXjx@N?syFfO3(13D{h=! z2@}=b%Ab*akSSIib1Dup$CZMI?e$KwvWS0i+tYL|Xr+y_bKbiYKVBqH_ zq$14)6mIa@kXOiRlo=K){zK3b)8hRZmNH#r5qT~Y9_77o^VwC3gnfx(nf1RQ`{KQI z<}csfV25&q`5*3vnaKS_9=PnZ*lychmM|n3#VL^5C5lkLi-Up%7w<*#W{Neu1+P3W zOM;sC7w>g)|M7LlE3So-rvskF`@8Hv$r>33IrMd4LsR8Snkj#8il5+;{R~dl1ey_I zEW!|(Ik9;)I7O+@3i?IoHKFtrHB+uHi+SPLPxPF@iuUCVGq%83=P=oubpw7TkPvI& zpCxqu!z$T`>bJBK1yWRNa&duPa|yW&=AwF*tE4sN8kp>eMV2~BU}~p$e#ujlkg6b< z0*~55J(`tQCEj>ekgbM;7Zs%1Zb%!h6Wasac-C|sZO@8%zXU9Y(C)oGbp`2PdiO}q zA`)6uxqLz$_|6de=V~||I!wNyG^(oKKVizP#pW#GtEK6Ti#2caTbhge7kQBm!}xc> z9jGCy9H7kHG~nA?ki{>gma%&^!5uJVe$K)98_!YoAmE zr%bIO9@>86%*^Ny+!dx9>E4csqJONq`?dKv4YkhmX{yJM(Iq2wK^pQg4%Uu;9&5$sdF z|Dn6X_wbw23^Ukp26&7*-gm@jl3M`~Kb1T@B&)}F^W+OLu=LjY5SETOl zhLb)mwh6Qj$v}f-Y>k*nrger<>L|(KggeKjFa2nd<5%~?bTw`EzkhyPSdI2yt^gux zo%e|q)BOI5gL>najqahc4x576*p7XbHAWIJY3NP{V10VYzHZ$I7d1GYPz6avM@y2)wift)I4OdDNA<(OqW;OJ@9c(3s9Cg&_u&FK>)06E zz`fI;#qzgy2r8OXx~>BN5($dr@}J3671wC>X(jL|x=uONrI<2N()|yF__3@j!!ajh zCVUM}-t3>aiKK1cbBHg9+xUW??^38>wikxy7kz@`Cn)-s{{#+9A*ZaG(^$qkZ5bj@ zVqq80&zzRgEY43zKb$1}WU}M4aDoR4)d97)eL%0t+G`NfSHsmuqqFNiror_>!E>xV z2Bx(P4TLY&SJGoa!_;r7K7?NA5fk;-L>ynkkml4ytko|Re=?oFC|UTy1EG06m7!qT z7;ixw6ssIb55Q>|%fN|a$UeLXSK>%G7xBwT9}(tXtY&TozZ7vwtP2;j=bcaIu5;8C z_=y=K*I)!r3Nix?p9?*D#O}z6t2eA3#j*K}(UG7Eon})>QNG`{J3JWJUzk`awsTx1$4VqiukcKAA&Fw|6DoVCM^Ng52LK_w>AF+AiNtwE>?c0p{V+N0g;I+ zRlFJw(jK24qQ>Pi^Kg3#*oF!Yw(kn_FN+mXA+EQgHjBY5xV_GH67f*|m^Kq11<|)X z2%|<(w4S&RooNzY*wNE_uEc|`bYV2Y;DgyrotrPIXzLr_r>zmZ#!MS&@;rGx^jPuX zw_hs=a*Jc3i^lE+JXnYxc-nI}_CQ&41r&4eB*W311?h|i}mZT?OhIb)197L{w_J)E+}CK z-Go{{^U9MlW0CiOJBR>D&8#iICs5ayNeg#TRwyr>VWqaR;VEDKwp&b4+J58snH)hiGedcyQRI)AsvpYt`#DkW1S2$(}vGk%ZJBZzdQlMXE@5l(|nND}z zC-3O41Kjc3pc!%V_VdyNU;8J~cpNOl)>c)Y1Mv^K4wPIE%Y05wZj@#b!%*msfSH>) z33s=d)zhtd!u%hd)7V$UfCi`)F{c_E#*cNAEV}j`8V@w2K|2;TebRR2^RvQCEzaX@_uGy4YCPcM-)%Q z1Yc3w_a~y)LDxjgWfverKVD~dKV4jG1K*{>?!>BC&4vuSYJGTijK0CLITte1x$33p zWA2^m1js~Wx@AJN@-3vAPg(a4WEJlL0+I8i22s{J`WmCl3U_`ySl9C*L#VV56o^qQ zGj`=*|C8g9Unw-Y24}zd?+zkpI|-iWM<|` AAqL)3oI@XPH3Uc8FNGZS&P&37Oz zHm)0Cug;LVEk0_6&5hsDVh@-nK~ibt%uhepgTlm~&8S|;JtI7|05Wyx1*M!sxkkqk zhk53za%TrbCVVVZQ5BgbmcGgA(`c6r0x}Hw@YFA=dOO3{j&zPDdl=O{2;UF)(d8p| zu+J80u2{D(zUMozKI=zYaA4)&Vl$0aXk@kz)mri~` z*`djU74O8+HayZ8JHYR}MyPDl=6_WU#>VAf&e~-t|fSCWu?J;c>p}&Awig zg)HEuPx7|YvR52vfUK?}_;S3nk3&=T%X)zxbMkUlaj%K1t(7%OW+wYnvsiT(v6#~J z_V1yEN{r^AMgJceMiQ6MNp{u-@xQvLYIm9XbSe7T`W9tnb3{@~otZIgmtK&^`*@dL zI!s5BZzIXjWp-0{4hHapFCiNhrgzIZGy@L&N0F$;`w}~F-`teGC+Df@X;M$svzyAY zm?nQec$_0KKK2|-_N&Y`-;_|0(k<25y;p^f&Z}LdA&2OEy05P^*!5$=5es6hzIA?g zDGtj4G}QgZ5hM9~)@*kjEaM841YbN+>0 zw+y~$`KIw0Ed)cd`&tU|mN5AHUN-1RciNjvr3IqBw^8GtO6hSr)_c^27noY+6#=@PQ2k@LM%}n{`i+#5q~k zi%%}BzziWYiM@ov#ZENmr-zz-=}CsxsrcZA8^q4TB9Zv5*dAc)ne9^b4s&}>cC(uB z)$-V@D+m;%d=1xs8$(?pAz6~ixuIlvm&1UW*tkjcIM01(N+wR9|NDhXuF|U@|IE+_ zv~OblPQW4%<|s_=+tuIEOvfH8Yc$0B*9?MLsa8i;`d^!)IHmI$0Z=BeGg%yjv}1I3=}YH9%`yvSV>8)l@bvMc`I zuHn7wIX9s>WsiA0&cFwulB9rEm{qCv!(+4!8H*Bn?rg}rtw1zbNA0c}WkuC&jpViT zUVBUXEd;{Vxl-@G=zY8Ce;$sSrWa`jE^@Mo|~tNO z7d#CJnm|&BbTl%#s+u0C{&r`a5*>cX?9P}}aDt0%UVCRZVS8JTXC6|L5nd*^0IXgS zfra{W2c}IM4JIP+DMm&-2p?@;SYGI7%2-4f%kZ1u-1$z-2a5?YT=1rrf{1>+bOM^! zJHH0E@0?5DZ9C2X7=rN`jm5^9rY+!Lz?1Aq@7A0r9Pp~Z2mtjsC34cIX;;R1bHWYq zYft_pCv7s^mF((2WQu>P3xh6gHv!1~Gup(BD9*oh<3bjeVf?Dc`oQ??jk9u?bzVm! zEx21XeM?EZ`19yg5NWDs=FV5)s(r2*dg%acKSxtrCNpdvbhA?7x%s)~)BKu$GriZ$ zu>gMvc6{DUZ*IOLFl)T+AX5vgHK%+!%B&O%0zXIu3#k!HFGVS6Ax(Bnv>4$rIW9ty z@KCq84?UP)2i&`Djd2t2mU0qpsRboiVhL=~!)Ir<=A#M;C?WE$m3^#-zY!xp+^C{% z^iUOGB0WPMQIkhxZZ8c=UEzENaUxN+vV+7Y}qG#gBED+-;%YcD%J{ zd?7p2rs00b$XPACg5FHND1P-aF$7%iV@N8jS$ntFMB#bhm+M1&x8W+!Xl&4~FETDG za{tuy3l9~~%P^viW6Pt13ZjI^5I<=Er1`K#8x*gdSfVyem!kCR06dW7leq*q?->2r z3-lt#@fYIb7u@6%Lf^UW;X%iGh!Hp_xO{Wo!v#5GrcSsF?>R92CVqZHs)Aa-KfqgD zcsLe{VI^EOJ3;a??=hgFjEvxL`%H)=8!Nn^An+o$P}k0eWl;*1u0ST3qs)`I>@3Rh zw<9=0BKt&oXIzaK<$6X2CK~;XKAHpAv#5o)KcDh;f(rkfZ>%`#j^-hIW9j;#MpXD% z*EDSEsZ(F2kWnY<@8{~}}GkxafA7QH4|larw~64x=*oflK0(zGj;E)q~}KX z0d@yCs{bcMbVsad5z6k^(|ua=|Qtp1d)T?8w2%tkqL2pOU4~L3Y#U1Kds8@+u38u+Akork-mR~F8(gC)7p51JIwk?>|%kZ(iE~~ zl439rzrBWoY8O4N=-4Uxe2SM#Vdt2brRV)9BJBX6*y=!b9=;jvM98`P-uIHtR(ARg z*Y(f6w01V5yF7Ea#=~QPPignlZ%)3NdvujUU+$8TkvCwI;wMWkB)Og*b!OQZl1^U; zuFG(SSH*#d$WkLn^GjWUitJ3&U{BKr^RmqcY%)2o*69Y}oD3=rjr~>}ZL)n@x}Hzu z#24yEYbpTTTkvb~{Wm=W+1Ew3cB&9uNWUk+6bVX>+-GVoCgC?>%OE95E{5fgg%sm$ zNbV@ituR0N^cBvs-HTsDqRsg+3u|^Qh7J zHSeZtyNi@u5n$sJR6dM`e@mNmHa)EhM3k1N){%?Dw03W3@%Z5N03Rdk;#x$W6ieQ! zW&{^YfXB(Ar2H`-L6YSZGs;OiPFYD2hZ3O8f`Bj{MM#77lMCY;u{y8)G|QlXi|#!RMqg4^tf8z z^|5gUdqd*4J9`}^H6YkxHI7y;cZ^BKOSypNA;jMJA;2G(q={l1mpKH8RrjjflQOkXco;N$gfCEC()TVJnR0_udyN9x8P+ves)$x!d;$7c(*msP4> z@5k-_;mC)j6wyu|zW#47clYP_BPGj3-?!u2qb^IL*_%8HJQ`|q852r_?0OxZweegc zKFmnTv=c`ONSm;9HqMI{CN>@}IQ)YRG;T?*K+{LCGA!<%{x?a;Sj1kQz@lJ9Fe#{> z{xe8LCZ}GFK=3|+K=3XYd;naw!R{m2i7p2B>A#ZYS^Xma_am~cy8g2@uf9>>t!?*R zVN#y}1C!^{y-VGZ56taJ3dl}ps#dQ+V38Xdw=9#>ufQd^Y)6gV@}1m%m48*Y{HOgh z$XPC0r{?JrS+x5p@z~G&b?U8b+8WQwUkOXm*^Zir)KB8Ei%?1*8ryaEnFCAIE||~lssD|1a|E{~=1g zH)-B|(?q^ErE|akr#@-XUC;cBkH;5-<44xAG#(@x*LV2W|0Nkki&O(Is%2@sJt|z? zw#!6Si3&+D5^5;OTIo?GhT;Kg_)Ku#7h&^2%$^fiJN5ut{YDGc$S_|~dL35_Rv4Mx zaF(W%X|sFvl!WX#JUdt&SyAE7ehM)-pWYK~fVtS4klsP0oLJ!y4nt4$9(!&FTqbW3 zEd?tnCKjq&`N6QeJyoNgknAA(8V`&lwINwKqqs&|x2PO`V;W{&O?<1`Du8RBSjf17z8HwXX!}6aa1e9Di7O^McWbcAfsX|#icjLrGL{-=TVoHa4LOr zsA1frMMDP<0uIMw8f=_TKM|V;E{8x{OF#9;mg0@FK>rLju#7f_DQKi1j4Zk>C6jg&geYzB+c`M?E0kb#J-Eqq-mJO29e@=w%g_A_oI0RuL)VAd!=4 z@981fev`>g_wC(OeY-!HQM-GV_Svys!l8gt0!$h@l+W= z_Fx%x3EIOAAO6DXB~+0WZ&han1!VxAOhlmP=42mAwBrv85SCk%9|;)_s0>98(=6y; z2ixX#X)MR1ibAcVAQ!7p_=#A$F&)wm5;4oP>}GLHJVhCE6khB$Dy$*?m!C#3i}_s{ z%*1x;_sZx4nWlRpuIKqF7Iz{B``UUIF6KRlzObKgx9+8jX{zxAv(rI%0jO2T<3iz3 zX@D-Nu#H?mGX-5p-$|<^boe!fen+9}S3G>3%qdFR0*Z2^-$nS^=Y}*JdHLB}guFn2 zN7YZX0>u2@EAyESfxATCORHfofilbCE~z3Nc2JP<$;O0jLJ1nG#CZmlFle0nzmhGS z>gMNzpEHz{5HRP3Xx2MJ5x2hzr?zSVNm)M~EHf;rH*REDZdFZ6rzM^R99nLjerN~O;3hM-Fp5L13IC9FT{A*#7BM+4MEa~c9bMpmpS;{gVO}&3n8ziscjkA? z|8?_dcGL1Hl7wief0<*DZK!W0WvK<_$hc$p+w0?dWZ(;`l1ue=o}S0Y-?zQaubbC5 z*r2!1_gQ3R7Rewx*FX7XM__4wV(+WTj0}>%{wH+&!sN!JNb3$21i}luW&*L=82#ZUW`N_)c+n=SRqRnZcg zN_D9c8=H=}-TmRFQqb13AX7dxGOO`rXiUOzGt|V0E6I$BLm9>GWvKJ~DXkp~{Ro4! zm(K3BqaH?J&*}ZoUDbchQus04B6NjaT=~bPMmbcE3bmS-F30YxIM@6^#-BhK@`vkp zAuAnzUqI+7%}H+AEX*m!BVdd&+jZZ6aT7ih@^uwvr6;vDg+M^VPAvvk3pd@uMw1v# zEv!m)$f~qX8XWhtwNp^wEw5c zgf&!@g^}uUwQTHrSxue4tsi~+xOqQ49~=!R&2hNhUcbI|vAsR6?Dcj6^?U+~=l-Dc zv&$(eDL$7>(Ot<3q`nx^)V<7~jeJD6rD;t{A?QorT>obcJvGWE223v&U0vW(NobDF zMRu+8u0sGA_ttfAW1nG||w$)x6!%gLw7{+Ws7X@MebEl0<7X{%K!$7w&)IEA|k-Aa# zGXJDyB#N5A{QlF9`l_3PY`Vb?MS(LAVGJ-&QXg3Yf+hzb?H>#=(pb9HZi){>KoGS8 zU1^lJhilp+?EHq6Kjp`}E_v9lt#s7ln2NR`Z1^esO;|+uBe6G1hh&A5u6WfVw0GV6 zc!oC}qw1g>?ye>iqv!NgLdt%j;aA9ovG~}zaft#$TSr|qFaD0@?w=#S7s!#*4(XcBvq( zUVmu|*5Vr-295DMx3{aNja!TJ-y}sH*{%@(MZ!3|CYquuD_kjy(Q@jmOr>Wo^~_ta z+A3`k`ZN#50Y<9Ky8Mfa70xLIZfdiWHEE&`e{H15>U_tKH3`Nwjo_mK^vHL)R#1Ke z4&oHv(Ic=Qzp&*3PQ1JdkKo!RfAI-l-eFR+v6^l&6IMzrLOfm4mY3%K@`!$`u<1TG zHBzS&q>SY9+2OBtX)(sXC2m`$g()w2L^-M_s(6S$@ec57TYf8ISba@_DzBAT$Y=TeK!8@8_e_kIfRw3~95 zU+VF&1AH9!I2ufGc@iuYvewuQN>A$HUFH$!<6qqnSRUsyiq2cl)$YY&7nOX4;etDM zoQxRZU3oJQ^Im%6M8V?Tc+Uh9e&+venwok^V-nOOAn5yWdiuUSRP~`ND*8$*tJ}UN zFvu0`7im#IZ|;_nM+?+^p=9~ndhtu^t%9@U?N^>yYSJ!MfrNu|r-SU5S@D_Vb!nWW z(Z<sPAZL=NYlNfH_KF@K@8ZweP9C$D z$U1O<#j09;XO2>~*Q4pJn`qjg)Bdpkm{JGM)61C}U*<@+4b_uxyxc5mQVAjjGF4!6%as|2&E7>;N!p5s)xowET{b`p#?BUBqOXUV` zL}v{xUQT0+an(i)eGz`Eiu+d_s5;M3;##w~@S`(@{x}~&+!--nY+NVx=$Pb$N12Wd z4nzZjgURm5z6<8_t)=SERwcffXJFm9v<=BEjrIq2$tJTT4Of)PB%Vp~eJS?QkBnx` zyKlO2@?`_c6g+c=Vp&^oXK)%k33;>!W~ke%iQ@AZHi{H3;Jv z0uqeR6D_i$U_lbd)hH?pvchU`D>L{)?BBniI7mQYHYj?w$Y2;USW_7S*cBEujIvnO z<=2(b6_!|%^F!IiM5J-6=2_k4MjFA~#8fe)4;fgG2xY8r$OA~h+=C&S?X|8-gaMQK z6Cw^`J|Z0{&p{Y}eYT+UxbGNPaJ;th^8{P$Qm~+xPzIcgR z7&Hd}La82EbX|Sg?yUm^%FkKXi>Q)6ZlPfj=pZFeUCKnf@Hr}rf)|m2ZPRV0^?&ZK zFp+n1l`A-{D9mgt!x#w0hnd}D>~&PpmzFWaAhk!77cqhq5aPy6B{=Iv;q^5J(s7%G z_(-l@s*eTV9VUM0tXlWYH@X#~TH8sRPKb7vfD)6aEe1rX7Xx_3l~>JlR?X}teyoq; zRQa5CGN8HTn@j}s2SA*TH^YSCs%q$nU}|Edq+>3t7YZ*W!^2o7n#p1tHUH^wBKqBC z9&C*4ZCB38i~$YL`lFLw($qw!m0Sl_9m7aOt%)Q599yoG!Pd;q*p$w$J-l}#jQCbN zm4cYeD)St`%npOoXd_&WBh0CQSJ5BOZi39psg4FJp)%IUz8z)O9@neeD53^J0&yM{ zBM(Qsv`PVaO51Ekj#da}mmU@wUs(Q*4K9|dPH#O-$`c1P?A@U_cJfDWHiwZMj&Bg4 z1Sw+apHD?eKqyApNP}mxtfrJh2SvxrnbT>`%qh!?99_6eJlEP zC$g$&e)Y87^l(BoCjHyb_x9Na_!Se295klkm6xp}i**sPO3O)^V!kR`FwX7P-3+S6h&+ zk8VV=F~Ku3jn{^PIP8WUmNVkQKo?YE_Z{MeOMZB2hxD(i3diE1V715n)1J@$!_%$x zvFJ6+@V{qgO-+`k-{#lx+A2?^|2m-qetzOmfufDprT01WdF9QeM#BGk!3Ee)cgG5 zo1?XrwJm=&R_IjcY;Syyn_Ea^675biNpv{_TTOJd13M$H8Z4+2LlWQ%>?#j9H>wyq z-_Wj`z)-BuyI0S(Hetr8tsUu@Z&O>rg6+-d=!tuKaso0LL*cb^!~SmKWQcjBO3W+g z-;IkhBrcxhZ$TDDDQB^x!LHf>5h5B(%P+Wy-P}m4=VB)&wot*Ry}qmYT4f5ujR*wv^=8Q_6hL+nETJ2LD5 zp}|?<;OH2RGYn`;j4);+@G&cgRZUIwqy1}tb{v;HVE@vucB|>LOJf%-aLYg3R`&Mp z^%QKLz`3x+v%oG3q!V2hU6Hgbkug1Ntjr~Ytn74j#T?UjJ#D; z9L@Iyin}|6!6CT2ySuwX2AALx2rdbd5ZpbuI|Bp{HZZtbU~qT4e82y?FZb#8L-*;` z-Dg#uuI{SZwa<1ZjiZwx-Q(b>z-)ThD+sEx9+^Adg$gqaB` zz7=7A8u0nC1ZljwB9Ap0TID9jfBPLoWtp`rOvSJ#Y@*1^n3%9Nk1u_b%_RYi zaIQA~qz1iYxIm`#1LVX;dDqB}wS3WaSmKocXgY>6r7sMM^VEhbF~e23Jd& z{jU$6&GUh$~oDtxC)Vx=k8N1>hI+x$wMdL5Y|9 zt?kX--Hf2e)4{>vZUKptm+RZPX`X|J&o?`r*a~;Gas2El|08U0z*)xP1TNbO;7QNhaDUn4I1drD;kjb z)qCV5dd){c#?c8HlCjv?x-;1+&?Uc>qj;pj4o;2+jr1=pVpkC<2mgu&{q4Vv(6;zj z@PPH{eP4SCHt@ga(e*FKz`nDic;v9LyttSy(u1rv4eA> zL6b5T`vtXE;06D3DYbV~BL3ZM(+K;&%Wj2}GIK~)7SIBYYcO#D6kROH?7w~`xF8w? zma%|tVYkmM8w5aE#IAo)oF1|7&9JqBW@Ri63;YxI#nJ*8bE<=@qe1gB7DrpY_>HGd zV$TOB@t{Q+i{k>0TQC)EP3f zuFm7%4I<@Z7?LF8a2+AUUO-T6|haHk`8x7j+KjY+ISO~h;IX1fC zqojzV51xny?a5eNZ6#`76>MYWfS@uK*99DpVB%oE#X@YygYV|SebJyz8H@7*j{9?D z=6g-%<40@k;QHtxm74eR5eMF{5d|_5MgG6_eGkJqVGAq^g0{tO0mo&X*w<2X3EYNJa9RxgXV+DIegW6;)Rtq>z z!Nk7Mc#-QtfTJel-NXjGo2NhX|95%Igz;3fgK3f22Z}Co{jPuV2g@Suy>%&BEEaGa zgNc3a`(0{pa7*yBJz8H=U@j%6^h3pAepnHrDuF$}Y(k;K%ZYD=U3;~cS* zA7kqEAlaieW^jF!gkpVEL#O+rG-hx?6i8FXqI}B=osX`7B@LC%cEqXmvxAHt1)SDv zmYOOG-mDTYeSyfgk&)YKVAJZ!-+05(6F3xsc=5sC})U< zuU%tHVRPtjZ))KfeNx5`Q_x@VE=jcQYKX6TUOT{pU0QNjTCsQyeq`8%jsD1QIG4=Id#CcWq3Ap+&`E3;eA=GUUUa&B&a zsY|MZSSMvWBha*26oXhwvyGEcCN_l`^;}*Q=ljd`s#}cbT59#1T^*Z)cA88r{sX?M z9UTW>JOwYR970`u+J;marcuZmFmQ4HhkP-525E5q9Q~O+{u_H%Dz6qa(Sg$~es<$u zI~5rG8aTb*+$&HlSo6OUtk&Gz_82(H3FuFuxQ^*Mcx|-sOS{u?&`T4oWr&{#s!47Rp$n$S<&9Q37|9=43r7xB` zp7U15*$*F+`8$O^ehhUnKBBFT_BEnm854u4DfYXKqOrQeUegj z8O;hS3w)Y!tl#tSeH$YiQ0syv?M|vT!ew>lMZs!pS&qU8^yN$+_yBJ6;t86YN(6O`7dy~?_Wg-|DmLD}%W|U5b^K|$o1KKFCVBR4chbl%qFjq?z z+bTu~wpj=w1061EQSD&V%%lnTAM!DxX?;?~`1KxO>L;XjKI`{XznS?TpSCZd|qhx1%IIo2X6QTUhumE78>~(2@fsOHB{_52yF} zqVOY16G3Ki5IpA6Xugxw_V#C?h|b3}nG}90ilqsIQH8&5a}kW8(r`fn2gjzwLx_(D zUqK{IVjQ{BYSL@+X{xw2<@$(EzES;U#f;jD2H1G>8gri?P4ECGOgXD3&XrE@XIGycxB6> zSGMae-G7J(a~HjZe$(j9y3Q4%xf6m?YRa40ei&JaG*zXQ*p}a%Hn-}#|B4@7Eo2s( zvXc~|Y^}tG+%ixL_h+rq@kT@4f8xx}l@iD9hcXj?_9GrZNjY#=(&{^W=e!0p#w(LG z92AdcA<2@6o$N4SbY1glQaWtY_eEHBYSJa?^de#((f+jvv^cNhr!mqS!yR>eQ0n~G zvL!yP=7RB6DXBD_s9w#^88&jUf!)DSV7$H>Zcy9G$nAzJ<%et-_+q;tygI4C_BAoN zC$q6iZY-TJ@Zr0)K6(thk~25ZLzW7DIm)8K{@~?k)axDmZ?bqizB!8jSwuXwQFKM@ zRucZMrg8aiPGdRCV4rg1Z(!im=?2G|VqZ8VE?E6m{f@&TTRg2M;jYOyu$FxzhmuxK zC@GP>hCP9DGp3gTP56FP7`XQla=X^yl#-{h64L4F|4X}!D7LsTjMmpg`{?A`!UJhB zJ#II^bcHvFq*eG*_aX z6(e4SAC-adb2@14oAfpwc`}e-XLX9kjB*e+<8jla8|!bfz4J3XwWycY=alro8T1Sl{W@eI>$VNw_uxXJa`^JLTK@-)5vf}EA8@ejcr znJIR6WoPxbbf9CxD5aqNjZA5E2{|D8k!c41ciH!-=4*T3%KM?uLvkI|)%ia-X1X{2U!R>5ZQ{3*vlH6sC;2WI=2QHhnL$p| zcLR|D)TanjbtdI`j(_H-Q~0#LyXH8Rp|fH1A!&7MUVp_;a*qP|rdYpA7I-KeV~TyW zPyY|C31uZ63@8>W#ZvE`S}ZE8tjAA^uFPy}gh`FOv31Zw_NSPa={&^2n%+3};KlvN z4oRJ39&i1xrj#y*Et?P9f^O-V$8(r3?5mCldJuH1( z6)yosGqlCA%ezlIx+w`kyuSo%nvqU`RxWa}E-4Hnhv0`6YJDUlfvlNJsW-V^l~=egb+W3&NEdO@QN-tZa4oQ@jj|59>-EhT97mOB(NDSp-Fr7w!>-l=kN)BT+^) zNjuH0bMmL6Z+nv_#B_GK#Rrc+x5oENywa{E?9iH1l2cLbMEeqm2d$6gom+nxa@EU? zk0_kR2{z3_T6 zmW``n(Ineuyzk=84m>Iu1s8(Z4mS28r#5RGm2ofTIDyKvi#R-NaE zE72FC6@ffxF%r(`RBAZ0H(8pu?Ne*+k&Vc^Cx!xiv(GQN>GAFDzF+#{U)a%0TEKS2 zNlp^IRzYd5){=scLLPwQ2W#l_k;N-#I?`2wQxn^Xy-O#;NYR5_93dtdm9B!Ob|p>& zk{!xNkc3ApALa|`DA8Eb#9(hC&jFGG&NsggTygaWKb)=DdJ0{rSZHTstE?irfr`hr zwj#58A`%j>D}xsg8_<=9tm{_Xh>9l00yE-#VS?CjD!!+^+g^XI82kkJkNT#?8m(c6 z;xV!-v<);Jx{>XihTr6;Vl$}Ozlr+xHnHJZ(7Qr>&4?i_ib3ILEwbBWr7p>S>R}l5 ztKSFsR9C3A{%TyR(-B!N8&BdHADgi1oi1V3JW=T|WhdvjyZjty1)w>9&0=Xgwb@ZQ zZIdtvegC3Kv8oGpzQ0T-p6c*q3{byD(ko8pN~1cUY4Y~NXiobt@18&g=M6rCePp3z zKfL6mVMg<*apm%>W0L6fzV>QTYZG*n;zs75#DJ5qLaV3<$uNbqP?qCRNSPXHDwrh| zlQVJO&ofbErg=kkV>0pUk&KlG0A}7>4V_}BFLaitYk#643KuCcqK1-YLWjPMK^KTx zIaJO8HTF>zVqBKR-U`5Y4rVfk=a1~b~{I6n}hIO#^V zxoc#+_9GxA$%aPdeIDzERXuXG%a7CUcO~X5Su6F%A$A>T77FmE{xBrXY0%^lqYn$? zDy_1@D~C>Bhs&1ocV8P7Wkx_JUO53%H#r5keeXA0>h((1-7n7TrNCj-P5R zx`Kbcy&kB(dfoewEbf#9b<7)9D2|;3|GQHIkCdvI{2hHVuCDB$@v+`YU;G&%J6%m_ z&H*>ko4)h3I}YbOnD=~9=BF%P4{pq1?fF@4SxGa;_37J~Gji^7SyMRhng`TZly`EZ z)j-q^66>z*R2vXTDfu&~pPH!{Co?cR&&!Tief<6lNRG3Pi4*v2*6vLx! z)y}Ard3IqBOhf(goWY|g*(T9TPv6b~)z`m~d6(ySso--sdP%qp4QT6iZSW2(r!uN#9c@$~H1pP*Pf#$QB9JEaDvar-O`rNDb>2o5O9N{X7 zUPQ@GEH}W^ty__NxM|qIvdc>Wd*AF4zut*%!Nxn$76CSCtb@hbWNCtCjB)Nr*D%3a z!o5n)(m&S&fe@FBjGMQO{idT}8810@jFVPr4nyfg))uyc4M(Y2(_$Z=}i z(^;>04~}pt!U)w+5?8sSOI@FK#Fehj2?1^0l6Hg{kDDPOm}Sd>uhb^dR%RycMpLen zAIeuv5ujEXDL&Ry8k!&$215#li4-Fca9JNs#GxAGY$D6CRa@~cl%|?Hj^KA$ibdM( z$N}cx)3gw9r|D$NQj8TvDgKgei|A?6qd!!%I(pudqdcJXQv7B6>2_^~pfo z!H$+?qJmb0oSc@ol5tz($yTeE^0$4<7BRY^g0ZQX2mL0zVyfKq-IlSRy+ay@N zX#)ww9tHtKTzWqwTzc42N@O)~HFf>{0t4ftbiRyYg$Nam#Et^VWak+bRTt{Zzkhm~ z|N5TG3woNqt)_iq%81MpWi^(Zp_iFjkYDHCzJyJ3m)E}ygEan`Mp4#GzA2IB^UiEN zQ%$}qi+1GWI2o_kcF0VtXs5cGetpOi!#$+Y^upcka6wr-^rNys$5cn&gIT7)+HEoK zXTI>ypGkQ6aE!(FiQ;t96GHp(w!c$L)*Yy(z)vcYi!TBihIwT^dDx=+N%@SN_3e%M zM9N6V^K3`Fu2nq!mjKRTYprrXA`Q9Vwl|QOhWT$0asvtmW(~kFER(S$_Dnl^;EpCo zKL8y&MVIN*m*&uF?o7{4Iw5o$hhc;foESy(WjhC~ryn;BWV|T$7fAJC`DGLs*BuXz=qLwTzNGB)N7#QJOT&lEyY7L#u>z1lZ#=pF z>Y@Q^(mx}<(3vyQkW1@z85>D>D2@P!u#~?gbfv2*-WwpOyDAF$ysZ4u$v5d=_gqRi z*ap}Au4pJQ%yiA|71P&*@=mX+*@V!ju?RZgaCean}{m3eO>Z_=lSlMTn<)O%wYXgYZ>c&T{DPX}+q4 z8+lK;iELGZ^LfGHZrr*E)76?WgjWK)FeUPbn|G@ z9hT1-Xf@p6qJ|94V=ZeSO<9ZOr zf+JRV5c);!pjOC^^vI+R)rd!uWp{tbDav7?wubep(c956dcjIZt&lI zo<5JpfiJh)+b0?J$9XwDujjXrvN4X~g-4T}#)R7%iZ9Cl^XKW|Uu*#=Xf-&K04<19 znul|GYuIu|>T*)<<7-gf(HatVDEf4%IX6m3C;? zgKc5%r8GojR8MH9uCAu3(?e*9>($3yWQLot+tUXuR=|g7dQ)Ay7Z&D%s2s*L`D`trcfiOiD(M$V+t%8g$}LKcgm?vy`|)ySwm9-asbF`)vLVlR zFRYr#swmWgZxeb_=5hGFOLM9!lsx(}p?1jJS*vtBQy#RRFU_69Z;x``Qn5l2jdS1d zpxEuvN}^m^q$sSmBTJ$pD<0Ovi~%XX8oXdbb2v(Df3|4P$-;nOiDyJlE?uisDLk{fDy+@q*PFo%70CACO z!`z(79hz9C(zxV2Hi>E{@Lnnxv&QF@bY>?KP?6CefdO+muQao6W~92pE_l|<)t_2o zlH@u#MC}`i!w_`NUSde17K1AW(>yYVd~>$#up$1fv7BCN@FP4JaiY6cX5nBDufw+9 zq8bI&F|Xi>yHF`=dGu;LFlRrR4xA; zOOXT``6x=S67a2HAoQ7tVgPu^EymQmmm;Mt;RU3 z%HQxDybDL=IY6D zmTGZ9mE)U@0!VL(cR^8wcqS#9uF3TJ@I^yqTl3{HG(M*81n_&P!2$AZHtKK|-z%ZG z5BT`UGd2=PRfJBOju7&Or$c1V`#YK(BiUWgJ1zEguV0zUKLzq{wij$wN9 zJ-JXaGHhYZ`Cj_+n+-M#j}!U3dvnpjpNNyqRFc>t!Ni7keVVWe`wYwZyx$IDN+^N0um2mzfjn9<{ zgto@IO4MfkIS$RV;bo{sYJ5xxmgUJF`BOHB&!-iIU+>%tTj(fwIMwd4f#ZofEK8?B zYPUy|>wz(mxlP)L{1ye%L>-zLhlUJq+}|hZx&-ikur%F6rQYUF43S2Xl4vKbOBo^7 zc|>e}LHJ~A_^KPP(PJ;QJ8Xff-jMz_Puo*`eT#T3wPnX7%I@fs2PP(c$-U{RZ206I z0m%w_9(ll)oPq;LsAU4Nkp9y{>dM2$5*@I zk`X+19P-7U@*FD(?M9A^66HAKF`%w2LrjzF(Wc}3!+6%e^F0s;h^U64EQIUR+>~@5 zm=|B9MZ;{9wDic*8cIN;!ea(BX^~3$XM*IuCjz%H(2leOIv{4`c&xk;bCGqGF*UoC{96qX z#kGYibYeh(tFX$D?^I0^2BUH52exRuRz#6zE$Y-+#8L`oCC?BJ+Zgu|JH~- zKQ|Yhw)~n_v=CiOQJ}e`jFy_YdS#ILZJ1arR!J*dqRl$cd26W9Rd>8BHlej8%m80htQk5ZwK3HXMkhhF zNiEY}IH1&=Szw?TcAfd6MHP%Fc-&LyN_nW($+E&RY3s2gdNddJr*14{tP8^0B{cXXwF8k2`Ri|(m+`wSrYuuWqu~$b^nL~<(futt0n9Oz z%GkQz6PeBFWbiI$5Ei%d`r0uN_M>_A1zL?C~Yk=}6&Jf41(~ zAm+DXSt+k9WWKl$U~TG%Qt=bbjnJu9QGF50O8v@eoKKjVMOpO z9et-3ko|KU`K>hc15NLta_@|Sg~?`pCmwjq-y9`>3Ho5M-+z(S+yYITgFQXLX`v zPr5x{XS`mjm1j{$x|W7_Np?KCP}zEkl>8i(_F!RtEuH#lPs95xlS~%=;$Q)GLRY)7 zh@$6gF8Oi^?Ft+wDL0h8c>kwm&EIE_<}meBtLW3tWmOT4rPD1u=Skiw?M{T*}^o6=8p2L4Oi@ItuzL76zdT8xctBk*3CxL&dAeT7?Yo z^THhXQn}QrpoL$twE1$+H|$CiFzCVT|Lq7aSR;R{?9DHuXPpKxu0ILHUN_tK^x?zj z>&!AiUR*@&7wUL|?Jvlp^CQ65&+0TbKVIccD8T_F@~XR3;#b2#O`H0)9vqulm$l%H zOLY?nv;MSG8C@GJMyK)=XtTR4DY)arMldVi6pz&=bwV6etLZfx2m=!pDLZ! zw1K|9#^L#2N_ybk@p1kA{l*9Xw2#Lg@CbV}_APj6T)p?mn54R`-so912kGL?b$dXD zmU??>i!2ruf$)w|DkKk46bC-Qp$molH_Ck1kcjYdjyHBx!Omw*=o$EMZKoqon}lc%bbF=O|qQ>Dcl$MKUpm-Nz;PA*djSvb*`4&J`ITCkOP>_I4WY@lAcByE`EG z0_DuOrqB}5&a;#L#kn2+DANjg^X4DcC2#-7fkG^AR(x7D0W+u;LV3Yci-Y6r5QB#Y zayx|JM&>U7L4d;-E!$}%hrgZAJEnT|;qyq&5_4K2i!V-7sZ7X8=t7!^tZ$tfmpcYb z{in=XPx3f#=rR~=25AV@K&A2dpC9_e)+?>bM~NSDux{u2m-Y8fxFF zdCyO==zc7|Uo6^rc<4Qp0|j`$0}V}^k};ZkeEs6m?~Yb{-CVK1h$Mn6D%?(_0$iTb zKv7s&4QCv#r_n86hHgV%9<8oh1D{`ehJMzi`p@>)Sbiiyb5lF{P-sykaJ~^=)Zn^cp)Pe^!VY^(Q6cK zvfQ155|+bou>dmEh&cM}`t@~E+Vm{It`6ahb%5`KV5yC?H7+(BvUDhFSgyR-Sbwe@ ztOsnVb%i#%Im-=zqwnUE$mX#S+Y659D>7MLFsuw06sWFHV^W$pX{sR5On z^}F_F=3;ZciV09#jmu}gID77Z2c2rZycW)-t>Jx)k)M#6Vr4@~6-T~y6Z-F{MGlwC zd*dSv?Qk>S*k??9m(2Wg0F#Vq^}Fdv`6M;N12tE}G7 z-oUmF8X&ataL+x&=X)O>~Bz?lD{P0e4{pOsOCQMxA}SHYAGLy z%p{vu;Y``5A%&m7?p@%IjW?-826i^y#txk)7zGHnFCYB1#?FekSEldBmD)Kof4w6A zr<)EZu8fA4%lMBv(}|Z;LQ{b-AD~fIl4jT@II-IZJM{zZ?! zm}C0LH!?`~Em)qF{)OstN1UFdjRdzw;xX5v2Wc+fJ37#`rG~G4*zPF4y53GRfM++p z8bYs$1dLcU3~Ii-YhOnKOaP;Tlw=*bQofQ=3#6_}-2W6we_gdhGI(lD5)T&HzVmja z4rbdYGNuvNZ!aw0!s(Z-*~@AvdTLQ;1sW33bf6a;7}ZF@%w9hTg*#c9_D3Pfi+spz zb#s-unjdopUc68)Mn#o!<*;@t-EJ`Jf1jlVWSYUzd5`eaeG<-a{t4&i`1&k3p>X-8G~NJ0bb+fok#gEf;XpFtcjlLk&*Pn^;<4j&viy*}ma> zrF`?0?WUsaZfomuR?z=2o&m^gxrgv?oiphu$DBr;V*nPb95}Vm)tbT zm0_eWbpfXCS;dqe;Ezd~mq-u!-}2q|ba+tsAG0iwfC6A?JqWaZ1e@`WP{viUJGQhP z8k8TDA|;0x#H*V52J84@Ko_xQFw_=sE>+FaTO0NQ5=F)4PwbZ;GK0N%ZRMrr@5&WS zvEd-CzrTw1<0!@Vy2siX6V1iiWVM`)_aHYjOis!tV*LdfQsO~|u{_!09XpVn6?}Q~ zGINLY{H;IB&DX6VCf>VX1TKiGPo|t)3bMrT&2aM~w}gDGg~!?_Li}zl$PYV?KviF`OR0zC!_3gA@stpWL#B9$&`D%G`jTlAOD6A`&TeH9RH)!(TSS- z7DcV2G}++yPT#2I9gaS8)Iuu)qbUXC*L+?E7IVI@lx-OYTX${-s&!5g^Ln;F5>eblph>?ZNLC&4k!_ARI3 zNaUB?0o?BmlC0GM#I`bX!~W^Nr3N&Ls1k-)yOoN^79+L)1UxWO^;6tjzJ?e^w+a?J zgg!CZrPL}*jIMD~{h)k84m60yF*Q9^JAQ5EVx#3MTr$gEUmbLSqDI9+0W6;opg1wH zB%SO7&*P~>rwR6?9$cL_ruDK64SlmF%0D;QWPV~gC?ms;4dg=q3G5IqJbgolebn=F zFucFv$EMA+7C?De5}CH~^}RFjkk=xii^5qs%`~PkTlxhtPZHE6gzGJ z3jJTBrIu$h?kpov_ONY9yg@1(ko6-yXqk zgZXgr))w${uu9;WzN8fveH)6%tv2BqQI>4u$MxqxEqB&=E&9;aT3GpZH<}e+pqTjYsG+E*H30{aXK=5!Oplp+RWd5pa6t$M5ykAwo65_$tuC&do^DL<6`tW0nXlk#F(|2&*gZNUbWjTVd zS2z&tDSX_A2h8egoY-7aM4B1`lnt$DoZYRPndcmLKNn_2Q{Hl@i)TVNCx)loYHG{@ z=HgvPKJsTz;zKVHjbO`9iK7EPPgX=Y708?_~{(4KfCnCvJr76*sX_Y673C8nRTm7W9Z{ zo)%wfU&m8}wq)9fwn}};yUwMqgI;TP;YPuyZ1QS}X)+Jyuc{imlPL?-b z#9<+RVs=VNp8o<#gl^vdy7fP^eA`m%dLP&X;*&^$>j#t(AKd&!h~&{z0B@Sr5!`!kP;pvIJ8-CA1q@{-BqxRWW-(?Da(3}r>@b`0 z3LAN&D{3-WSX$YT0-POciYkA$QmRW>1o3}QdwhCnRe0i%$OBLW-(N}v`o26sw@MzA z(S&~`hW2XT*mH;wyDW(CQgJ5t$@NUX{{D{UNsUU1WkV!OirH@|Nh|%Sf#I}AStb0Y z_BLUPee4fSz=_WrnWAu>J(9qZakhQKOTb#Q-;HsL#eP#`6*8BKetG{tbgn3ysStg8 zQpryqjz%uI^OZ7H)anJOEAbFCX#L>9^!~zdE!IZ&{P+GTjtygjcTL9x3G?h=(VoZ4 z%k$-+2=sCmCd1BGst7VovU$-F2iD6~DZ%+J*1P-38PKz!|U^VIEdxBdHC<(2P+f6Yh{tmfF6#ZfESCy&q z`skB$C7G{xhluz*+i_;;Dak;CnL#v4TQ9fQ)MpG#y#LP<&|~cz_*N`ng-{g#3tah9c*xEX%Akiuv40UC0#du3@9e+rNxNKC92<(a2#l~V zo;;RJ2k}|dFEP7JMOAs5-!R7V94`(GxPH_kd^8#lIZC$B4tRpQ%~#x@^GKOy)MB*Lw7#lOB^-X^Pjk&uX`Lup$^9KN z!{Z$oD!K{VpjQ0!lVOGpLfT^FwZhurLbS#o@0uld*H1CNLeSxYw#FannkC(;RtV&h8%Lfx{ofVCu)BXWhAhsb40t~00?9ln*AK`xFMQ{neXUA_3QA7(YBuB&QkVl zvG^nKv^74*wGhEIM&UknN|h28_}R?#OEDY@jBa%LZ}yVp%$X!>`EI6zHl!bO>%CG0 ziE#=qrR0IBTO_GG!=!C!wlcXj*6p1E9cbqaCdW4iOQTjjmffD%D+%G4Qx~u|`FqQ{ zG99OumNpX+1bzfGV^`$(lWU<)R?fTGD((UJGg_>UD{YbuQ`7 z9~c6QTNkS?&@mpX`cRNFu-=jw6EOqcV+b4%ni z7~n%I|D`Y8r^bdB4Z(M(tku7=bX(jG8Gcn0cPho7WfhJY4ZN|G`f)A)_A&FK)bZvu zOhuIt5*6$a_s9A7$>a4~kyF4=nv=pc}R^q0UZMkqFfn`ft4&&+D=%op@-jxyN=~rJoiiRsfXzB-L)^Q>+7Rz$1 zPzcwD#c(mq-{sM-Zt!l#0u9K{fbp@9hKLQuUt$EGyMhoDAk^8PTB<@9ldhBSH}nD& zp^;7$_~hCxBN>IH`Wd0^As$}d@8E-JHtvW%wc)4gl}JA{;|}>4v~zXy3AmO>gGQ|S zC<6%B_)^*k8N67F!PWM^o15XIg*D{UroY6bWGxvHoqSPRT)RS3)Qhm#;gJ-6%fTs{;O9hWl zg2Inl1AsC+OpoEd&NvaQ74=m;9EsdEr#5eATklmb!rjLpH~7WK10h4mB(l`}8@)dl z3Vhl%lGN?nIr@Rhb4Wii(ygeo^oDGWokNSO)XE&{xw9Hiy@Cs6dq*XyEp=?xJMBTT ztM`u5i<3}hi4W+rpTWz(9 zY9Z||DxnGMGB@0Nifpc6iP=fF$t|0Y*_dOL?AL}bk$SsI2e$O4P=JW@ z^23w}Mq0a{q)913=c3kRp~5wLxX76Vox)8h-a%spr6mrj=ood%eHI^{dNzbG24!YG zh)0{OiG>E+`gXKX!=}l>875*t{0Mew`)HJU+<7Z{rg_d*nK7w!I0-k%U;HFqWG}CSvs7sdTym%KZ<69>MSmFITHMbOkz;wE1`BrM9 zG!_l*+~I|GOgu$KEY22Zo&iDfNouSxyt|G>oXN2mQ&A{~sWnHb39+Y|l~pzEL#(2b z3uYhtkQnC4QOFg)em70D22w+2F=gu<(r4+x+`nPX3_kPPI%HN_g-$d0ZBaj-3S%b7 zcyDltZIa;#&LX$$(dOZ8JCJeZJHWu1jWvck*i^OWx@zTFexik(!vyQ4oU8)lDQ3bG z>LOi8o1=|yIqYp3f$_eCh(T_~Q*W;&?R5L<=FycfytTy$6{aWAQW(zFfRz{T1w(M> z0Jd6Lz!*GL@-YbOly{8NaxYiVpt z-6s>2WePqfSkT$Zq9CTF+i<{)7a z`Mt`Wa0vDjr39c$MDY0%#bC`q>p!Z)jn&)Z^?mp49^^>nrT^jP$(OQr9Ryl@idi@7 z4tP1hRrabWwloW;fc0oMcXI<9BprRY?y&KWMfR*yBe_m7HVp4jCr76Kun3NV5v=*= zI14k&pLBMZu+x@<@mM+{5`_d?emLqp>3C{bs=`u(?Xdhv-&5-D!v1CCqw{wd8ssxF zsolC0=@`NRvLP|>wZoY@dj2p`yP`<*IR44`CV98`V|kCbNI=NN!{ORsf%li!%We7q zzvRvzVZ*sUS}khK%_vDI*Yg(^miHSq0-!xcyOl zH6%5)Y;^+6EEQ?_2OTH^^Pu!0HJKehq}l+<gck%~;Y!L=(lO6ZJ#r^0YBKl9==AADilmeI{5&{OH??n@AzoQDl{{H{d|Qzl zffVUFH366s%+@nRt=0$l)|53cXC#aP zNX2K@AIWp5WkAQDiY@U&igUjjO)WaWMal%G8s`K0Mi#lOKS|qQW4GKO1B!i#{USL5Bn&Hf_15r}a?FO|DM6DmTXLku&X?siz(vpl(P=5${ z9>cu}3%cIkzHE@+j^gqi3k!#V3$p_^uY|LtoSI3Sy!pdl7qejb)-Y5C90GlE@vVUH-N_T79WGJy zS9K9~Us2!n(DZqbI85F#xV<|w;_;(nk?uLrku4ylcL=-SoW#i`p1!%)i($E)o93$>#X0tKpF)Q@K7HjnOm%x9>7X*E>t~{vJNS zt~d9lx4pILrJJLdD+4zP(;okOCL^UjBs>Njs24JTO@$<5fIG9}Xjs5-i;?^0fVbtg z?#<^nCRhs~_{4mMM36Id&@ghm`9x&-misD*po{Ok?7K$)YXCug|HCO>z=xuM>nDP= z{X7XXKz2^|?9@gN=&{T9((Y{RV5KN+xzb>7|1OVW>!9}+f#_|DsYQ^m$g<2Z^1|7A z*W0yvh(C~oW22`_kh>?yzdD%ze_+{pkvz9Ysuef+G-IW8m?DIX5f&XrAU{04Jl;1q zob9;l=)*UB?>`HYGiEFv-}E(NM{dzO-?t+dTlRU`*=lvH2Gti>QDGOBP89AA;;8qK zvh=@)wB$XcN4xdU1r{J5=qP0IS zN}>M@ieZJ-GK5)lbuKUpt+OZIDEmSy^yoJRtX;4zHBi+yl-+Tb9Z)yE85+DMk0TU} z5_+%UI5BI2t7wecgCx{qg{r$2lM(5f#~7=s39|3*SmVBK^_PxUT?67EISbZ1!x#pu zapdg)5gXiB2<|o^2%lt>K9Oy3E%yjY=ogsX@z**o1$>rNn@i>o)~@Xq60A(r{x4$8%T>X|3$RUJ3*gF!YyJa0qf+^7du@| zJV-AXjai`IE6ZMyV7ZCZ1^ViVa73KU3Tg5Er&eypzTi_aHMR{C{tv384=u05EW!s|a< zvQ9G#PYTU=;;tA?His8Mzk4!yUc1+46BTp0|LPL+bi_E2%QTjz4;}aQcsyXX{|Mzj zZ()6(`RcA_du4n)vEL(1n|vCb2rVgoNA$^V(c_*_Cr9d@e-q_>nFt$6?7_>n<$9}D z_@Z=hg1#6|6C=OPSfo{Ie}@{JJbh;L*2x^GuOQex`tw3;k}^EE#(-J5(Ds0|lTi%b z9-`4E@%Vh7qSQeOEp~IE$8rEx5y1H4CZkKLB>yu~3+1Kdw3qkK*JN$!RL zk=)on*tFrLK7M@uT>g7WcQ$I z79N6iED1M^2du}b5JcyUrmP>)Aav!UlMwc?=cSYh$0XaFIm}h&>osjU;&Lc~QbbbZUSH3W5gegJa~d<)4P z(F}8xV(dxm^}T>)Y2fC*`CZrNrJ#zL{J zfZqD0*)iZ!=TdV#dRGD#+pRVJI_GO~6~`eN;viCA<7m)-6@*m1qNAjWN9%KWvmxw4 zGSaM9anreQAogG8gZ@Flk`Uhu@g!=sIuO*hZX2j&r&IABM>;4cP|n@2dLL=_#M!j8 zr#=3&I869f zAuh0NUDplWvk7s07eU|9Frk*=ScdOFXd4)!aW%;Y!M;dbwtY7TIx5hM*uG`0_Xf`# zTnnR})APa2oBl6`p_#S%+e;cPx1*LC@)=GGE8d0x>9CCxU>bHq9stSP-HWDh=#C=B zu(1yiMUL)z!18t5qKKHf?-PKLmZ_-~*D- z)m5kyfGo?fP2jmYG+f;=49l`H)F45YV<4pYCM2#+OspHgb~Mv~RNvsFJRk|(Z>*XQ zYIS2(v~MZs5fnWA0Fu6`-y1s6GR&6F@&af>CRi~CYurTT;LB9n=0}p}c)G3`rh}jX zd~Ex^X;bJztXrA~ZHo}i_bhADhq!t4i?!1Q$An`~R4H51s^bNILq!eUGP3QWjWAAW z-6j=plZqQ874Q7@um8a5U;nzZBe`Ygf0ff%`7r4XQv5iNYCiIv|J_wr{rlevs4bzS@f08IY` zrUrk4Iy5ZP1Uj;Q0?>q}{*waM?zzFgoMkxu39Q}M^x*y=|8Np~peYODXji#KJ2*+I zKV@>@jz^{6Onmk#k3@Et5(aLH(|g5_Q{^hnsbCkjGmJ-cSDCZqHr}} zw>|-ilBeOA{3!t0yr3YvPv~w*-p*}Fi`{d2NT1!Q5A$!~{=dZ`*J?K*0G9552#|)* z^#0co+V20y`1e#%Rpl(9(TDR>g(Z{(en1owM}9EKQxW*sd8+)EM@4!kZ+uCq;?gj_ z+ldnz-6qk|2oLD)j-m)$mjcJVk`1X+G*Czw&?r*^-f%}zQkujp$l~;VR~ZaR+6&^k zd?=t)3Dp#@l3~6fGdw6I*MG4gMuxfT5)B)siwJZKth+j)1~Dz)1q1=d*KDAf27=V} zG-!H0!j@;+u8s`XA-e5qpfLqW9)?O1hXJ|YQN&;8;*VYB$Ulv<^OQ0^pdEqjW02C< zIZnN{vwjz(bie@@&-)m6!zr(DHo#V&=v&wWJ*h)My_|0idf0&w85XuoOl)M?E}*)J zd=GgTAZlZZiKaW)*NBg>fh>pUE^!>+fWF;`hE`LZr16NWb8Tn3gj+n(73PNXT()10 zYhspBPw&BUdTq@mlzPa-re?bcLeDf@liI-3v8H(ddc;Pq4XLRC&#gx^qZZ*3R&Db!Gv$nHa!Y!WN3UkBRE!(fgwOCjf!0)0|~%W*t{9mgOJ@O0`LmTCAzfY@*y3+RTWAzdTbrYh)Y}(>OLSy2M*Bzw1MtnXb|Gth+4oxnD{;hu89eT z9&vpOVH3c)>^swa)2ZGWgt3dm@f^`i!I2W*(liY`Dl9Z9z6@t&zfp zIV)OEVBzg(lm#gjZ4{6CK@^CEQz`^?$ben$?;RiRDn1Sw-Pz%$S{jETO)I=K!fr^5 z4O@QO+fj-yyj@|uO;a&$s&K2RC%*rH!@yHwVVN=or<}kfjPFM@%APA8rlUAwG*jYK zVHwV-pNEX{!$BHeTQ(ZRiF`YKM9gNhjToR1;!#`WlC7p}xEIObe&FCzOF?xyYKuiTkqXdH} zPWjde82_%MpKqNrO=Xk285&o{^5x&Ji$hV$=s{P#t4a?JkL?C{f0 zs^b%4^0=66HJ1F7pDz^2#erAK!h+>SBOG~uVb3ZNT%L8D8-;^ur)VU0)GP{|4%iZ4 z{nzNbbZsnb)wa%LKAa?Ft0w+a50eL(rWtx*UU%*UYt&y_l zc?wqE#A)ywpUzM@k3D5C&tgV!NYg3B04gl|=hxR+5C*@AnLMW{p;5+pnm4q^?M~<@PVbjC zm80I55{xU!0il?XIFGW0N?6fsPd1yoMNo(hdIk=dJ%_G%GdsW8AM(X z4Hiy(>S9t&_o3i0#n?#EV=^|GYt_{HqB7E>~FY{)3W?m5e+~gJi`ZB4O?o%Zc6iw%RSz zJ5;G~);nxp)$Jd9u%9A<6l#u)^Swy>_`!9Tt7eqW06dlBO(H%}bW$*lm1M@9j#vpHU zm!=WTDC-4r--`(oH{@7f*6L6_oM9CwNm(SLUt3kRTvbu>gHbh!JvE5@I33Bhe3TzJ zX<{MDv7VkC9DY6BJ2~7fOhP}Pp?5+3^6%o4bDRx##Xjgou}AqV?Cg}QTIzq&WpsiQ z0WYD;Kq~)69pOYRR717cZ!=Bh$5k^`*%yLJNzx!rgX~@*A!bt9_5$ChDQD@7i(|pu zu5{8cGNfM46~q#5pM#x>E|jMVyJs04seCLdNrNmPI4m{JFpTe5x#zh?feT?d#wuvt zss60c;=3EZxT=Sv0ZrqasbfMGVW;2uf(Dr~jG0hCIooIa04zT!t(K2N8WlYz zNkAdqo-F8T9u(K&dOH=NV)p9brJV<_UaKsFu>9 z%?g)`tY|~)$BsO#`^7;m$Szb@PITcIM?Ib;321M|6#>(bU8;#;Z&TwL5m z$_*7-9XCv;aPY6Bw&2l>rlTN|Lx@w4rak2i4QpzNLdF}Qw=+rPf|1nxE2Qy&<^e4m z*D@-{xaQJ&p2jYni2|u=69FW(mJ(L#A{D*0&%@xBMwBs?b7~-dV;N4fJW&(gJ?lSP z7V~!{0}85+3sg!nhi=|xJ{CnOX{fnE567X8a02a))MY2*9}^C2X;pmVUwz}J9zT)q z0yY#NWV;>csW3IxTs2~7iW>P&r}1tS{gS@nfceD32Q z%u{+bOey08^KZt!b`J-gc)i+Y^O?Q+`a!t8!oFqqHtaq*Z5!tI`N)4XhQE|<h#} z&XW1e&gw`v%<2X1Eu*(#^!lW2n9b**-UO3RGczhaf66t=fGH!2Bc^cE9y0|iBm6xW z;*Dd1ogJyM;)xjTq$)1f7H7)c zFd)+5=?8pk#I;W*mGhsOQbVg0&)k(BHRUc1vW!N(vOB3KE>jazD%>}O*1lA667;#P z8phaDxf!3Qgt9(YA#Y*-X=Na&@EJEa3MzzusuCDSk;hG2stn`1<^vhW!b-2Ow9qVt17Oe#S%<}~T;S0YL!-<5Mg zl|hOL_46>ie0JLSd!%qKH_}vrktb-kU>0VN+qxlMa7Q zrjXk;6ONmbEEokLPD_{m&zvQHF43%{dRIiCgJ|X~n+^UH5Oa>SG3*JxDPthw^a)0s z%rYGN7jZ@ekvufmbAB8N*Ly~Kz238$a2BBqenO07!V8WRSfY7eb4-e0NgRduhU$rw3+XA%eLwgv(U)hNT)KcwOvGdY+#HnEDO3cq) zb9-Q%XA^nKfM#Pk8AKUPIV)XX9E)#-R2_#UYNM9~?+WZwL#o`GV~Hrzoy1V5Y$X}9 zn-HI3)H2LFq)II=A-?HNuI{%n>Ti6-ihOnI6~;hq8LAT@h^o|5=`pQY2tmX$iajOv zYyI%n-xASzd#ykWXn# z|NTEZwO$u0cSV~f+TFP6dg@()XR&%$W~Ve)@5(8d5T{jM&r(@hfUc|G6=)X8(z2Ha z*YB#yU8dkw;nuiJ%f?Zam7|OT&kOHxO6&9aD)>&l6aI~OOP$ToDR?{fCA4f)%9t$0 z)DLdz-`vlCgBuGQHZw{ivY1ejp43FpJyk9wa#l}b5oIwP(V&j7N=$kp7OGf+ zr%$I&#$n8|@u^rpVZ=A%O)5!$6Ekr?KoB(^8RH*LjY1K7qXEkft!$QTn*+?IX zxT)UfQdniBHqiTPZM!P|62;F-Ebaj;*8F9=5f7JynRUNSvLabs}ah0&T3fG<4mVA?iKxK`-KqjVhVqQr;x9oPXFaSpHAwC$0t^ zRvT+-yo*%4*+r@a3ufYqyPOk~ke+|oe_s6h=KQ&m+>+-C9VOZQL6AN#&bsI0-S%9Z zQ(X7q>>)$swLn60TeqmhQ;X%j*F@ZH=3}W%{l_2-h1MfXrs%#ZNRSrxxU}Rrp3~}1 zU4{Rna2aH=Jf~#9KMwN|EseFwSZq1L^_25({r}|Te2x9D*^qvf;D7)2yl7gaf%BF> zt3MZ~C#(15=Go*fk)NM%ie!g^IC-f-d8!mCiM5q0oN|F*M>`G>3vlX*{24Wl!osmp zCfv>lN><&P){HbjvPkC?aFWJx95s?AK_6zxJD)~Wb?@k zSUF?f95A7Ms9#=PetSNVvr(a-=^Xz-F|JvBd{2ufixnC&Dp3xCTN)`$j!F({7Cw)J z>y~=TUutAL6RaswM|l`NSE6_VlTb%RI*JGj^1U;RD^JC|(a1jQIHVb+)>*yCPPxPK z>S{`JaS=kH-vcH%l!Q1KJs&T6k&aS*&o|zLbyAD;l#TW|4$=92oTsWlS)<{)aOIIW z`bSyvQ8+KYO(6Kzt6c}i3d>zpCig_FWXsAX@Wvaq^o@(W;#5{_5_cS{t;3g6Ww|TN zhk`7*xzaengCe1PLM-lyI|e6lz2r$LAhRjfJsGe2N7S0HWW9G5uyV+vJCAuBISsGJHWUE{bK+OBdzvG*|zGJ3{U*YWVLhE%~) zIL3ZOV>t?b@K81mB`lm97W_tc6~}R22NiPZREUKUBRP@_S$Xf_!@iOyain}3a%C)! z_~PO){8k7q-f;T%@qT5Ol!s5r8GJE@IOY0Ec1LNX;IN*?zEhj!Hj`YSrX_b8@m$*dCSDM4JD&|w1N#c94t7ONMqDBOzE`#5w{PLyf{ezsbZ;DUF zLs-h7xFuiA$8#Z}2#(6La~!G*ev|ueB+x0vXo@8m^H@=)LwTw|$!UKG*0{xK7!O!S z-nhkSpM!6?T3OzbXVo|fWn46_5&0BX|=4_PwfD2r#?w@aQA8+fYd9=I85N@#b z(>&VpMRUHWs!;7e4vc2!|H{>c+=29NF!>f^brUx6<{ukI7!J>h1Acm=dfSI^S>!YZGn zwWNwKR4roV#UvM3XQfLlPD@9~27Cb8%~E%)<*k&7z??DockgVY`}V@el0ktBv>J9DWDFO(k7& zawR?#C=*JAmuC%ML@8UO&q4mh2QU#wsl3Cx)kjL{>5>i#9f8_c(hEPjSIa6J3;3!G zTQy;=vTYeHUBzD$QKs4K$eIgnOonvAa}F6VlYp0BoEF0xSD^U=^Y25m@7xtHLhGxS zyQtjLY^`PE)eBwp-f)$tv2Is*k%02X0;)=e6mvAH`(Q{^(w21*#PtX4*q8((=c(@X8+$_<|l>81R=MgQn^Ape?(agZU!iCTQ7iX^{c z)=xQKNDn-pa1uu>OK~8|lD0a;WI?PT8mRPEhT;2|v0xC1G9ldV?LUpg!wB;7)w3P` z*X6`jtQy}j1^XhK|Gq|(Ecn>ETv8L#%HC8Qc`A;wKrKIcwp0E#hsZ2W;xHcEUnYD@ z?ypH{dACwrsg(CB%MMf~dQiuc!4-u?-LtBA+X#QZyrFly%6|q?Mh7(gyI_wJ@EzZ) z|H-m6hz9bTyCIFPBZjkp`Jz_U)b}DJK3=x}l#=@IQ>Ab+F$q~57B^1V2G&gA6zem_ zE9Ri;WU3k@*U$ID05e)8z7$#;jj}Y5pY~}+`ZAx5&sLIfv43=4CPK0c0wAS8MX8izs`8{v zX(RFIN%`5`-Cb|u^PLH&Sb4R#3|ld!FUx(i1qGgZJJoIA-5uqr@{uYz%W)XqD=8)M zXhb7V(6p%9UI#xo8Z;NXV;(k46c@o4q^CmT`R^`)O8GlEDI?|T@mtJVL2J{&QF3U;LF=9gTh{1#f8gp z)WGscj#bX0ABSOlCraKvRYEQtNROEkQ7+SQdM^u!7S&Frd69TMFucMR1^zV0Z>ZBoA)RM(aHIK@jF^Iq8~5;~q&ub{=L zQh!0LdSRnzSig(2{G~bBZt-o=qQkN6DFX){jj{mC4633KVd>Z5on1~`Ko`4C#m_1n zT#+q&P-Tr<>DP|)L7BT;>WY<{MXB136P0d)Fuc4AGBT_Mi|BVz<=HEWRI;x}=eK&5 zs5b9gbLuv4DHZupYUSC=8Jw!xw_pw@7hai$n$D#N!&N2FPBUe`Dkok|L|160V z7I>84v{rX-?9~z$!Gt@ju*CSNA| zB;x<|I0?nKQ7mlKiM}`PN^S2Q9hKsVww9nN=jybAP;3 zqegU-Gh_U?+-w1?G>@X$nHbBgVEib@952qK#KY13lG3$x{FU4DA;d)e6}~Rgq6Yt< zLStg?YMmAj%n1EY!RbIySl#*J7F)nsuk<&m!Yd+6f_s5TUB~rQu`n*~&}Xrdq_UHV z#V8RGQKVK5OuSQ5xo1=r=aqa>l_-vCQec{Z+BZ*%blQIJmhm3zDU)^8r7&|8LH-bD z)w*)!fuH|F8cmX%6)!g{f&%*xMG|~J$*p*R-VX{1$%_Rsd0OiWIR>e zrBqVuGom6AgRg=gz-(#LQz|; zFO~f-)0Qe4o2p7mb4{tjJy%WYs1=Q0)b64aO}#e#7#dM+hUe)+V>P9AgG@5m^~EtC z^>KU?h%Y#EOeR}gRkz9o?+mKzV^RYspeAt_qX^^jc2IR`yijsDK>x2j-e9i1UJShU zx&UamFRDkWYx^RNbItH^;q~r`52x)-6^WcvT^857Sk1XZ@5w>yW|x3!i5`UWlreQJ`qlFu{jcL^QqN;={77mqOTtEd004lg>*6N>VEQN0Oyei0L&Gvnpd;%i zfHX@-KPlkBNB`4LKjqx~{|T(!*Yx22ApidP&;DO`#5qtEQV?cI5&Lw*oF-`y$qF39 z@q4*REbCrLRw(kNib_M=-Y?&M9Y3Brsgd+{{@VZ7zjprl&njo=iEPjtCisb>{)->M z{M*1+dLN|LP^y#46?H<4+V9Lx1kg)4*hjWy}!NF}1`6s}# zeh$_sht%nZ`$^v26`dgHF|AD?s$)jKV~jq6D8M{C2V-27N1G>2-H_g~^m_m(SSLx= z+YZ?I6~^}N&eH$F4GJq~j0ylqxSIxwQWks^mI|5H1b~tj*#bo>BY_$)0CEmx8-SvW z1YpDfpgavcnat)%SDlublcUQFH&^VqoQvx0XQ4Q=B!iiFZFJGm}y8Qr6wHSkip%71hjr{RD9-c0ukdg|=|Fbr$&^`>Xf{@=_YL@-WnyOrd>Hw%!ouQOf76p?25tW$xj5N|Wq_NaH9J1w zVoW78ykxFrh<{|(QfK{(TM;d}z@GI#7!F37{6FYVCQs}CF&?u1ugFT)Lcxi}z=KwC zzY@v@tP5Do7TYqWq0Xh4cu;CXS$QdpmIyq<6`q4<#pRrn7eYuVUaG=PQM#lmFp*yr zppY<7sfq5VPY0rO?;9EiNIGwm<0qBE+0m;egg`}u>;Ob>*Hs`DI5I5XVZ3nTC43#Z zqC=^q^ilAn10y`(ydeWj!8zd254;?Yq8L8C$&N-soiUPACwWX9@T^iUlf<$=AnW|M zccdWpnwWjWBy)_$ z6=tTOCJKRp*@RNdd~*-m3a>ysiKUH*UlL>C92H)f$Nvr2p&gdsjq*{yMF5qGxcthF z5zQ(jEV*$hMKrM84?&j4>5c{PkW_f7JyTf8XT9` zeQg-4DFx5xH3KhA7ywG-wl!xWxr@o5HhH8DxLd?0UPRIY zI{Z58I7Jhk5}kplPiHATb-BBf(5f*VQyFofnY2d^lQb?7G_Sf*k+u}VP{0ccjg-EfHVO`@lHJ})d!wPCY38PQK=$}X!tt0<& zukyBMfP3Y?k#7I#Po}dc`R_3vV%(PP|L5$cLZ$T|*n~JXRjN(@MHa)fg7 z0vrM^h<&~7e!X>olZUiZKKcMuI+y0ozGE3vo24d6t5p#9Vx-AEr4cM>XqpUFnD0LV zLTUa(9Qr7Aq;`yC(%*#EvQ+4wHxAs1mXS5VyhVw_)O!6%`V z?8ZGdg%SeK5vxt|LRBXj=a0+~NR569Qi^e~xXkO`9+8`{+ks*jyoaH$nN5+amr3kj zOQwX%&Pru1M!P-bX$_1!Q--aUJBba3nXsOe%pCVKa>#pjjn3eIZgvS`VxRQlq;cQ& zw}&LX0ZCW3AGQ@mJyEWPH)`kZvpX=?;s3(n@$>k9jK-6p&i@C)C;tB^58?mU$crN% zOKg%8FqZbXAQ#5aXSw)tEl8e~aE-)-&{Z(RyyUZiqIXa%(BqA|`RZ-fA-ZqKq;iX43Xh1ezwLZ~!je4l* zm&zNU#;evxjn~+N+P9k^^b7yYHB4kwO!i;yyeMyNeP97v_`6p-jc+~G0ln;_PJ)n} zdS1MVa;@ybbf{w@)B>R2Ol8R&bhIN@yB;qWEKvb4?@}y4>}ybQ>Z)k3D0iRcq`2G; zsBTdyTG^%o#(vDFBSTO2EU0#Lvj>?trTJUJI-Nt$HZMzs$wkVVW!dbjU0zuFTwqxw z(wt>snhF+ZXr7vk%Fqm}+P-AnBu;Y}TCpmN@Tyu;>ioaIMWB}axAi{f{jb5WKhy7j z&H7LGKOW^N-T$~Og8i}FG9+0++uI;y-!mTuC0lRr0T4eixcuo%Hm}N=&&xJSTw3go zhv+wOC>%rxI^;WL!{kMW9p#W}a(ZL^+~b+lu5^Zkk?ZOwLppKwa$TgUV$vo67!?G2ae21Hygef7OO_DX3nvhvA&8s*>Uy$P{ zL0okiwRkqwau~I>(AeLz#I4IPNuC+}nf$>`-F5>f1BfN^`wic>LF5O~@@W*CHIv36 zVu4^_5`3S=o1}vB2RtZ@ylxsFiEJoyz-@LJylchUL6F=7RJD&>$iqnMW(o9|_vaM~ z5zLT#!CxEPYR$yuxE5s$bRAkHnLnPMSZDvI+If2kV9);FpY-+f-~PBidfNXV<6-+h z0@sF&h-?$LZ`IsxW7v!Z&!&KXA3jaJ<=-Umw+$+9V9YLsSrkby_L8Ajwe0`h)R%he zpRnG~<^MYz_e=8sWb(BBALS|8e|WN_mi8WDNUm}K=0Vu&`v3CC?~(-z}v&eZi0R(toE;)93*R-3D9CMv2o_53`LJU{ul zbf!$!eUq}v+w+=F$$ieA6?0K{_S`cWOU|AGhtK5eDWP6!vdYzy*OOg6HIn{*uAZU? zPoAD_o(B6rq^ehQF<_tkKhw{DhQq<=>HhblJd*q`>(`C-0M&V+Y`arSxGZCKwcenZ z2#opz-~{LA6NmYwf+lViB>wmp7lQ-4F|ga z-+0=8TK|vnw21$3&8EXcM}SgXa#)dPTOq2mr6sWNJyRdf=tK{ z6+xm3@B{LqFEj{*61(6&ks#hgFHwj-Vx$q zVi;^=ya!RrI)c?e?;bG_1KXf48ZP(h_zk6HXA84n2=riGc2AKPic#AZN6t4~J}G#X z<}3^)s<%+E+4VYggMt}`ux_D#YICcQvrzp-O_}S^FDAuf`Br;0LyptW9%a( z^|HFYE|6@EG51!=z$9Smx&qe<{=288%>p5|Bz{CFYCENo+#IA*+!isMR z|4;HM?~naox~F6C0d`Hok0t%34j(Jgr~}lm?OMds zvWy}FT|I=dqcXdGbBlK3Fon%r2RM1UK@M<8Qt?ZeuN>fX@oSQ4$?-N>9Gxvl%sTwc{;fpM{|EE=cNCCnyOqJm(ppp^|&2J z3Zo-8Q^&&F)j*Q0;dSODxi_SIAUMkKm~QdzIe4~;vs{iH#h{aX+SW6^L#k1b$}Y_o z-0w)Ulg(Dz7eNmP~0K??44kF{X?`}dZE{;W@H`JYJ~bq)mf z`Txvjy8qvJ+JBP&ALS9}e~O5pC$47afI*a@wDKUZN+QO~oTWSz-w#NZ>l5H821EY! z9Dj6El*Cz($LS7y`gBrJFo#R<>61fYUT(sW2IJ7Ik!qbp6e9-ha+Y-^!#exP+@|{n zDB7MJNZSL;$z8qa@It!rnb)Q!B=L(VO|)=VG8ZX@89!!ezU9xfwqlIAQ=-2JleKe6 z&QDm1^BrlbN2@R5R2nm5K6S@-P-(h3V5AAJ!$^7i96Z|+LYDh}Yv}M+?xfi?M0WX; z0}e@=g`k+~c%N0%P&Skr2x>_h=dl-uC*bDn@&KmGOr9rp(6}TyyrNNz&0XpOr`six z0siw|s5-1AD*zT&>1B}0Hol&t+z2TNXObzGDk(o=y@pwx^E6l!BcA+;`rS&twyt3u zg9V7w3S^f-UZ`<(%Y6$oG#%G1eJy;3izzAeI(jI;Rk#z-OXE22xmmXA1^&Abx>3@U4)BTS}c?ADw=Ip~1 zEl`RgFNl_48RUg<)6tYb5JY(_9iULNd4tm(v&H=}c8JEZ9^D8Hfjk>Xixh@%IB5Yv zRopaqbsSif%}a4kV3Pfhv5!u`a5BZ4K#taIZ|j0vv=j0wHE$*+5%$Td_eXo`^M4+0 zuc7g;PW zF!E`HirzekdfAHn-Sx;nS%^>qf@l#$LB89M^aC4dKI7Ad|BG(cybQ93|MzE;68|6c zpYDG=%475Yk|X&(rt?=3)YtC%RSFescKi}u_$*#urfu#s`+OC&sr2}2B#hTz|2z^j zk^fk{)rXP)#$)~d7yj|I{vYEJ@}Gz*PDi()%~u2#m%?Y;7qBS|xz%KQMj-wOllJ$t zy1YTfX4}YO%i9&G@8CK-0Uzm!4pH2>1h~rc3r9qA*yl5d6tZ7%ln#L+by-VOjqlJmr6SoTtqH@2mgITR~a>7o6Cj|MPEq^nbNj z9sOUeaZmlffl@E+bALpoUQCIHQtD-Te14^VkJpVrrnb)w-L71`Gr#De+$&h3A{96# z#}?ihUW`F1xr^9gs*WS&Pbq@_n<(6!fIO8$-L>@0so{%LIlg}!`^TUCX|w-}VSX6< z&tNvv&BP;bj!s3Z~cjWY(LjkKW(S~>=*u8Yp-qieeIUmlYYe_>BI?&XfD;(saOjTz$~DM#@+`h zT5e!^ugtG95JQ6pwIq&h5^-6>fC>HdT@bQJ*MC-X_tT?2&Gp*m%0pA3m2w|bA)M1e2AYK?%>jN11q$V`nF2bCY+MgG}{=)^q znawJH%r7y04vn9+{fG*`=xt+tKf7mOAKusOp@aE6?KNN4(~|!`Wc-H_7WVb{50fYT z|52XO{m=Uz{~EYtar(|ejtvPQl9I43F zo3}Tw-VKxzgW1p>Ox?cQ?+u2IIngyGre#umpw4&~G;4kK?)-8)RxzW^-rW&#i$$>= zn&@H~axo-kf|xLv7S*5e?<}u=ww=Z?HIIF=+7 z?9a@p*}Lr7i^vY$?2&~URAOp))3f}D&L8T!?JQB<>eD8nQyB_;n0EZXpz zb^IN0*)Z6m2xZx28qY~X%8R-#58XYjd^U%Qmh#_2#{cL~2YUX$@!%=`@8dk5A^wN1 zJ9a-;cF<=syQ%Bh{mkas{nO>eyVJKfKb+8r>e{wahvn8|w;#cLI!2NAWw<#tTmQmR z-N*vCcl}Sx_kW-Ke;((t+5dj#BmE#2K*lnv`G#~1Vz%xTINj5}CroxF_ec#B#n#vP z3>H4A&$aJ#J?QwiUjGd&K>O@J)6qm*|C7PwDgM`^JYxSZ7T0|(K*rTm*nq@mlNCsO z++zpQ%GI$1X;qrof+o`=%^F1C+}j>hC?(ggE>EvcZ{A!f7K8tEo=iq%lhGg2X7so7 z*RQXCKEFBpK^bA<252>(jEVU~wHtjFTgtemEoE%BrIb7Q?$!Tu_WJG1S1&JK-TeIK z>TlQY&M$u&m!?x0zDE0he>+r7+D$du)uzh+$^1t#&!F6sB#`&Z{-4QE^O>F+@*hh8 z(EQ#%fA;x*%u4d#a58+-{~qP3%>N3t?5{B7PWV5<l_yERo7n?BT`9b#E zpu75=h96n&6cDyH_E(iC3NpvYO zN-f~mMcF(F!666NQH+?j4W!=w(S-l=+(S(rz^nQHpg%6%{~r#APx1dAm+`?}z9;Oesfj z%(&4ToZsmc_`20RN;JSUOEd*kYExknxJ4xiHGy76^o3%1cn-*f{6Az)mdfhHD`Dr{ zZssVBP>wP$^&QYraVo5PHPI2M+_&LE4pU_^Z5Y?K5!8oeZ5)wx!@*eB8;5n(5UlS( zeS7;>!Z&EHOmmIX8iv1v->#Jxf|c&0mwCpPVF_B`QK?!)6%A&l#yX|`>gtTaC&9=D zi#m)EQYDCqP8JnN-h00|1*oLnIC%=uBDfWOE@qP(#Jx1$@E=+_ci@iQ7Fwus2D&-ExhD39km3R?V-gOo~#TXd@Oc1k(_&gv1+_@sTl-s*>M| zq-?-RnYona2|pPjG$#=yjT2v<>w+(6-*N35k`C(buHb~1DOv;{910wNHi0c+2EZJ8 zwgJ9)M_*qhGRngA&C#I7GjhOFCUg zOOVfzEgQ4=m&zt}A{4z5297vYgafTrbFl&%R=%j-WSnyPIg?qb;?2o)ic`^cigFl4 z4NrBXF0%SuSy`cQ?PjYUKlkq@#KFut0k;Sxra;^GS4XO($d<9r_iB%g6(s0+D9e6~ zeIzo95s_Z>T6~w)!7Bv)pVJ^mZz2yl#C2X0u@vVDKqAo~NqNcgI3@0dl3tYs|56$_ zK0f|FaC8N+L?{M|GA0Kc0%}8*c!pCf+hrKfVd#Kovb{o@GSu0on3TnD1y!k->7Lkw zd5SdI|GA+2u;+jM*PJ&oTOj8;ic6g+mQn6YOb2>%;=yWQ5OW2IGNB}Y! z?rT=nSh>C_@;y=eUbR7%M2tHTTkKGwubZTC9(!@94n+qzKiu40UJHY1wY`*+ohB^F zGH-=2omP3CWF`yae$k|rq4Y3LsiexMn{yU!vK*!7mre&9(r`8WV~6ddG-tLbSRM|K zf1>5ZPi0@#3f`$&Tl!Ew#4xsYe(CHf z`8tOFw=jf}htg`i^l2+qaC3HfV6p%gC5p})kkyY-j1ZJIiVB5vV4%+-5zQ1< zdlCD@x{Nm`YGt826hSUxA3GheQMisbPZoJUoZxA zNjTKW3u;v@zMJ`)tMIjM6=T!9u0>o1wPDJ>?4H<`$lrZ%7@|mp)sfjAx%_;{jWQQ8 zW!uD3#u3Ei`%H(buUmp3GnNiB$PD;tRs*fz5s`Xmm)6o z%<64P%9~+m-*nYdE3J~$;t0l(FZn(eBz*x6>Fz@db*R^$6=s!+D#s8ZTc`O}j4~J| zkKl6s@>Ljf<&Hrid&W)<=<;2~@hyfJ#_{bY0nT>d07qQnb>w!PqJ~rSOLFkW9aBBK zwRt8=%Cez&`NCLECuErcv0fAIAVHQF!;7jqyb*rYpiCcm%^WfoP%cJq^2$9@AS`>bJggjV9U@{j;2)GmdSu+ZNzYhQPEIhZp75grOAG&%CF)p zMc`hEVBkU0wO<;u>5JWlnf`gw(4UmO$xy=4b{z)#n>F- zbTU}R5KYB2u-$I=pm{(53Q+T3YI06na@$JdFl6Sc6h{7On5^K%W(_8?a}7sAGe9f0 zXW?y6X{)&AsMa&>8}}He#8bX)(y(;H;iT95dVBKqmipsy6lkLq{4+Kzd&B!wt3oy8 z|1g;MJe20WcliI;O(Or&XP^J?U^vj_|JmRv|No;rCix$wxe~mWd%K8>Ew!Cp#MZ2a zLqTc&Lmc`_q)W+<$5vSNk1-{mVXiR7yF!jq$kvGFHOp@gS&J8Ui8{tp;Ckq(xV39l z@l#T_titrAyGSujrvNP?9d}euqh{1~2!gZ|MQ=*iuR2D*D(3!D(%JB|gj*Pd^oBWB z9#|ILBBdS2?C;Un+211vINffS?6i%8Pd`&Ge0A^cK>4nid=S)Vi=w^(s&7snW?~D< z!_4*AZek_`Ih*$WhIW(?A3+{p=V=fvi}=#YCW9f~qFoilG}yu%)dhL?7}05;p3nU> z-v672|JfV=cTlqb4W9Dq1Km5^n zwB+zwV=ps!{T^c0x!z>?ON5fMIN3>7vtn1{{<9Pd4C_roq<>|D`y1L(ZwY=jz89mS zG2t97_w-$oq6|fO;r-v0RYv}U(o^S?%E8EiIt-M#gIlx%u`&$RgqQY&FOHPJk+8$l zOzi!p&8VR0K1$I|t2wEp&F+h%RZG$|Sju9Ff*=CHhqK~qR!O&F#+y9!#Y@$%UD&^s zcEF)<$<@i{N@SD7kj~z9BlmKV#%mExnuv9kJ=@cxXAC7WIocy$C^^-%5zQ&>>pu21 z>&h170m5PIQ){Iy7C|X)_W%z)*jCPr#~I)@qb67 z;Zy$qM|nt&l{0!zOTOSiBX|SorLh$3(VF-{niucm^frv4?`8>N7r1MgU$s-5;Dd18 zjB=DNpog+ECV`TcNK`9a@%AWlw*%LU0@sVY1=gi`%yrV_KjR<*&U4_jfNim()}=wi z?*9&Kvf27qqFvQy0DJxahW(QN-{2|#+oL=*$5I%^@4??TbHr?9EaOW|?Vvu2T_WnlPgK>y1ae9QYApzy+uv%1(FXVOp-KC(f|uDh24+1+v(A38}&*K z>sEA%UXOJc%L$^Tiy2Z7_qGE^wQpx=y+!F+yiQ2`z5g1xgJZ{FjoV96R}JOBFqoqp zDoq+yP0H|B$h#H9$a31=t{FLsV4q#>thZj5lqh+fY6`Mj2kFKXI`v7yZ2vUl|Ll%N zLkr+O{@*YA{|!e^{(q11$nqb%uiQ-Z<7XUr@$vX4WVTeK@Fd?^XiV#|iQy)Y%x2s( z48%Q663*YrDNmx^c-~5}JIhsUp*6~I)-Zxg5I*(l zLjqZjRdSUhUeNF@c+jovNoFjPs{oCEbRm0D=(kiPSC5~xs7Z=XhXK?Ja47CJ8$NTj zfqqhaIXc#RBZXE%wg)Shr|EKo3>?mPWQbp0T;sAqv?K`{JMO{x0;F^Ypg>p-&y39m@-ASxfaeHo zGK^;iAVHpCTRmk8Cn0ItM3sI;hV&kE2)<*9ARcJ0mB5wfTd9aP=Xme-&pS0Uo?g$| zo`QBnU2^o<+7Osx-k1Do#n`h;a*Al6-3DWrn9GzJP%9O2*@@S>3Zw4rGNB^UHAt(~ zTZw?JL}`j+e#m4;JiW;@XKRL*BGTC&=E&q+%~l|FRN^@7??N(7Q4$jW`u}i%^Ui6` zUwE%{w$4P>Q_qVxQI1&x<{;HQ$&@-5+Uk|ewrW9_1_e__kI&VTk)Y&4*s(#4)S!~3 zsVf2`iTe~a0a*kM^PZGXo#!;TeVTe)^0A}9=5v6Z-iNTN}<)dTe znBTmQk}%$_#Zjzg3VK=ke5ZyHvIB-_9Y-0mz$IU=QDd-K4s*2Fgaoh&@--`9g59mS zR+|F|wlEBQptpJWb=Glg7@4@Tb%Vy^>d-m)AHZ?R|Hb_m2P}T`qkUW6Z+=v)(t-=P zmn;#(@h>PQG`;w@`~9B5}0N0 zt1`ksoCDYLGyv)z%uO0rcnhYK_6r z+pA@`X}11(NXUn@{|<+9I`+LDf$TQ;^}!bFUxT3#VFYqMjaD>b4kB&DxP)TFO#5mJ&Z z!vemImJ;CFWDMcFOvO^OI`|42N|k}bk8o5nhH!4AVo}pLNsXUX>KcnQr8KNFb?q(H zBYjcdJdw@#RJB`oOrT|cs~GJWAbqy$Uu?tjdFH+me$#QNyAq6zRWcRBDo~nbw5Cyv z3Z7CV0VwE95?0V;B8wjf7qOQI9fM%eN#4wk&@U^8v1A(>?hwIB1u5@(1(`%!YNct z8N>D|C94s@47WXt{Zh_UA#-_@@>vaRv)U|)7{4p*r2d?imZc!J8hnP6!q8?VlcKO{ z?GzQz>#?YOosd{-dXttesQU@2U4?@YXF^l!PN6j>gx@mmBIty55|qRy{nMijeT}V& zg4rvH8DX{`MU$AFwSt!OkBez#KHHb_==R^j9Yz$_k2rbiO4 zWI`;}62(^^ZNImDTPBLz3I!PA$by7=SdJd__SM_4&|&VIK_3arfKfM{YTPfBAOb(%{8R!_SZ# zkHMfnv*PB(>v<4SR}N~LC{l`+z=wh=X?az%gGnW%jAnKxVdP7Dv;BvdLvWMFYnTTf48t91guQSvsdN4`V1zgzHiuVy-k+KYwKsi`>bF6T?E&GXZ_BbewoHe zRoj;Dym8CtqIGkD3K2}XsRn)D(&HB`0O&zcYeDdF2P_@0iG&KmhJ_%xt^3M+cu~7v zgZ8w(s*|9yMPnDm`b>i@j}cA-qG-HM=b$<(Wa$*7xFF>mUNmy5$eCFrxO5w-h|m2t^6f%6t8S%KH{B!n6w&{iG6c_O(6ENo#EP za>HWB5D;xli7^F7XOZQ=yww7wyw+@@WWfg&Ig-6rIE#j*0)uli9SC`^@&=s;DqD5w z&+?PSoSN{l-iAkEkWOR1eCJQYFfr6`!eS|xt+ZM_FZ@BZ>V-8?#L`(a`9^5Fc_8?}6gkB57yZc?wtn2?LPQrWd zu%ww3Q_S7Lb+tR-9{=CbXr{-1o{XnY@jo8rsm%YLuaK4j9=}<~n@Hv{;GglFrhyMK zkZz)bIaycIlN@Q(=_LhbBbFBBB(ZE;TV%vmQdHs$>qm^WnrEym z;*qY|&MLdQyhn=*m6!cg8F1xwtwZ`oQGFSd(xoR!d(^tb6j+M8{aVAPPX}EV-dH2? z0RX`oF4_HW)^ivpL4?lndpAW%oCSHD?!c!{Cze7v6j_CpAz=~tH_>VKHbdzN=#v+P zLHdMB<>W04!}$Fr|MV*JAe}jK8CgK!X*01v!v6-K3r=6ZJ^&y^8A;zPGV>C{3P)ai zl}!XSlMUl(3nQO4*#%B-9z?xt zQIEIqpTJwKV;_HC{>OXu8~FGU&_2;J3mEWZcH1OkQDUEyTc^8tg9kps{k-_@dOHTE zXRovWO*%*n5=}hI5)`3#m)RV(1 zt(vHQprm6WpR>(e{m5Pv07@kc*guS{^zZnzkpI}NV3gLq2U0En4f=!eP?P`0{o(XU z{(Fq)j^0VS!Ezl8A|M8rUpewY5a~BtrHe^+ISzw6wL#pvV+VE-(lQjHz*p zT1MnO(ND}Yacc_GQnK3J-BrjY`*cMGN0=@dtHysl1a=RHo9?$@7bqJDYo%7gV1c}y z$L$y5=lvn)SelEdva?26h9{KRoTQIG7T-=J(l!S!O-2KFX&#$Q8z|bIC_DD$_vbI! zd?VIGWeHShTgoyjzMgsh;VXe*`L zlqD|~mRl!Qo`f9CGXq%~woU%}E{)gqFu)}XHSJCgPR=q;{SED|(4weDR=;>()Ri*z z6g^U4P!(G5BYSu%99vzCy0NN!Xu>LbJe8e>xcq(};&R!hh%0sXBd)z;!}^i4yn^8! zm8zS3?R*eBLs{!4ZkRHl2pSE_dlm~O;at*aM_Gcr zV6h_&_9zIf9inI(q;a&y6yXkIrc9CIhnaVyXlqcXZt=3BnFbW~MYv2nyVX93Mfhx6 zQkc}!I+aYS0V+kmZGsf}z%g|%qXC`B@mRb7YnWub27pp%DSjkq@XL_&FKGzrfIKS~ zmylnR^s=;@T@8IbeF96-?5Imbq0|eGqZuM!$|kUwS!tjp(Lk&lzFemJRvUdQrIw}* z*cV_KqMo$4^n&HqKQvIYqeC;ud(V``XCS7sdsJapEK4@%8f3eYuKhsKmhT$nlNk0< zHO&IX$|ZK(1>#k~i4{Iv)G@MOd9DB>$M0JBz1qrNKCez3BUvnQmoWPE`dd@?QW_^7 z4}1_x;hhVukNGsYECP*LekPo;93;AcA{)&LU~C4PENW6KHc`3?=`@}rGuFZ-toO|U zpn($TxyVhrK^Ldj;QH+J^((;RdH8_1wnmGXb`qB?+nX^DH~@-=K=F~EP&g!JAMueZ zImLbyM+l^->`74o5)Ns_D~svdY$t!#-a!6jX#1l)E$n|u>^F-5v*-MG+Aqg{nvS00 zzdp)C?SBV1D-s@qn)8A@h@%SopLZi`TZ{kXqv(~L1G zE4?@Yzx?9?o07W^0RPpz5$R8QsCvz>wnQvVRH0MopKF+7mnrnnB}xOrE8@r}m825i zmkLrfl zvo-J$Y@*;d@DXHjnv*PA9nCsYoL=!%i55_*ZBo*l3lORc4k)|f6pgXqpk<&X{ah!^ z3jpa2I{kwL-J~M3nV*EuPKvDQ>sQbk7 zE2ZcV7h^;9wy^m&g_e6l_&%yBBUEu9Vb}WDg}jQbo|IH}`BGsDgT{enaShlzTD#ly z@PeieKp$}JUW!F+>OjvA)}$NWcl_3x=!eu<(u-%}&Y?~q)v-!CjJqq&TIG9!hb1qc z;-h3qRwM1d*`(B=KLdVDR;cJHNgC&|7l+DQ;`M=klfF7X+}vC`#I>XR{@V26=8Tl5CnN0b z3Aj1CES=yKUoqlkgvz%u?Ld`n`GGR7x8eWfwB+IPe~+d!-T!kmnmpxye3Xase=?$g zW*Q9Q2!!!6@al1Wc6280+azhQhUt#yMPz!o&g@I-3H#u(>LSOj43l5tc8ccMO<%c1 zc>|K_F?)bonC%;7WhsPNR-j9Z6}TPJ13LDVT90e>$l+npH9R^U<05`WsC%Gke=FCQ=)lVCj}|KJu3B?)Yy7k0Na{i#lqxbiGnq_^S1D_f-rLtx zK+$hmf;^K8#8BB|HHX;3lSrEa%D{I^-V6mwb~2 zj&Ev3ONnKHNH+g!bQL27C@JkecxtY;lO`*^Zq;Ue5#E?x3>TmZz zwJ}$HW53&lQ^i0%olZQ=(|Z4JU;x^)|Boj#-T!YinM|Jc|HpWU z{b&FFU&|IG&XqO$HD`$OPHz_ggho}owwStQE?KZ`eP@^9&<$P+0>zc>t#`qLlB*qh$PYFpOJQ-CC%`$hq+^htt6Ru|f1%gG zI?zw`jE#uGrgq3rUiL)muEC-?E>kj2%j<7mnDpiuD5+$XofZdx^f#TK1^bsE8?D5Y zG_)4|`(j^RRq`y)8@9Ln82h50^y;J>C1D>xOl6@4kRK<~bTs(sOzom^<-*iLP4b_# zwS>#)#l=veY8xb54khJ&}gxcQ|dXAtl816JD7pBt4H9c4`c{!Ob z0~<5Tmr$Uox<<(uB83G9*oCzF9L|4+t)r}#gQ z@)+Vj^1F-~fLMa}JNJ| znHNW)OUz90b|xgTZTIV~1KcY_F7UgAnL7-G1Nb?q&EJD)JrX~XNEJKEy2z1k8?RzQmGukVEo}_3S#2e}-700)m z1UTD)100Hg*1s%)UeQSc$l)yInLodTS;kJt`O7qpbM-at4i`Kn42pwu2I&Pj1XRb8 zin+MHK%vX0h66g_BbZOeKJuj4;6?j&fZ@Vb5cNjMKGFL195A5_iahoDxV>XVYo?mY7Q9JAMhkJ=`dfI?>wUdF`Fi_* zzTS3OD<`8-e@aa5`T}GBzRgfdFS#?M)wOD=^%CZA4l@M!_?LRQNy8}4vSwKR?<@<~ zv5#J`Fo}54e;zej|m;(<( zCEQkby~AT^K!SdF1Oymx6AJ9pXGDUE$Zrz(+Xfxn8KdSiNMbxM1w%TNSOkSASk!(n zSByyrP!iXu3(Vc5A#lj7#2^|?$QEtjng1B=;FW7=r^cdf*_fqc58j{`uagkvNNwwP zWckg|$BR-${d2J^2``g6_lG=*YNh}2O6O6K*Ej~+cmHEJ)%`yv{r=Pak4Je7`XATt zlGx99Dmp$%fS3q7u!36zAn;KLcgP2rjy2W1(p}@mT3!LckG+#Md%5cm)_zF)fz3~QMO?bC93<{bVi`e>KZ5iC#Pu^+^^I!p6RvD$YlksS%XpPn4 zL$&T`tlQdXSQmG@`S5q>%U)ArB~N@9Lt-6>Hd~@bbn{esID*x%r%5V~)U%dWH50Hz z1|^nS15gdkYWncBYpJer?O|H8nb`20_>4{33~isMS+lwAi({dU`(?4ieb%M^?`V;G z+^3cPmm)u?tNhit|3BzYb^UKJc=G>#l;_LR|H#C;kLpJN7_~kM`u9@!NbC34`3f+5 z)INWHPL!6DBH5_ZcQj&<{|kotV9Fr@TcyCM1@e3#4hd`6}Y5HP1 znjI@!v_$4T8?zX&hm-i(Qg|3)zY@Zy>D z;0@Wt+y;$330ePcPfhu6lLuked&i<<293f$?T!CG9hTz%4W8mZJ^9j7PY zJd$41Zl08)x3I{F^s@>{g)7}Qd5?nSDn9`Og->haxPqyFuW`fxKJPfv7H}1Q zHKqPA%29%EP|B~?bpJ?WSuuL|7&tLzc(FUcp{wPyjG&|Dt3tm4esPVoDPIVy$2D9D zpmb4)Uvnb!r3qA8LxF0DqiEuQN$hj__we6Q9yA}1B=$9a=*8E>U8=jgYlXawiXBOxAM`=##W?CAKxIIGQo0y+5su?U7 zCCEGg`rk0SRSCiq#5CN;9&R-%yV~!w8jEf3@m6E=4Yq4ubq}}ZN-1b-Ex7wHH^X9U zxzuVeG_A?MXE|CG}vd>2X92+R_6^8q!|)aDs-kr1!}gkFEbT)BlOLW+UDI z|5qpe|6ru&{~OMRPx}93JoWT{nK$Gs1dC`pkAbL5|ZO@@Hl zZ<DI}&SSy_;|TaD3F93Nw45>ZLslnQ*R0Yh}Hq3wTk*)VMTmM-er{tDXBL=W%{SQZD{r=x@JbQ}&{3uUz`A^<~ujzaM zBt5ZdH{}zCB-ALjP$_bfSqzi|krl!qsN5;FwnU?H0+=#1y~X`C3~h=$uOH4Z z8e@@z_o zBZ3o16reHvh&smb>B^oef1IuOcX^ua|9KK_S(ecT62LzBf7&m_f9{W;o$|4!pD#Q)}SS+(%RykX^U;IhK}dlkod)fzWKlZAA0M5xTfyOEdP2h||9pCNaendr3AieH1$>kvFGoH&yt@Ok z^_ay0p#eWS&p|>&8{9TyjRB40o~LoN40j+!7=6r?e2~WgZsWi&Q!xVpIetrHe?xOI zqG%hWakNHJ?jHO{5G`V`%JU>U>Gk~B%iMX8M{pguUcBxVS^ayf_cv6aRmV=PPgt^BkoS zv98kb2JcrW0`pA}`j{&v(7PpP5C>lYa#M_De$GI)LSYE7ZbyASf@t|1q$q@Wutg-O zxbz-I{=ruuLM(^VVUnUn@B#TWu+jhOxPWAeiX&1JqXZI^f-s1Xd*Hsjes`V6DLVKH zoRJ9%emc7bevoDd?lQ=GVWVn}qCr*}*q% z_C7iI#+}34gKyk?jsK3*V0rM(|9kKi_z9-uKGgZkSJ{D^r13wImmj!+k6@1$Pvd_c zxZBK&eboCSFi`9IKl|bI;`>*x-+b?`{d=}iz5XY|*`Tkl|Nc|{pT~K=0%t22Em0UR z|7)K9_2A&(zaTl$f5D`!?vZ=!4#&=4|EmZ8dhpd(Ux8ng5C1si(#SH%SDQJJL-KTk z*mQzPLgrKgQ`D1dj$GGOAa%guus!DKgcT~~ep{>8e*8Lr5{T&+nTX&3A@+^W6j1(lPEv3hxAw32a z^cdLaQLhmbJ^C6w1~NTH?dJTbVV_4;eeT=(+;7|G!LioozTD?wyFL$&n)P{bWbgCf z*wW|0aqB)GseK+C8~e;AG83mj7OxTTg9W*Gl#|#wV3US_$;hhbk(&ACcx!i#Y~86x zGp##0%JS~W9l0~DOGk2-2DV`=#*Gaq8NPl)Hr=ma(}S6rCovUuV;K zx?^fQ1Q{ZCgb+wk6mLl|g*3*pB_==-IW4? z=%_3zDeoo3CMCqy@fHCXhCmpjfVg%^)X|%>vnz`2xZ&IzehX--B;Jit;pAE>X%}VNDpp3|WU@ zT5my%PEDtzQ)Xb}h7)&uTm`I|Tsa<(Du4}}ar^ObRt2mfW4|Id2mW2d%_IvA8uAVIYf$hBfqnGwVU9ViO<-tprFx6-|*C$U*rwMk)IvVQWG-p4bpCvvZ_plJ%CV;k*KXFA(^pqvfehta9Jx8;2&?a%V z7C5yHy%0AC-BG`02U~GjO9ySjS!>x$6U`=42ZzVH*@LD?CMj(J#F8{zBjV4SA}>X_ z>+u43D9yVWyY>)AoG6qO^$ZpTDTa1Z*hIM2b}!BBHI_-Cs}>2&y%m=xxB?gk(Jiv7 ze>S64dz+Pt??}eiYOzq~=IE#%wfKOHj>Z)x3Y&$ZwceoFCyX6r1Hu@(?tTWAcotHJ z6XXLgPE+LN;g0pbnWQ~Bs*<#A+iTn2YZj@2+bt-*dDbV z+aq;skJPapl(=pdW5FYSPjw#Z{S!n>5JVtD={E4N78F+4o{lVochq+9X6oP_se?Dr z2d}`MW(XGOvRf*6n_xZ3TsC|S8Pm+lm}ZvYo3$OjnL2#4>fvK7hfdpdkmc|e5myqC zJR7WFP}P|m?wZ>PqIF)%?;mYq*%j*UJjzy z1m%kcG$(k*$kK3SPpvC^YLTa=ZRM${Do;&Sc}kxeLByn{B#q~YrfVV;$b&VCH#G74 zdjxM$3bI|6qjhHMhgle!wiSk^sxUNFgdzL!khc3w8ty(5>+UnPNKezY($iFxo~DZQ zG?>=x;JBGMI~rTX*{MZ(nzogmrYeV?D$>)SrnO=;YG$n%ji&Yvnz`__Ef=1uTzIN* z;i7{o7Y=vCnUbB|(&HPNjou4kuoj-RWECb`?=Otyj2iAnBkOK7wQ%BTTTVPtmGG&; zi6uHn?3U{*{CF#bJDb`vv8dFOwkq{RRjDV6NMM-#W@@zF%xgeUG)re#Tl#zRk!MlP~c6sSERY>t!OxP#2_^i=-j#4=TWg5r12uN@1gLxyLwB5)j z>P9|MHuAbhZo^qKNo6>*N-7h}Mm}k~kx$f(e4=dR{j#KTO*P{k`2OuVKiv-F9af#6 zD>5|`wdG8hlo&_Nn8NU=f+?6c{Yl$Rf1+;s6J^sk5CgM3==&rh77PIl1DIuq?)$`q zfWRuwa^epw(}vQa*`_c&vf6DYmQ8=scGDm0bm$xDz*lY%<>b}^vzwsHpU&v;<6pZU zE>*(FgvfUZ${0Bsa=#<1EI781W89V;Bh8m-yoVmAzR!oBnH@;vFqi=dUdPb?7KSkL zPzp{lU0C;`!PI4!?i&~-1fXI(&ZkGXB-B{T0 zqbyFSi8P4FmOx3+Oe`8st%~c&<`p$+?G-iByrM?3S5&_{v})(-I z{9uW)98+jI8_gEuDWyik6Ud?JQ=vG~k$Yl?a#4Tc(ZMiO-lKL3~Wf=&087Y0d&KmyYo44(t&!-Sko zUYR#0+WTFjuyRD8pIJfl*nO@7Mn24P;MO! zv%rr(v>uItHX1{DH1xCRvpCrSHDrieItR^T;H`qtr#ZhYcI1)GcWTtqcZ$^17v8|! z8773IQX_bx|S&~tlugEb<2A07VMf50X(C`>#U_V9~*}SMmExo94 z&0~!`eVIHnZLI&VO_qZsjkkf10K08XJMXR5u@4q7pvP%&lg9~4*8$C=Kq)b4rqK*0 zR*hz4ao`%Yb>JGgngDw&lc8*{#+uz0rkJO&X+brbJVkIF1`z`O9Bk4s18`||=^j}; zqDE~!qBLjxk>nA@dSOPxCPlUuA~hLuW+bLqa@=Gf?Pi-aap(9t57-fOcetoBO2ZD-kxU&r{{sX(ke`K+Yj@nvAN3JHb$s(Km-j23!Hng7) z?5WvC9yP#u)96%F&C4BHOMP#u(^Iw*ED%!4v)J17I4 z8vQzG3@p?bw57&CrN%&|hRqj!V4=pKEj9Y?V5H*FuY*V5rq}gb>veriuj@;CUH_Om z_*zggua|ynrKYbbHGN5`*@KFCc>1kH?!GE=_a%|L8WXd~+ixfGGP}e;m0bFT+>3EJ zvf^SET>EVW*S;#a_6xxkqcOFjVHRBbZ3Wl9D!BFw!L=F5& z+sZ+GRSxPGau7ztrcLxMa!|jW93%xEOR_XzlL^p~6*7#!|U-U0C@2l0Z1u(Ec^#0h4tg_@Zv)Xa3D zrqm-`KSVhq(GSVh#!a-zkS}^i?Dt~Dp$N`H1e6ksIK}j^_0S|N&Dsh}GgUyDX>wAj zd#q1!Xz?wVZf>$}uyVc3OM}F0AD>y|ompFXXQs+KGfmzx3>rPC*d~$gxnslEBpA)w z3Pv+kFq&zC5y97thRFg(-nT_#tfDcgA{*m9FpA=wTo-yBWI3JTP)y26 z5LI55rYG@~n9ck#j;T8aY3+QSr16$`IFY{)@FO~~c!{uR)5K*s+eJD25U|l}iG zZlcrdB92I~>O7WsknZl9^NW?lb6FdhW(vlnLcy@fdaXpgsXG|!BO{A?ec`MjPtz-u z<>|)DY0wKY*@GycuH2G?Y(c7GD*FN7^_t!1I<{TsqCGIsgnnpA6xC~jf-;gtY*BHV ztaEx_LZ)WRDGszjoHcin4>H& zT$cjs@q64X^2o6*@CZZD+UxcMeyn%eGT>^2fK9?~lEaXg7ZiUkACXJQBnAxh@(m2b z9iAk}rzB}67?JyaZR5XMGSu=v4knYq^eO)DV?1AhbLO^B z@_8S8w~44`}Etd}R?*T23PxPz(N@AiKs zMPEwX?BL)dxGK^^d?XoY!AI~DO0jebJ|2ARO3z2-AN&`AcrLDIk$w;|9UPFb>p=z} z_yL7$@S2f@-c~H~R^0q>ehtokIK8?7=hxuk%?wra&X1RON1=k3XZvOIfa2wblcMiJX ztU&2yka=;p20%6iBZOH}a5oP;+>}^OC9t(>avvHK}0wM zOXt9tB4L?iO5+|7oAP{D>`S-;K_-udr)vfyRNUGpmb-Wvcyw3bl=%q$hA?-(*(I2} zbL!#0s8v_y^<^gCRrY{`kCI+=R@enTGCLsn2!6f$^egxXt`p=1iyeT`&ZtUdV1-h0 zxeRMk_+z>QL5|j$3tmBQW!As4RlEs(s#OPhMhp?RXy?*xrU+Ev!3fN$W!?o0Ypl^o zcw$yQM|d;;NH`-mc90P$GKS!p0YhBB8%LRoi{c%J!l!!rCPh9Vd5h?5AP5zWx?b#4 zCY1H4ywRPN|J7h!*j4v4`g1 z7d+Mc*kd~%AGu zpA$N#3?YmN4O^9@$U{EK&RhqzYkJyNM(x#yAS2g=*m)cqc>G4Ezzx?K0Q!)S1DJs5 z8gmk)HNz8`FL(rg4g7a$27j&KOl}ZisVb|n7GVTfVabZAGbLLy>|(K@87$h$t%x9Q z%^P_ir?)}0d>N!Fk$aB3GhvvlB=Ccjom{gu87C-0KD$FAHB2;%44l)PedIn3ofR-i zXl1_Fv-P}=H&LFz6%$bP0Mpb}m}ddASVvfjGHnt05m3^=fkQ zB#qZO48jMPDgu-=RfKR6#!D(>W~+e2n76VX<~X(H-1oF*$?u2X!%nw)duU|7y`CyL4D!RzPrqX0u@{3TNuA&WE`{0mWM08TbKv&bRQFm1d5px*tH4{)B#Ufr;hJ2fo3pJ_RoHB8F=bY2k5EI}-sxmf z%0u7BQY)PRbF{#7B2P)lJf^MFl?C&aOD1PwOV!pOUTrLbLI6i=CxdqR#^uX6&>)!mYCY z;-;>de0oUM3dxAjg&mp{l!ZZHLBBwd0TjiXfn#UhA;d}mk%FG*tTtSI8eQAV;$ z?02Ks zN4>9jTU{9WT^Qv-m%m|5I!uBHos+3(nO(F<<>V@WxXC6AFXJ%qGCx;lE;5=lcMHAL2Cl7p@y( ztp}X4iVRMnSyoOG*>Yo_C>pSKlSS4@%`--CropU{fY)f))R=J&4c$JUL-XNaG=%e` zF`P~3v*TmmgU81c@3`-e(R?zSP8NgFa5@|Jj~27z$z(j3BX2tEFBZe0=b_P24Yc?~ z!onKXSt{oeD|DE3_ROflFUv9q&bSy_#4(qwBt)Xco2ZNDon+nSC7Ccwx7PWt5PBsW z`7PRs!)LY|{e^<~3&Y7(ab@z8TX_1K?DeP8SFH2-l0}k7WH*BKVGa%Oidv)qaf6I< z%}~!A0(}d{dzHfs6t2iw9b{Qx{W7|*>4!Z%&(k;zQM!ke6{U^h7STtgaEuagCMXxd zDtkQkPKNTH579b~GL-8r+O2EM1C#ZRm)GlC$z(2Ar&mQvgEk#X5%H_VC}C0IBlvZI z+ql?}V5{*0_$Ujo@|VPZR<67avLKFr2r|q7Uk7Vq>}G&Q#K=tHUz1A^v@}@J;vl5u zHJCB+d3Z}4#@qy^c|cjb#P*^f>d zsx4MXoGP=5v`>`#Gnl}65C(aGv?c67-*--a`Nwm|PvZptMHcm0aac-D%JFv~*~`~K}YUe@Z#I!1?j4XVuHmwza`q!d(@lrwFWZy8=}m|-Nd72G&tDR2TF zT8^Y2#_Bw#{oCtrh5w?o>yo2p`-V$DOZ%)G{*`nt%4jz<5@U6eN+KC0H5*Cieeq=H8PZM5;lANC^HD6Y^}cJUIuv#oU?F~^2i*M633z*R2EOfp%hT)YpI@GUzuesc_lkvACq90kKK%up6$QwH zqV0ESyk@@ua9utYSbbxeWf;$4=q@&4h!=+t%PY1E6y-sR zh&MGB)3GMcw@(Hw$QTnUPa3&cod#h9VqSzZCz=IQ9OyCB31mE_NpxgXR$t#{NcqlW zO_uu!MR^*~w>^}5JzO#aU9g5pg3&s^#HCY|v8wnx;WhW4!_fD;tod#p6Uzz8y)MC^ z`##850aZytg5+* zMmnLOrVeXSMpP_W$6LW5>ds*ncn(>=L_mob6gyUdoj>L&M2p~7{&IVi5f+st&_jH! z!%ZHqVIFwIo92uNG#Qa-gw96|$;5L&f<`VRB?*dr3Yq$blSYeHGU0O|YSNG3Qusq| z_yt~7T;uo^ljSf&3EoRlM?nN*7jKByNt`hWWX;<}k>A~9%vPdMn(&fe`u`w*sB$rx ztX=d0u9FbCVeG+>2*`NpbC#!@4cPomU?v>=%*~M_P5y_;8RU|j^*jjp@|n~n*(gXm z=VX@qSnP@79AFmB{p|nx0u0>2xZAJO5ci+4@jiZbxLY*h{WO9G7uen|T2}6f4%oAD9!A zy1Y*aQVgYZ8{I6h__K%XrG}_a_Rg>w{D_4DQkzOwv>fN!^mr|ZXga{`IbJ{bAC!Bp z>vmjlPUNr@VPw`+A%_tdZ~)IGp@ZNYN8zscOlraO7Wn{j$MKy3{X8sBiDDnVd3`N* zUqOOz<9x+j`7U@$Xe!oW2E*bh@GCN$`6x|S>dtbReLH_cWmnxXgS@tqR z?%RE{LOKK@oiKO19Hr|Zq7yVueU$F^1`mS;@^+r?i}C5#l5ka&ck@zG?m z4OX$Ekk8%cz=ph9@2spB4ZM;9Yh1uTqM^zR{~imK#ft0 zeRR$9C|isU%yXe~;@5B}k-@Y($K@^*UKkJqrf~@<%`{j6tX`J_uh({|y*-Oz?v3DN zIv;w2;|Uzk#~zw^)7fI)_lEuB#ptL%nofoTH1|h?slOP)nLj<6kB5`_u{S=NkNWkn z;!8rY!R}iS{~vot*W9*^eD|;5Fb{2JM2V7ROV+fVN!&KgOwwv%r+w;#5CK}aP$Z9_ zlvC6E_Zuue2!4S2u;Ti1(L-X1;O+ug0K1F*FdN_Rc--^yRr|OanB~2rjan6qRj0M- zmd9+Mk6C>tIyg;jpk+M5b&Tk$O*niRfgR@qN@SojWI0J3^`ZmyV|%6SC~ao?`TY0m zsav&VG;F-G4hb(RY9nk*4C51$|z=NEkOnAAHW-SQe7NOzXD0}}0 zh&L72LFp|km4T|L(61QLgTZ&4w0CLru2_90=p0-jIsq>BZjlA_>CiKO+sLrPm zLtq`c6U+Gmr4?IF5C%uM7OqswoknJ-8g8Hthv9Ky-HL_LziOOtb#?WEYA<9YCMJz^ zF$~q2ocw!DSfP7ltchY*-zr6q+LTm@OEjn^`q8joMqvHqjNk=52X7O!qM?ZFWHe1= z!4~DJRCz(yfeCsQUlsi_$y-c3atcjIEL{;%8-~P;2w)J>QZ4LczPV1o$7uwSm&*BRrK6QP zp?*2Lr`ahnP|ZVVwH0l>70Q}2zH#`K<0!{mc-*UPZ#M;>dvgV*@#G}$!x)0gEL>qg z`yv>^?9T(vL|*{lP_2H|g1y9S{4VkF_Asyq-4cqedmxkA$}2yUG`JDOWV088=q*Xi ztfb@^LY}C)#CD2o@hF&VjtE2P#L%?(|AP@It(3MeIM=nTH+c;1Ty4P6C|<+-2C9pJ zosO1;qO8BQbpj+Dv`RD*MvA$SF1=+f)+8T&5oqk>nZb#YPHtHFN%|P7qj08P4u?b^tC+^XAzhsO_%^rt4N?pSpaPEsE4}Uz1gu zZ{3pLkW;L(h&kWBdG^{{pzuAx!hE@91z9~cwP=_-X(~}5m#A>~Tk?`1#VuACNhhO! z5#`C>W|!muf*bl55i~vrT7*!{0w*E}lK$TDDS+rq8PvE<*IQd7IBNKQO10YBC zN{(ogzJjdm;Xy~wIqX(sm8BwcgB-Uu+-)2Xn?q}XF&))x)FQ9#c6kTaXIa&Z`V*@LR`4JGxs+rYw((~6)M7|+jF7X zf%zW%@RpHWem4`IL%TBWrs@Hth;tNmYVPN{11ckJ*IjI*sl1VBO9qD*VNS5{m8rk? zaQ;Ch(oRPSqdIzruS5;laqbcZs&-e2I+g>xCCXQKqisXgjCmi9`@=HkeS+}SViYdI z#pQ4u`Qd2nUxj0TIQ7RE4KKnlnvTfCpNvo#MaW-Vq7V&nxQHerbm%1p0u)Mx*%2|XU?D2rqc8Fu_G6Vy@vx$EF*|0(PyFYdrUVZA&hxkiK6fqg~MT`6K!znzU=P66-Os>e!0D!%Qw}Py^39heTzRI@PBS}4BS)0DObJA*?e(0GpRTSch7X!S`o|0U8vZwYzcvucC(Vmz^t7CRD9<76I?aF82Qn|U>hUi8<-oc>~%4zvi0&Q@oLbexg zvPuV9pgbsFDx@doN^_)6#*B)9QDWjp^_x0=ZlaKJi0`e=hMY#IK-D1i%T-~@fe+-V}FRl>1Z(>lFM@+ zUrfk!dcGK6`6%?miwTLwy9iQpWWGRFzEy@0M+WS^Nn;V;Vtjv26Rg5*IjnwIKI_(Q zoBF1SrVXCNbq}yz)XHa_`th@-YP~1)dw?zB9pMFh$kah@J`0I&;8_=OY%Pn#wxpfH z*wK&W)oGKEzC)8RUaJ5@v`9BZmB&`wF$zO{VVDz4yF@X{x`T1x{RdRFbHdVf9yao| zK7SZ4C2UMzjo(rP(?b`;Ba`LnGxO31^_d z*ms^22SLaqm?aA+*kR=P;U^PG!hD+*!Y(II)}E~Hy^gU10fpd(u%V2~NOhEK7b)Hf zN94iYYnX4$2yB`}X}%JhTVtRF&|^n=Srl21~QvnR-}qSFC!c#xEqcj9Sh-)xcg zw`yP#k@~I^#(@#n0Cz{YwKdvW5@CzB7My4ewYGO5Ez%H(H{@ZihKcMA9I9&5SCs+H z%|765gP!>RhW~MUJr7{IgSS7 z@fa$>w^SER{!-hM^d2g=enW?>-3eD!6uFaR}8D906!u}!H!j<;P1I`m_6=QA41xUpxf4=G{aYl)GxlT5B zNtvsT&7`~Qw|sM5$j$X>ud>(n91X8m?zsjT&y*zJse87F{nhu6PI#+Vy&bg7MQHUK zqXgN+_g z1PhT|f+P+Ah% z;w;k-`**KgKT0#iZFy4zuKmcf{$~`&3lzS;O<$#V?6>5nJWuoBVFxCSrF78DYoNtd zsDxm)yl*)KfC!}zN~rQ$wMerxPVcri8CMyvbtQ%-d8%xK?Tuqk0LArs@KzC*3hGS*c zJ|ALqH5`sECTMbr!s%!-UHD{tIg0QIBY#Auh@kL%e1)R(FdCtY(c~%|FT$&<=wcX6 zcT*Q?Ei<4wf?sNP~>#8?T3uHpwE2o7UVz0 z0KVrW{@!K9HYRLINZ~qzAE3Z?SqYqfee&dqa}%P3Zz}7!U}tA%XMa1trp{~1D!V;D zOx6ijd6xNxIrDaX{sxR?W;KQJM^cD;U-MBbHUIRyef@m>eEod=-1qa}00030|8iKH I-~he|01OtAPyhe` literal 0 HcmV?d00001 diff --git a/stable/tt-rss/4.0.23/helm-values.md b/stable/tt-rss/4.0.24/helm-values.md similarity index 91% rename from stable/tt-rss/4.0.23/helm-values.md rename to stable/tt-rss/4.0.24/helm-values.md index 8865d6807d0..3c1fde724f2 100644 --- a/stable/tt-rss/4.0.23/helm-values.md +++ b/stable/tt-rss/4.0.24/helm-values.md @@ -13,9 +13,6 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | env | object | See below. | See more environment variables in the tt-rss documentation https://git.tt-rss.org/fox/tt-rss/src/branch/master/classes/config.php#L9 | | env.TTRSS_SELF_URL_PATH | string | `""` | External URL you use to connect to the RSS (the one you enter in your browser) | -| envTpl.TTRSS_DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.TTRSS_DB_PORT | string | `"5432"` | | -| envTpl.TTRSS_DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.TTRSS_DB_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.TTRSS_DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.TTRSS_DB_PASS.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/tt-rss/4.0.23/ix_values.yaml b/stable/tt-rss/4.0.24/ix_values.yaml similarity index 99% rename from stable/tt-rss/4.0.23/ix_values.yaml rename to stable/tt-rss/4.0.24/ix_values.yaml index b07702a5784..e8c8628532e 100644 --- a/stable/tt-rss/4.0.23/ix_values.yaml +++ b/stable/tt-rss/4.0.24/ix_values.yaml @@ -25,8 +25,6 @@ persistence: env: # -- External URL you use to connect to the RSS (the one you enter in your browser) TTRSS_SELF_URL_PATH: "" - -envTpl: TTRSS_DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" TTRSS_DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" TTRSS_DB_PORT: "5432" diff --git a/stable/tt-rss/4.0.23/questions.yaml b/stable/tt-rss/4.0.24/questions.yaml similarity index 99% rename from stable/tt-rss/4.0.23/questions.yaml rename to stable/tt-rss/4.0.24/questions.yaml index 33f39c063a6..623750c370e 100644 --- a/stable/tt-rss/4.0.23/questions.yaml +++ b/stable/tt-rss/4.0.24/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10104 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/tt-rss/4.0.23/security.md b/stable/tt-rss/4.0.24/security.md similarity index 100% rename from stable/tt-rss/4.0.23/security.md rename to stable/tt-rss/4.0.24/security.md diff --git a/stable/tt-rss/4.0.23/templates/common.yaml b/stable/tt-rss/4.0.24/templates/common.yaml similarity index 100% rename from stable/tt-rss/4.0.23/templates/common.yaml rename to stable/tt-rss/4.0.24/templates/common.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/values.yaml b/stable/tt-rss/4.0.24/values.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/values.yaml rename to stable/tt-rss/4.0.24/values.yaml diff --git a/stable/tvheadend/10.0.25/CHANGELOG.md b/stable/tvheadend/10.0.25/CHANGELOG.md new file mode 100644 index 00000000000..26850cb438f --- /dev/null +++ b/stable/tvheadend/10.0.25/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [tvheadend-10.0.25](https://github.com/truecharts/apps/compare/tvheadend-10.0.24...tvheadend-10.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + + +### [tvheadend-10.0.24](https://github.com/truecharts/apps/compare/tvheadend-10.0.23...tvheadend-10.0.24) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [tvheadend-10.0.23](https://github.com/truecharts/apps/compare/tvheadend-10.0.22...tvheadend-10.0.23) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + + + + +### [tvheadend-10.0.22](https://github.com/truecharts/apps/compare/tvheadend-10.0.21...tvheadend-10.0.22) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [tvheadend-10.0.21](https://github.com/truecharts/apps/compare/tvheadend-10.0.20...tvheadend-10.0.21) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [tvheadend-10.0.20](https://github.com/truecharts/apps/compare/tvheadend-10.0.19...tvheadend-10.0.20) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [tvheadend-10.0.19](https://github.com/truecharts/apps/compare/tvheadend-10.0.18...tvheadend-10.0.19) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### tvheadend-10.0.18 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + + + +### [tvheadend-10.0.17](https://github.com/truecharts/apps/compare/tvheadend-10.0.16...tvheadend-10.0.17) (2021-12-05) + +#### Chore + +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) + + + + diff --git a/stable/valheim/2.0.5/CONFIG.md b/stable/tvheadend/10.0.25/CONFIG.md similarity index 100% rename from stable/valheim/2.0.5/CONFIG.md rename to stable/tvheadend/10.0.25/CONFIG.md diff --git a/stable/tvheadend/10.0.25/Chart.lock b/stable/tvheadend/10.0.25/Chart.lock new file mode 100644 index 00000000000..2b9a9207660 --- /dev/null +++ b/stable/tvheadend/10.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:37:38.208012995Z" diff --git a/stable/tvheadend/10.0.25/Chart.yaml b/stable/tvheadend/10.0.25/Chart.yaml new file mode 100644 index 00000000000..d556be7eb7e --- /dev/null +++ b/stable/tvheadend/10.0.25/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "63784405" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +deprecated: false +description: TVheadend - a TV streaming server and digital video recorder +home: https://github.com/truecharts/apps/tree/master/charts/stable/tvheadend +icon: https://truecharts.org/_static/img/appicons/tvheadend-icon.png +keywords: +- tvheadend +- tv +- streaming +- dvb +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: tvheadend +sources: +- https://github.com/tvheadend/tvheadend +type: application +version: 10.0.25 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/tvheadend/10.0.25/README.md b/stable/tvheadend/10.0.25/README.md new file mode 100644 index 00000000000..11c5b9c52a2 --- /dev/null +++ b/stable/tvheadend/10.0.25/README.md @@ -0,0 +1,37 @@ +# Introduction + +TVheadend - a TV streaming server and digital video recorder + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/tvheadend/10.0.25/app-readme.md b/stable/tvheadend/10.0.25/app-readme.md new file mode 100644 index 00000000000..6f8c2dcd2bb --- /dev/null +++ b/stable/tvheadend/10.0.25/app-readme.md @@ -0,0 +1,3 @@ +TVheadend - a TV streaming server and digital video recorder + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/valheim/2.0.5/charts/common-8.9.24.tgz b/stable/tvheadend/10.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/valheim/2.0.5/charts/common-8.9.24.tgz rename to stable/tvheadend/10.0.25/charts/common-8.9.24.tgz diff --git a/stable/tvheadend/10.0.25/helm-values.md b/stable/tvheadend/10.0.25/helm-values.md new file mode 100644 index 00000000000..fa575921806 --- /dev/null +++ b/stable/tvheadend/10.0.25/helm-values.md @@ -0,0 +1,31 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env | object | `{}` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/tvheadend"` | | +| image.tag | string | `"version-63784405@sha256:55617b2f0e1a9d9cefb853c5d52f3729da88c9662ad18813e688201dbe3aee9a"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| persistence.varrun.enabled | bool | `true` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.htsp.enabled | bool | `true` | | +| service.htsp.ports.htsp.enabled | bool | `true` | | +| service.htsp.ports.htsp.port | int | `9982` | | +| service.htsp.ports.htsp.targetPort | int | `9982` | | +| service.main.ports.main.port | int | `9981` | | +| service.main.ports.main.targetPort | int | `9981` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/tvheadend/10.0.25/ix_values.yaml b/stable/tvheadend/10.0.25/ix_values.yaml new file mode 100644 index 00000000000..8b29f5a4108 --- /dev/null +++ b/stable/tvheadend/10.0.25/ix_values.yaml @@ -0,0 +1,38 @@ +image: + repository: tccr.io/truecharts/tvheadend + pullPolicy: IfNotPresent + tag: version-63784405@sha256:55617b2f0e1a9d9cefb853c5d52f3729da88c9662ad18813e688201dbe3aee9a + +securityContext: + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +# See https://github.com/linuxserver/docker-tvheadend#parameters +env: {} + # PUID: 1000 + # TZ: Europe/London + # RUN_OPTS: + +service: + main: + ports: + main: + port: 9981 + targetPort: 9981 + htsp: + enabled: true + ports: + htsp: + enabled: true + port: 9982 + targetPort: 9982 + +persistence: + config: + enabled: true + mountPath: "/config" + varrun: + enabled: true diff --git a/stable/tvheadend/10.0.25/questions.yaml b/stable/tvheadend/10.0.25/questions.yaml new file mode 100644 index 00000000000..ca7502f2ba9 --- /dev/null +++ b/stable/tvheadend/10.0.25/questions.yaml @@ -0,0 +1,1930 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var for LinuxServer.io (compatible) containers" + schema: + type: int + default: 568 + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 9981 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9981 + + + - variable: htsp + label: "HTSP Service" + description: "HTSP service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: htsp + label: "TCP Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 9982 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9982 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/tvheadend/10.0.25/security.md b/stable/tvheadend/10.0.25/security.md new file mode 100644 index 00000000000..12c8c321208 --- /dev/null +++ b/stable/tvheadend/10.0.25/security.md @@ -0,0 +1,80 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: tvheadend/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-tvheadend' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-tvheadend' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-tvheadend' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/tvheadend:version-63784405@sha256:55617b2f0e1a9d9cefb853c5d52f3729da88c9662ad18813e688201dbe3aee9a + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + + + +| No Vulnerabilities found | +|:---------------------------------| + diff --git a/stable/unpackerr/4.0.26/templates/common.yaml b/stable/tvheadend/10.0.25/templates/common.yaml similarity index 100% rename from stable/unpackerr/4.0.26/templates/common.yaml rename to stable/tvheadend/10.0.25/templates/common.yaml diff --git a/stable/valheim/2.0.5/values.yaml b/stable/tvheadend/10.0.25/values.yaml similarity index 100% rename from stable/valheim/2.0.5/values.yaml rename to stable/tvheadend/10.0.25/values.yaml diff --git a/stable/twtxt/1.0.24/Chart.lock b/stable/twtxt/1.0.24/Chart.lock deleted file mode 100644 index 28b4ff9c849..00000000000 --- a/stable/twtxt/1.0.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:50:54.075012225Z" diff --git a/stable/twtxt/1.0.24/CHANGELOG.md b/stable/twtxt/1.0.25/CHANGELOG.md similarity index 90% rename from stable/twtxt/1.0.24/CHANGELOG.md rename to stable/twtxt/1.0.25/CHANGELOG.md index bf4ac0751c5..0b66c6335ee 100644 --- a/stable/twtxt/1.0.24/CHANGELOG.md +++ b/stable/twtxt/1.0.25/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [twtxt-1.0.25](https://github.com/truecharts/apps/compare/twtxt-1.0.24...twtxt-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [twtxt-1.0.24](https://github.com/truecharts/apps/compare/twtxt-1.0.23...twtxt-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [twtxt-1.0.16](https://github.com/truecharts/apps/compare/twtxt-1.0.15...twtxt-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [twtxt-1.0.15](https://github.com/truecharts/apps/compare/twtxt-1.0.14...twtxt-1.0.15) (2021-12-04) - diff --git a/stable/webgrabplus/0.0.6/CONFIG.md b/stable/twtxt/1.0.25/CONFIG.md similarity index 100% rename from stable/webgrabplus/0.0.6/CONFIG.md rename to stable/twtxt/1.0.25/CONFIG.md diff --git a/stable/twtxt/1.0.25/Chart.lock b/stable/twtxt/1.0.25/Chart.lock new file mode 100644 index 00000000000..303dca68024 --- /dev/null +++ b/stable/twtxt/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:37:51.710322037Z" diff --git a/stable/twtxt/1.0.24/Chart.yaml b/stable/twtxt/1.0.25/Chart.yaml similarity index 98% rename from stable/twtxt/1.0.24/Chart.yaml rename to stable/twtxt/1.0.25/Chart.yaml index a459389be4c..55488d67d8a 100644 --- a/stable/twtxt/1.0.24/Chart.yaml +++ b/stable/twtxt/1.0.25/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/prologic/twtxt - https://github.com/nicholaswilde/docker-twtxt type: application -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/twtxt/1.0.24/README.md b/stable/twtxt/1.0.25/README.md similarity index 100% rename from stable/twtxt/1.0.24/README.md rename to stable/twtxt/1.0.25/README.md diff --git a/stable/twtxt/1.0.24/app-readme.md b/stable/twtxt/1.0.25/app-readme.md similarity index 100% rename from stable/twtxt/1.0.24/app-readme.md rename to stable/twtxt/1.0.25/app-readme.md diff --git a/stable/webgrabplus/0.0.6/charts/common-8.9.24.tgz b/stable/twtxt/1.0.25/charts/common-8.9.24.tgz similarity index 100% rename from stable/webgrabplus/0.0.6/charts/common-8.9.24.tgz rename to stable/twtxt/1.0.25/charts/common-8.9.24.tgz diff --git a/stable/twtxt/1.0.24/helm-values.md b/stable/twtxt/1.0.25/helm-values.md similarity index 100% rename from stable/twtxt/1.0.24/helm-values.md rename to stable/twtxt/1.0.25/helm-values.md diff --git a/stable/twtxt/1.0.24/ix_values.yaml b/stable/twtxt/1.0.25/ix_values.yaml similarity index 100% rename from stable/twtxt/1.0.24/ix_values.yaml rename to stable/twtxt/1.0.25/ix_values.yaml diff --git a/stable/twtxt/1.0.24/questions.yaml b/stable/twtxt/1.0.25/questions.yaml similarity index 99% rename from stable/twtxt/1.0.24/questions.yaml rename to stable/twtxt/1.0.25/questions.yaml index e3c33958e06..8ce2ac1a154 100644 --- a/stable/twtxt/1.0.24/questions.yaml +++ b/stable/twtxt/1.0.25/questions.yaml @@ -369,7 +369,6 @@ questions: schema: type: int default: 10078 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/twtxt/1.0.24/security.md b/stable/twtxt/1.0.25/security.md similarity index 100% rename from stable/twtxt/1.0.24/security.md rename to stable/twtxt/1.0.25/security.md diff --git a/stable/twtxt/1.0.24/templates/common.yaml b/stable/twtxt/1.0.25/templates/common.yaml similarity index 100% rename from stable/twtxt/1.0.24/templates/common.yaml rename to stable/twtxt/1.0.25/templates/common.yaml diff --git a/stable/webgrabplus/0.0.6/values.yaml b/stable/twtxt/1.0.25/values.yaml similarity index 100% rename from stable/webgrabplus/0.0.6/values.yaml rename to stable/twtxt/1.0.25/values.yaml diff --git a/stable/ubooquity/0.0.5/Chart.lock b/stable/ubooquity/0.0.5/Chart.lock deleted file mode 100644 index 5361a20cad8..00000000000 --- a/stable/ubooquity/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:51:07.307276537Z" diff --git a/stable/ubooquity/0.0.5/CHANGELOG.md b/stable/ubooquity/0.0.6/CHANGELOG.md similarity index 86% rename from stable/ubooquity/0.0.5/CHANGELOG.md rename to stable/ubooquity/0.0.6/CHANGELOG.md index 95f0dd0b9a8..b445118d718 100644 --- a/stable/ubooquity/0.0.5/CHANGELOG.md +++ b/stable/ubooquity/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ubooquity-0.0.6](https://github.com/truecharts/apps/compare/ubooquity-0.0.5...ubooquity-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [ubooquity-0.0.5](https://github.com/truecharts/apps/compare/ubooquity-0.0.4...ubooquity-0.0.5) (2021-12-19) diff --git a/stable/whoogle/1.0.24/CONFIG.md b/stable/ubooquity/0.0.6/CONFIG.md similarity index 100% rename from stable/whoogle/1.0.24/CONFIG.md rename to stable/ubooquity/0.0.6/CONFIG.md diff --git a/stable/ubooquity/0.0.6/Chart.lock b/stable/ubooquity/0.0.6/Chart.lock new file mode 100644 index 00000000000..b61d0bb07f2 --- /dev/null +++ b/stable/ubooquity/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:02.612845268Z" diff --git a/stable/ubooquity/0.0.5/Chart.yaml b/stable/ubooquity/0.0.6/Chart.yaml similarity index 98% rename from stable/ubooquity/0.0.5/Chart.yaml rename to stable/ubooquity/0.0.6/Chart.yaml index 8dc10d04187..ad6eb02a218 100644 --- a/stable/ubooquity/0.0.5/Chart.yaml +++ b/stable/ubooquity/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: ubooquity -version: 0.0.5 +version: 0.0.6 appVersion: "2.1.2" description: Ubooquity is a free, lightweight and easy-to-use home server for your comics and ebooks. type: application diff --git a/stable/ubooquity/0.0.5/README.md b/stable/ubooquity/0.0.6/README.md similarity index 100% rename from stable/ubooquity/0.0.5/README.md rename to stable/ubooquity/0.0.6/README.md diff --git a/stable/ubooquity/0.0.5/app-readme.md b/stable/ubooquity/0.0.6/app-readme.md similarity index 100% rename from stable/ubooquity/0.0.5/app-readme.md rename to stable/ubooquity/0.0.6/app-readme.md diff --git a/stable/whoogle/1.0.24/charts/common-8.9.24.tgz b/stable/ubooquity/0.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/whoogle/1.0.24/charts/common-8.9.24.tgz rename to stable/ubooquity/0.0.6/charts/common-8.9.24.tgz diff --git a/stable/ubooquity/0.0.5/helm-values.md b/stable/ubooquity/0.0.6/helm-values.md similarity index 100% rename from stable/ubooquity/0.0.5/helm-values.md rename to stable/ubooquity/0.0.6/helm-values.md diff --git a/stable/ubooquity/0.0.5/ix_values.yaml b/stable/ubooquity/0.0.6/ix_values.yaml similarity index 100% rename from stable/ubooquity/0.0.5/ix_values.yaml rename to stable/ubooquity/0.0.6/ix_values.yaml diff --git a/stable/ubooquity/0.0.5/questions.yaml b/stable/ubooquity/0.0.6/questions.yaml similarity index 100% rename from stable/ubooquity/0.0.5/questions.yaml rename to stable/ubooquity/0.0.6/questions.yaml diff --git a/stable/ubooquity/0.0.5/security.md b/stable/ubooquity/0.0.6/security.md similarity index 100% rename from stable/ubooquity/0.0.5/security.md rename to stable/ubooquity/0.0.6/security.md diff --git a/stable/unpoller/1.0.15/templates/common.yaml b/stable/ubooquity/0.0.6/templates/common.yaml similarity index 100% rename from stable/unpoller/1.0.15/templates/common.yaml rename to stable/ubooquity/0.0.6/templates/common.yaml diff --git a/stable/whoogle/1.0.24/values.yaml b/stable/ubooquity/0.0.6/values.yaml similarity index 100% rename from stable/whoogle/1.0.24/values.yaml rename to stable/ubooquity/0.0.6/values.yaml diff --git a/stable/unifi/9.0.28/Chart.lock b/stable/unifi/9.0.28/Chart.lock deleted file mode 100644 index 70837251ca9..00000000000 --- a/stable/unifi/9.0.28/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:51:20.846688852Z" diff --git a/stable/unifi/9.0.28/CHANGELOG.md b/stable/unifi/9.0.29/CHANGELOG.md similarity index 82% rename from stable/unifi/9.0.28/CHANGELOG.md rename to stable/unifi/9.0.29/CHANGELOG.md index 6cce12ecf84..2da14a28f8e 100644 --- a/stable/unifi/9.0.28/CHANGELOG.md +++ b/stable/unifi/9.0.29/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [unifi-9.0.29](https://github.com/truecharts/apps/compare/unifi-9.0.28...unifi-9.0.29) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [unifi-9.0.28](https://github.com/truecharts/apps/compare/unifi-9.0.27...unifi-9.0.28) (2021-12-19) @@ -85,15 +97,3 @@ * update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) - - -### [unifi-9.0.19](https://github.com/truecharts/apps/compare/unifi-9.0.18...unifi-9.0.19) (2021-12-07) - -#### Chore - -* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) - - - - -### unifi-9.0.18 (2021-12-05) diff --git a/stable/wikijs/4.0.14/CONFIG.md b/stable/unifi/9.0.29/CONFIG.md similarity index 100% rename from stable/wikijs/4.0.14/CONFIG.md rename to stable/unifi/9.0.29/CONFIG.md diff --git a/stable/unifi/9.0.29/Chart.lock b/stable/unifi/9.0.29/Chart.lock new file mode 100644 index 00000000000..eb05b39c5a6 --- /dev/null +++ b/stable/unifi/9.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:14.98424023Z" diff --git a/stable/unifi/9.0.28/Chart.yaml b/stable/unifi/9.0.29/Chart.yaml similarity index 97% rename from stable/unifi/9.0.28/Chart.yaml rename to stable/unifi/9.0.29/Chart.yaml index b2ebead407f..737dbc7a2b2 100644 --- a/stable/unifi/9.0.28/Chart.yaml +++ b/stable/unifi/9.0.29/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/jacobalberty/unifi-docker - https://unifi-network.ui.com type: application -version: 9.0.28 +version: 9.0.29 annotations: truecharts.org/catagories: | - Networking diff --git a/stable/unifi/9.0.28/README.md b/stable/unifi/9.0.29/README.md similarity index 100% rename from stable/unifi/9.0.28/README.md rename to stable/unifi/9.0.29/README.md diff --git a/stable/unifi/9.0.28/app-readme.md b/stable/unifi/9.0.29/app-readme.md similarity index 100% rename from stable/unifi/9.0.28/app-readme.md rename to stable/unifi/9.0.29/app-readme.md diff --git a/stable/wikijs/4.0.14/charts/common-8.9.24.tgz b/stable/unifi/9.0.29/charts/common-8.9.24.tgz similarity index 100% rename from stable/wikijs/4.0.14/charts/common-8.9.24.tgz rename to stable/unifi/9.0.29/charts/common-8.9.24.tgz diff --git a/stable/unifi/9.0.28/helm-values.md b/stable/unifi/9.0.29/helm-values.md similarity index 95% rename from stable/unifi/9.0.28/helm-values.md rename to stable/unifi/9.0.29/helm-values.md index 29ca4469978..b7f6d7d24e9 100644 --- a/stable/unifi/9.0.28/helm-values.md +++ b/stable/unifi/9.0.29/helm-values.md @@ -12,8 +12,8 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| | env.PUID | int | `568` | | -| envTpl.UNIFI_GID | string | `"{{ .Values.env.PUID }}"` | | -| envTpl.UNIFI_UID | string | `"{{ .Values.podSecurityContext.fsGroup }}"` | | +| env.UNIFI_GID | string | `"{{ .Values.env.PUID }}"` | | +| env.UNIFI_UID | string | `"{{ .Values.podSecurityContext.fsGroup }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/unifi"` | | | image.tag | string | `"v6.5.55@sha256:c74556ef862dab1534ed848d6efa57f40a11399172230aec57e5e850ce542921"` | | diff --git a/stable/unifi/9.0.28/ix_values.yaml b/stable/unifi/9.0.29/ix_values.yaml similarity index 99% rename from stable/unifi/9.0.28/ix_values.yaml rename to stable/unifi/9.0.29/ix_values.yaml index 148b53d2177..9871379dc46 100644 --- a/stable/unifi/9.0.28/ix_values.yaml +++ b/stable/unifi/9.0.29/ix_values.yaml @@ -3,11 +3,6 @@ image: tag: v6.5.55@sha256:c74556ef862dab1534ed848d6efa57f40a11399172230aec57e5e850ce542921 pullPolicy: IfNotPresent -envTpl: - # Permissions Settings - UNIFI_GID: "{{ .Values.env.PUID }}" - UNIFI_UID: "{{ .Values.podSecurityContext.fsGroup }}" - service: main: ports: @@ -62,6 +57,10 @@ podSecurityContext: env: # TZ: PUID: 568 + # Permissions Settings + UNIFI_GID: "{{ .Values.env.PUID }}" + UNIFI_UID: "{{ .Values.podSecurityContext.fsGroup }}" + persistence: config: enabled: true diff --git a/stable/unifi/9.0.28/questions.yaml b/stable/unifi/9.0.29/questions.yaml similarity index 98% rename from stable/unifi/9.0.28/questions.yaml rename to stable/unifi/9.0.29/questions.yaml index 769b47ae2c4..b2199811f31 100644 --- a/stable/unifi/9.0.28/questions.yaml +++ b/stable/unifi/9.0.29/questions.yaml @@ -351,7 +351,6 @@ questions: schema: type: int default: 8443 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -445,19 +444,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8080 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -550,19 +542,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 3478 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -655,19 +640,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 6789 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -760,19 +738,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8880 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -814,19 +785,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 8843 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/unifi/9.0.28/security.md b/stable/unifi/9.0.29/security.md similarity index 99% rename from stable/unifi/9.0.28/security.md rename to stable/unifi/9.0.29/security.md index 93a9596b25b..157887e3e6d 100644 --- a/stable/unifi/9.0.28/security.md +++ b/stable/unifi/9.0.29/security.md @@ -240,7 +240,7 @@ hide: | commons-io:commons-io | CVE-2021-29425 | MEDIUM | 2.6 | 2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
https://github.com/advisories/GHSA-gwrp-pvrq-jmwv
https://issues.apache.org/jira/browse/IO-556
https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E
https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29425
https://ubuntu.com/security/notices/USN-5095-1
https://www.openwall.com/lists/oss-security/2021/04/12/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | io.springfox:springfox-swagger-ui | CVE-2019-17495 | CRITICAL | 2.9.2 | 2.10.0 |
Expand...https://github.com/advisories/GHSA-c427-hjc3-wrfw
https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11
https://github.com/tarantula-team/CSS-injection-in-Swagger-UI
https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-17495
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.10 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
| +| org.apache.logging.log4j:log4j-api | CVE-2021-45105 | HIGH | 2.16.0 | 2.17.0, 2.12.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/19/1
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45105
https://security.netapp.com/advisory/ntap-20211218-0001/
https://www.debian.org/security/2021/dsa-5024
https://www.zerodayinitiative.com/advisories/ZDI-21-1541/
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-13934 | HIGH | 8.5.56 | 8.5.57, 9.0.37 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3Cad62f54e-8fd7-e326-25f1-3bdf1ffa3818%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934
https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13934
https://security.netapp.com/advisory/ntap-20200724-0003/
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4596-1/
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/4
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-17527 | HIGH | 8.5.56 | 8.5.60, 9.0.40, 10.0.2 |
Expand...http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40
http://www.openwall.com/lists/oss-security/2020/12/03/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527
https://github.com/apache/tomcat/commit/21e3408671aac7e0d7e264e720cac8b1b189eb29 (8.5.60)
https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65 (9.0.40)
https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd5babd13d7a350b369b2f647b4dd32ce678af42f9aba5389df1ae6ca@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17527
https://security.gentoo.org/glsa/202012-23
https://security.netapp.com/advisory/ntap-20201210-0003/
https://www.debian.org/security/2021/dsa-4835
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
| | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | HIGH | 8.5.56 | 8.5.63, 9.0.43, 10.0.2 |
Expand...http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/1
https://github.com/advisories/GHSA-j39c-c8hj-x4j3
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25122
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://www.debian.org/security/2021/dsa-4891
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/uptime-kuma/1.0.25/templates/common.yaml b/stable/unifi/9.0.29/templates/common.yaml similarity index 100% rename from stable/uptime-kuma/1.0.25/templates/common.yaml rename to stable/unifi/9.0.29/templates/common.yaml diff --git a/stable/wikijs/4.0.14/values.yaml b/stable/unifi/9.0.29/values.yaml similarity index 100% rename from stable/wikijs/4.0.14/values.yaml rename to stable/unifi/9.0.29/values.yaml diff --git a/stable/unpackerr/4.0.26/Chart.lock b/stable/unpackerr/4.0.26/Chart.lock deleted file mode 100644 index ad448fd0adf..00000000000 --- a/stable/unpackerr/4.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:51:33.035034178Z" diff --git a/stable/unpackerr/4.0.26/CHANGELOG.md b/stable/unpackerr/4.0.27/CHANGELOG.md similarity index 85% rename from stable/unpackerr/4.0.26/CHANGELOG.md rename to stable/unpackerr/4.0.27/CHANGELOG.md index 3be9642f9d2..366e5f5ffee 100644 --- a/stable/unpackerr/4.0.26/CHANGELOG.md +++ b/stable/unpackerr/4.0.27/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [unpackerr-4.0.27](https://github.com/truecharts/apps/compare/unpackerr-4.0.26...unpackerr-4.0.27) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [unpackerr-4.0.26](https://github.com/truecharts/apps/compare/unpackerr-4.0.25...unpackerr-4.0.26) (2021-12-19) @@ -88,12 +97,3 @@ * bump apps to generate security page * move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - diff --git a/stable/wireshark/0.0.5/CONFIG.md b/stable/unpackerr/4.0.27/CONFIG.md similarity index 100% rename from stable/wireshark/0.0.5/CONFIG.md rename to stable/unpackerr/4.0.27/CONFIG.md diff --git a/stable/unpackerr/4.0.27/Chart.lock b/stable/unpackerr/4.0.27/Chart.lock new file mode 100644 index 00000000000..9da82b2fa90 --- /dev/null +++ b/stable/unpackerr/4.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:19.085556179Z" diff --git a/stable/unpackerr/4.0.26/Chart.yaml b/stable/unpackerr/4.0.27/Chart.yaml similarity index 98% rename from stable/unpackerr/4.0.26/Chart.yaml rename to stable/unpackerr/4.0.27/Chart.yaml index 9966811799e..07e710e0109 100644 --- a/stable/unpackerr/4.0.26/Chart.yaml +++ b/stable/unpackerr/4.0.27/Chart.yaml @@ -26,7 +26,7 @@ sources: - https://github.com/davidnewhall/unpackerr - https://hub.docker.com/r/golift/unpackerr type: application -version: 4.0.26 +version: 4.0.27 annotations: truecharts.org/catagories: | - media diff --git a/stable/unpackerr/4.0.26/README.md b/stable/unpackerr/4.0.27/README.md similarity index 100% rename from stable/unpackerr/4.0.26/README.md rename to stable/unpackerr/4.0.27/README.md diff --git a/stable/unpackerr/4.0.26/app-readme.md b/stable/unpackerr/4.0.27/app-readme.md similarity index 100% rename from stable/unpackerr/4.0.26/app-readme.md rename to stable/unpackerr/4.0.27/app-readme.md diff --git a/stable/wireshark/0.0.5/charts/common-8.9.24.tgz b/stable/unpackerr/4.0.27/charts/common-8.9.24.tgz similarity index 100% rename from stable/wireshark/0.0.5/charts/common-8.9.24.tgz rename to stable/unpackerr/4.0.27/charts/common-8.9.24.tgz diff --git a/stable/unpackerr/4.0.26/helm-values.md b/stable/unpackerr/4.0.27/helm-values.md similarity index 100% rename from stable/unpackerr/4.0.26/helm-values.md rename to stable/unpackerr/4.0.27/helm-values.md diff --git a/stable/unpackerr/4.0.26/ix_values.yaml b/stable/unpackerr/4.0.27/ix_values.yaml similarity index 100% rename from stable/unpackerr/4.0.26/ix_values.yaml rename to stable/unpackerr/4.0.27/ix_values.yaml diff --git a/stable/unpackerr/4.0.26/questions.yaml b/stable/unpackerr/4.0.27/questions.yaml similarity index 100% rename from stable/unpackerr/4.0.26/questions.yaml rename to stable/unpackerr/4.0.27/questions.yaml diff --git a/stable/unpackerr/4.0.26/security.md b/stable/unpackerr/4.0.27/security.md similarity index 100% rename from stable/unpackerr/4.0.26/security.md rename to stable/unpackerr/4.0.27/security.md diff --git a/stable/uptimerobot-prometheus/2.0.5/templates/common.yaml b/stable/unpackerr/4.0.27/templates/common.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/templates/common.yaml rename to stable/unpackerr/4.0.27/templates/common.yaml diff --git a/stable/wireshark/0.0.5/values.yaml b/stable/unpackerr/4.0.27/values.yaml similarity index 100% rename from stable/wireshark/0.0.5/values.yaml rename to stable/unpackerr/4.0.27/values.yaml diff --git a/stable/unpoller/1.0.15/Chart.lock b/stable/unpoller/1.0.15/Chart.lock deleted file mode 100644 index 0ccfc2f3c99..00000000000 --- a/stable/unpoller/1.0.15/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:51:44.297808305Z" diff --git a/stable/unpoller/1.0.15/CHANGELOG.md b/stable/unpoller/1.0.16/CHANGELOG.md similarity index 89% rename from stable/unpoller/1.0.15/CHANGELOG.md rename to stable/unpoller/1.0.16/CHANGELOG.md index 9c0329a0d3a..cdd9b018929 100644 --- a/stable/unpoller/1.0.15/CHANGELOG.md +++ b/stable/unpoller/1.0.16/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [unpoller-1.0.16](https://github.com/truecharts/apps/compare/unpoller-1.0.15...unpoller-1.0.16) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) + + + ### [unpoller-1.0.15](https://github.com/truecharts/apps/compare/unpoller-1.0.14...unpoller-1.0.15) (2021-12-19) @@ -87,13 +97,3 @@ ### [unpoller-1.0.7](https://github.com/truecharts/apps/compare/unpoller-1.0.6...unpoller-1.0.7) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [unpoller-1.0.6](https://github.com/truecharts/apps/compare/unpoller-1.0.5...unpoller-1.0.6) (2021-12-04) - diff --git a/stable/xbackbone/0.0.13/CONFIG.md b/stable/unpoller/1.0.16/CONFIG.md similarity index 100% rename from stable/xbackbone/0.0.13/CONFIG.md rename to stable/unpoller/1.0.16/CONFIG.md diff --git a/stable/unpoller/1.0.16/Chart.lock b/stable/unpoller/1.0.16/Chart.lock new file mode 100644 index 00000000000..9b1238c6c40 --- /dev/null +++ b/stable/unpoller/1.0.16/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:29.787918181Z" diff --git a/stable/unpoller/1.0.15/Chart.yaml b/stable/unpoller/1.0.16/Chart.yaml similarity index 98% rename from stable/unpoller/1.0.15/Chart.yaml rename to stable/unpoller/1.0.16/Chart.yaml index af854ebb1a0..44f5b6fa273 100644 --- a/stable/unpoller/1.0.15/Chart.yaml +++ b/stable/unpoller/1.0.16/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/unifi-poller/unifi-poller - https://hub.docker.com/r/golift/unifi-poller type: application -version: 1.0.15 +version: 1.0.16 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/unpoller/1.0.15/README.md b/stable/unpoller/1.0.16/README.md similarity index 100% rename from stable/unpoller/1.0.15/README.md rename to stable/unpoller/1.0.16/README.md diff --git a/stable/unpoller/1.0.15/app-readme.md b/stable/unpoller/1.0.16/app-readme.md similarity index 100% rename from stable/unpoller/1.0.15/app-readme.md rename to stable/unpoller/1.0.16/app-readme.md diff --git a/stable/xbackbone/0.0.13/charts/common-8.9.24.tgz b/stable/unpoller/1.0.16/charts/common-8.9.24.tgz similarity index 100% rename from stable/xbackbone/0.0.13/charts/common-8.9.24.tgz rename to stable/unpoller/1.0.16/charts/common-8.9.24.tgz diff --git a/stable/unpoller/1.0.15/helm-values.md b/stable/unpoller/1.0.16/helm-values.md similarity index 84% rename from stable/unpoller/1.0.15/helm-values.md rename to stable/unpoller/1.0.16/helm-values.md index 546cb294732..244e958b337 100644 --- a/stable/unpoller/1.0.15/helm-values.md +++ b/stable/unpoller/1.0.16/helm-values.md @@ -11,7 +11,7 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| -| env | object | `{"UP_INFLUXDB_DISABLE":true}` | Environment variable configuration options for unifi-poller ([docs](https://unifipoller.com/docs/install/configuration)). Note: a [configuration file](https://github.com/unifi-poller/unifi-poller/blob/master/examples/up.conf.example) is also supported. | +| env | object | `{"UP_INFLUXDB_DISABLE":true,"UP_PROMETHEUS_DISABLE":false}` | Environment variable configuration options for unifi-poller ([docs](https://unifipoller.com/docs/install/configuration)). Note: a [configuration file](https://github.com/unifi-poller/unifi-poller/blob/master/examples/up.conf.example) is also supported. | | image.pullPolicy | string | `"IfNotPresent"` | Image [k8s pull policy](https://kubernetes.io/docs/concepts/containers/images/#updating-images). | | image.repository | string | `"tccr.io/truecharts/unifi-poller"` | Image to deploy. | | image.tag | string | `"v2.1.3@sha256:2d6cd1f4cdc3d8522d697830f69ca12aa2fe24fda4e5476610af6e0b5c0597e9"` | Image tag to deploy. | diff --git a/stable/unpoller/1.0.15/ix_values.yaml b/stable/unpoller/1.0.16/ix_values.yaml similarity index 98% rename from stable/unpoller/1.0.15/ix_values.yaml rename to stable/unpoller/1.0.16/ix_values.yaml index 19150d9e851..dd8d7339467 100644 --- a/stable/unpoller/1.0.15/ix_values.yaml +++ b/stable/unpoller/1.0.16/ix_values.yaml @@ -14,7 +14,7 @@ env: # UP_UNIFI_DEFAULT_URL: "https://127.0.0.1:8443" # UP_UNIFI_DEFAULT_USER: "unifipoller" # UP_UNIFI_DEFAULT_PASS: "unifipoller" - # UP_PROMETHEUS_DISABLE: true + UP_PROMETHEUS_DISABLE: false UP_INFLUXDB_DISABLE: true service: diff --git a/stable/unpoller/1.0.15/questions.yaml b/stable/unpoller/1.0.16/questions.yaml similarity index 99% rename from stable/unpoller/1.0.15/questions.yaml rename to stable/unpoller/1.0.16/questions.yaml index 866eae4b32e..de6efda7546 100644 --- a/stable/unpoller/1.0.15/questions.yaml +++ b/stable/unpoller/1.0.16/questions.yaml @@ -90,12 +90,6 @@ questions: type: string default: "" required: true - - variable: UP_PROMETHEUS_DISABLE - label: "Disable Prometheus Metrics" - schema: - type: boolean - default: false - hidden: true - variable: envList label: "Image environment" diff --git a/stable/unpoller/1.0.15/security.md b/stable/unpoller/1.0.16/security.md similarity index 100% rename from stable/unpoller/1.0.15/security.md rename to stable/unpoller/1.0.16/security.md diff --git a/stable/webgrabplus/0.0.6/templates/common.yaml b/stable/unpoller/1.0.16/templates/common.yaml similarity index 100% rename from stable/webgrabplus/0.0.6/templates/common.yaml rename to stable/unpoller/1.0.16/templates/common.yaml diff --git a/stable/unpoller/1.0.15/templates/prometheusrules.yaml b/stable/unpoller/1.0.16/templates/prometheusrules.yaml similarity index 100% rename from stable/unpoller/1.0.15/templates/prometheusrules.yaml rename to stable/unpoller/1.0.16/templates/prometheusrules.yaml diff --git a/stable/unpoller/1.0.15/templates/servicemonitor.yaml b/stable/unpoller/1.0.16/templates/servicemonitor.yaml similarity index 100% rename from stable/unpoller/1.0.15/templates/servicemonitor.yaml rename to stable/unpoller/1.0.16/templates/servicemonitor.yaml diff --git a/stable/xbackbone/0.0.13/values.yaml b/stable/unpoller/1.0.16/values.yaml similarity index 100% rename from stable/xbackbone/0.0.13/values.yaml rename to stable/unpoller/1.0.16/values.yaml diff --git a/stable/uptime-kuma/1.0.25/Chart.lock b/stable/uptime-kuma/1.0.25/Chart.lock deleted file mode 100644 index eca3f93781a..00000000000 --- a/stable/uptime-kuma/1.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:51:45.873879444Z" diff --git a/stable/uptime-kuma/1.0.25/CHANGELOG.md b/stable/uptime-kuma/1.0.26/CHANGELOG.md similarity index 90% rename from stable/uptime-kuma/1.0.25/CHANGELOG.md rename to stable/uptime-kuma/1.0.26/CHANGELOG.md index aa1b2f61432..35f6aece708 100644 --- a/stable/uptime-kuma/1.0.25/CHANGELOG.md +++ b/stable/uptime-kuma/1.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [uptime-kuma-1.0.26](https://github.com/truecharts/apps/compare/uptime-kuma-1.0.25...uptime-kuma-1.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [uptime-kuma-1.0.25](https://github.com/truecharts/apps/compare/uptime-kuma-1.0.24...uptime-kuma-1.0.25) (2021-12-19) @@ -87,13 +97,3 @@ -### [uptime-kuma-1.0.17](https://github.com/truecharts/apps/compare/uptime-kuma-1.0.16...uptime-kuma-1.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [uptime-kuma-1.0.16](https://github.com/truecharts/apps/compare/uptime-kuma-1.0.15...uptime-kuma-1.0.16) (2021-12-04) diff --git a/stable/xteve/4.0.24/CONFIG.md b/stable/uptime-kuma/1.0.26/CONFIG.md similarity index 100% rename from stable/xteve/4.0.24/CONFIG.md rename to stable/uptime-kuma/1.0.26/CONFIG.md diff --git a/stable/uptime-kuma/1.0.26/Chart.lock b/stable/uptime-kuma/1.0.26/Chart.lock new file mode 100644 index 00000000000..a3072ba504f --- /dev/null +++ b/stable/uptime-kuma/1.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:35.077083878Z" diff --git a/stable/uptime-kuma/1.0.25/Chart.yaml b/stable/uptime-kuma/1.0.26/Chart.yaml similarity index 97% rename from stable/uptime-kuma/1.0.25/Chart.yaml rename to stable/uptime-kuma/1.0.26/Chart.yaml index 09d523906da..a0cb2eafeb1 100644 --- a/stable/uptime-kuma/1.0.25/Chart.yaml +++ b/stable/uptime-kuma/1.0.26/Chart.yaml @@ -20,7 +20,7 @@ name: uptime-kuma sources: - https://github.com/louislam/uptime-kuma type: application -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - monitoring diff --git a/stable/uptime-kuma/1.0.25/README.md b/stable/uptime-kuma/1.0.26/README.md similarity index 100% rename from stable/uptime-kuma/1.0.25/README.md rename to stable/uptime-kuma/1.0.26/README.md diff --git a/stable/uptime-kuma/1.0.25/app-readme.md b/stable/uptime-kuma/1.0.26/app-readme.md similarity index 100% rename from stable/uptime-kuma/1.0.25/app-readme.md rename to stable/uptime-kuma/1.0.26/app-readme.md diff --git a/stable/xteve/4.0.24/charts/common-8.9.24.tgz b/stable/uptime-kuma/1.0.26/charts/common-8.9.24.tgz similarity index 100% rename from stable/xteve/4.0.24/charts/common-8.9.24.tgz rename to stable/uptime-kuma/1.0.26/charts/common-8.9.24.tgz diff --git a/stable/uptime-kuma/1.0.25/helm-values.md b/stable/uptime-kuma/1.0.26/helm-values.md similarity index 100% rename from stable/uptime-kuma/1.0.25/helm-values.md rename to stable/uptime-kuma/1.0.26/helm-values.md diff --git a/stable/uptime-kuma/1.0.25/ix_values.yaml b/stable/uptime-kuma/1.0.26/ix_values.yaml similarity index 100% rename from stable/uptime-kuma/1.0.25/ix_values.yaml rename to stable/uptime-kuma/1.0.26/ix_values.yaml diff --git a/stable/uptime-kuma/1.0.25/questions.yaml b/stable/uptime-kuma/1.0.26/questions.yaml similarity index 99% rename from stable/uptime-kuma/1.0.25/questions.yaml rename to stable/uptime-kuma/1.0.26/questions.yaml index 799b3804b24..d5afbb9ab76 100644 --- a/stable/uptime-kuma/1.0.25/questions.yaml +++ b/stable/uptime-kuma/1.0.26/questions.yaml @@ -345,7 +345,6 @@ questions: schema: type: int default: 3001 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/uptime-kuma/1.0.25/security.md b/stable/uptime-kuma/1.0.26/security.md similarity index 100% rename from stable/uptime-kuma/1.0.25/security.md rename to stable/uptime-kuma/1.0.26/security.md diff --git a/stable/whoogle/1.0.24/templates/common.yaml b/stable/uptime-kuma/1.0.26/templates/common.yaml similarity index 100% rename from stable/whoogle/1.0.24/templates/common.yaml rename to stable/uptime-kuma/1.0.26/templates/common.yaml diff --git a/stable/xteve/4.0.24/values.yaml b/stable/uptime-kuma/1.0.26/values.yaml similarity index 100% rename from stable/xteve/4.0.24/values.yaml rename to stable/uptime-kuma/1.0.26/values.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/Chart.lock b/stable/uptimerobot-prometheus/2.0.5/Chart.lock deleted file mode 100644 index 5724b061600..00000000000 --- a/stable/uptimerobot-prometheus/2.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:52:00.688002734Z" diff --git a/stable/uptimerobot-prometheus/2.0.5/CHANGELOG.md b/stable/uptimerobot-prometheus/2.0.6/CHANGELOG.md similarity index 91% rename from stable/uptimerobot-prometheus/2.0.5/CHANGELOG.md rename to stable/uptimerobot-prometheus/2.0.6/CHANGELOG.md index c17747f3f26..93dda3685cd 100644 --- a/stable/uptimerobot-prometheus/2.0.5/CHANGELOG.md +++ b/stable/uptimerobot-prometheus/2.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [uptimerobot-prometheus-2.0.6](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-2.0.5...uptimerobot-prometheus-2.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [uptimerobot-prometheus-2.0.5](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-2.0.4...uptimerobot-prometheus-2.0.5) (2021-12-19) @@ -88,12 +97,3 @@ ### [uptimerobot-prometheus-1.0.7](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-1.0.6...uptimerobot-prometheus-1.0.7) (2021-12-05) -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [uptimerobot-prometheus-1.0.6](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-1.0.5...uptimerobot-prometheus-1.0.6) (2021-12-04) - diff --git a/stable/zigbee2mqtt/1.0.25/CONFIG.md b/stable/uptimerobot-prometheus/2.0.6/CONFIG.md similarity index 100% rename from stable/zigbee2mqtt/1.0.25/CONFIG.md rename to stable/uptimerobot-prometheus/2.0.6/CONFIG.md diff --git a/stable/uptimerobot-prometheus/2.0.6/Chart.lock b/stable/uptimerobot-prometheus/2.0.6/Chart.lock new file mode 100644 index 00000000000..40b94acd08b --- /dev/null +++ b/stable/uptimerobot-prometheus/2.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:38:54.22970303Z" diff --git a/stable/uptimerobot-prometheus/2.0.5/Chart.yaml b/stable/uptimerobot-prometheus/2.0.6/Chart.yaml similarity index 98% rename from stable/uptimerobot-prometheus/2.0.5/Chart.yaml rename to stable/uptimerobot-prometheus/2.0.6/Chart.yaml index 22532131ffa..44069706ac9 100644 --- a/stable/uptimerobot-prometheus/2.0.5/Chart.yaml +++ b/stable/uptimerobot-prometheus/2.0.6/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/lekpamartin/uptimerobot_exporter - https://github.com/k8s-at-home/charts/tree/master/charts/uptimerobot-prometheus type: application -version: 2.0.5 +version: 2.0.6 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/uptimerobot-prometheus/2.0.5/README.md b/stable/uptimerobot-prometheus/2.0.6/README.md similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/README.md rename to stable/uptimerobot-prometheus/2.0.6/README.md diff --git a/stable/uptimerobot-prometheus/2.0.5/app-readme.md b/stable/uptimerobot-prometheus/2.0.6/app-readme.md similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/app-readme.md rename to stable/uptimerobot-prometheus/2.0.6/app-readme.md diff --git a/stable/zigbee2mqtt/1.0.25/charts/common-8.9.24.tgz b/stable/uptimerobot-prometheus/2.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/zigbee2mqtt/1.0.25/charts/common-8.9.24.tgz rename to stable/uptimerobot-prometheus/2.0.6/charts/common-8.9.24.tgz diff --git a/stable/uptimerobot-prometheus/2.0.5/helm-values.md b/stable/uptimerobot-prometheus/2.0.6/helm-values.md similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/helm-values.md rename to stable/uptimerobot-prometheus/2.0.6/helm-values.md diff --git a/stable/uptimerobot-prometheus/2.0.5/ix_values.yaml b/stable/uptimerobot-prometheus/2.0.6/ix_values.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/ix_values.yaml rename to stable/uptimerobot-prometheus/2.0.6/ix_values.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/questions.yaml b/stable/uptimerobot-prometheus/2.0.6/questions.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/questions.yaml rename to stable/uptimerobot-prometheus/2.0.6/questions.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/security.md b/stable/uptimerobot-prometheus/2.0.6/security.md similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/security.md rename to stable/uptimerobot-prometheus/2.0.6/security.md diff --git a/stable/wikijs/4.0.14/templates/common.yaml b/stable/uptimerobot-prometheus/2.0.6/templates/common.yaml similarity index 100% rename from stable/wikijs/4.0.14/templates/common.yaml rename to stable/uptimerobot-prometheus/2.0.6/templates/common.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/templates/prometheusrules.yaml b/stable/uptimerobot-prometheus/2.0.6/templates/prometheusrules.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/templates/prometheusrules.yaml rename to stable/uptimerobot-prometheus/2.0.6/templates/prometheusrules.yaml diff --git a/stable/uptimerobot-prometheus/2.0.5/templates/servicemonitor.yaml b/stable/uptimerobot-prometheus/2.0.6/templates/servicemonitor.yaml similarity index 100% rename from stable/uptimerobot-prometheus/2.0.5/templates/servicemonitor.yaml rename to stable/uptimerobot-prometheus/2.0.6/templates/servicemonitor.yaml diff --git a/stable/zigbee2mqtt/1.0.25/values.yaml b/stable/uptimerobot-prometheus/2.0.6/values.yaml similarity index 100% rename from stable/zigbee2mqtt/1.0.25/values.yaml rename to stable/uptimerobot-prometheus/2.0.6/values.yaml diff --git a/stable/valheim/2.0.5/Chart.lock b/stable/valheim/2.0.5/Chart.lock deleted file mode 100644 index 552454ec0df..00000000000 --- a/stable/valheim/2.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:52:11.672025596Z" diff --git a/stable/valheim/2.0.5/CHANGELOG.md b/stable/valheim/2.0.6/CHANGELOG.md similarity index 81% rename from stable/valheim/2.0.5/CHANGELOG.md rename to stable/valheim/2.0.6/CHANGELOG.md index 5d92cb36db2..50d00ee0a0f 100644 --- a/stable/valheim/2.0.5/CHANGELOG.md +++ b/stable/valheim/2.0.6/CHANGELOG.md @@ -1,6 +1,18 @@ # Changelog
+ +### [valheim-2.0.6](https://github.com/truecharts/apps/compare/valheim-2.0.5...valheim-2.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [valheim-2.0.5](https://github.com/truecharts/apps/compare/valheim-2.0.4...valheim-2.0.5) (2021-12-19) @@ -85,15 +97,3 @@ - -### [valheim-1.0.17](https://github.com/truecharts/apps/compare/valheim-1.0.16...valheim-1.0.17) (2021-12-05) - -#### Chore - -* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [valheim-1.0.16](https://github.com/truecharts/apps/compare/valheim-1.0.15...valheim-1.0.16) (2021-12-04) - diff --git a/stable/znc/0.0.5/CONFIG.md b/stable/valheim/2.0.6/CONFIG.md similarity index 100% rename from stable/znc/0.0.5/CONFIG.md rename to stable/valheim/2.0.6/CONFIG.md diff --git a/stable/valheim/2.0.6/Chart.lock b/stable/valheim/2.0.6/Chart.lock new file mode 100644 index 00000000000..329aa187d5a --- /dev/null +++ b/stable/valheim/2.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:39:02.939898777Z" diff --git a/stable/valheim/2.0.5/Chart.yaml b/stable/valheim/2.0.6/Chart.yaml similarity index 98% rename from stable/valheim/2.0.5/Chart.yaml rename to stable/valheim/2.0.6/Chart.yaml index bc2530b9706..a9a8fc46bd9 100644 --- a/stable/valheim/2.0.5/Chart.yaml +++ b/stable/valheim/2.0.6/Chart.yaml @@ -18,7 +18,7 @@ name: valheim sources: - https://github.com/lloesche/valheim-server-docker - https://hub.docker.com/r/lloesche/valheim-server -version: 2.0.5 +version: 2.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/valheim/2.0.5/README.md b/stable/valheim/2.0.6/README.md similarity index 100% rename from stable/valheim/2.0.5/README.md rename to stable/valheim/2.0.6/README.md diff --git a/stable/valheim/2.0.5/app-readme.md b/stable/valheim/2.0.6/app-readme.md similarity index 100% rename from stable/valheim/2.0.5/app-readme.md rename to stable/valheim/2.0.6/app-readme.md diff --git a/stable/znc/0.0.5/charts/common-8.9.24.tgz b/stable/valheim/2.0.6/charts/common-8.9.24.tgz similarity index 100% rename from stable/znc/0.0.5/charts/common-8.9.24.tgz rename to stable/valheim/2.0.6/charts/common-8.9.24.tgz diff --git a/stable/valheim/2.0.5/helm-values.md b/stable/valheim/2.0.6/helm-values.md similarity index 100% rename from stable/valheim/2.0.5/helm-values.md rename to stable/valheim/2.0.6/helm-values.md diff --git a/stable/valheim/2.0.5/ix_values.yaml b/stable/valheim/2.0.6/ix_values.yaml similarity index 100% rename from stable/valheim/2.0.5/ix_values.yaml rename to stable/valheim/2.0.6/ix_values.yaml diff --git a/stable/valheim/2.0.5/questions.yaml b/stable/valheim/2.0.6/questions.yaml similarity index 98% rename from stable/valheim/2.0.5/questions.yaml rename to stable/valheim/2.0.6/questions.yaml index ff5f6723806..8f9301e05b1 100644 --- a/stable/valheim/2.0.5/questions.yaml +++ b/stable/valheim/2.0.6/questions.yaml @@ -224,20 +224,6 @@ questions: schema: type: boolean default: true - - variable: STATUS_HTTP_PORT - label: "STATUS_HTTP_PORT" - schema: - type: int - default: 9010 - hidden: true - required: true - - variable: SUPERVISOR_HTTP_PORT - label: "SUPERVISOR_HTTP_PORT" - schema: - type: int - default: 9011 - hidden: true - required: true - variable: SUPERVISOR_HTTP label: "SUPERVISOR_HTTP" schema: @@ -249,13 +235,6 @@ questions: type: string default: "My Server" required: true - - variable: SERVER_PORT - label: "SERVER_PORT" - schema: - type: int - default: 2456 - hidden: true - required: true - variable: WORLD_NAME label: "WORLD_NAME" schema: @@ -447,7 +426,6 @@ questions: schema: type: int default: 9010 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -541,19 +519,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 9011 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -647,19 +618,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 2456 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -701,19 +665,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 2457 - editable: true required: true - variable: advanced label: "Show Advanced settings" @@ -755,19 +712,12 @@ questions: schema: type: dict attrs: - - variable: enabled - label: "Enable the port" - schema: - type: boolean - default: true - hidden: true - variable: port label: "Port" description: "This port exposes the container port on the service" schema: type: int default: 2458 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/valheim/2.0.5/security.md b/stable/valheim/2.0.6/security.md similarity index 100% rename from stable/valheim/2.0.5/security.md rename to stable/valheim/2.0.6/security.md diff --git a/stable/valheim/2.0.5/templates/common.yaml b/stable/valheim/2.0.6/templates/common.yaml similarity index 100% rename from stable/valheim/2.0.5/templates/common.yaml rename to stable/valheim/2.0.6/templates/common.yaml diff --git a/stable/znc/0.0.5/values.yaml b/stable/valheim/2.0.6/values.yaml similarity index 100% rename from stable/znc/0.0.5/values.yaml rename to stable/valheim/2.0.6/values.yaml diff --git a/stable/vaultwarden/13.0.17/CHANGELOG.md b/stable/vaultwarden/13.0.17/CHANGELOG.md new file mode 100644 index 00000000000..785ef2c9658 --- /dev/null +++ b/stable/vaultwarden/13.0.17/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [vaultwarden-13.0.17](https://github.com/truecharts/apps/compare/vaultwarden-13.0.16...vaultwarden-13.0.17) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove hidden vars/configs from `questions.yaml` after making sure they are defined in `values.yaml` ([#1577](https://github.com/truecharts/apps/issues/1577)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + + +### [vaultwarden-13.0.16](https://github.com/truecharts/apps/compare/vaultwarden-13.0.15...vaultwarden-13.0.16) (2021-12-19) + +#### Chore + +* completely remove mountPath reference from GUI ([#1572](https://github.com/truecharts/apps/issues/1572)) +* update helm general non-major helm releases ([#1571](https://github.com/truecharts/apps/issues/1571)) + + + + +### [vaultwarden-13.0.15](https://github.com/truecharts/apps/compare/vaultwarden-13.0.14...vaultwarden-13.0.15) (2021-12-18) + +#### Chore + +* cleanup questions by removing hidden dicts ([#1558](https://github.com/truecharts/apps/issues/1558)) +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) +* update docker general non-major + + + + +### [vaultwarden-13.0.14](https://github.com/truecharts/apps/compare/vaultwarden-13.0.13...vaultwarden-13.0.14) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [vaultwarden-13.0.13](https://github.com/truecharts/apps/compare/vaultwarden-13.0.12...vaultwarden-13.0.13) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [vaultwarden-13.0.12](https://github.com/truecharts/apps/compare/vaultwarden-13.0.11...vaultwarden-13.0.12) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [vaultwarden-13.0.11](https://github.com/truecharts/apps/compare/vaultwarden-13.0.10...vaultwarden-13.0.11) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [vaultwarden-13.0.10](https://github.com/truecharts/apps/compare/vaultwarden-13.0.9...vaultwarden-13.0.10) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### vaultwarden-13.0.9 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + diff --git a/stable/zwavejs2mqtt/9.0.30/CONFIG.md b/stable/vaultwarden/13.0.17/CONFIG.md similarity index 100% rename from stable/zwavejs2mqtt/9.0.30/CONFIG.md rename to stable/vaultwarden/13.0.17/CONFIG.md diff --git a/stable/vaultwarden/13.0.17/Chart.lock b/stable/vaultwarden/13.0.17/Chart.lock new file mode 100644 index 00000000000..1bc421b6fde --- /dev/null +++ b/stable/vaultwarden/13.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:39:05.294019766Z" diff --git a/stable/vaultwarden/13.0.17/Chart.yaml b/stable/vaultwarden/13.0.17/Chart.yaml new file mode 100644 index 00000000000..1ee8f5f744c --- /dev/null +++ b/stable/vaultwarden/13.0.17/Chart.yaml @@ -0,0 +1,36 @@ +apiVersion: v2 +appVersion: "1.23.1" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +deprecated: false +description: Unofficial Bitwarden compatible server written in Rust +home: https://github.com/truecharts/apps/tree/master/charts/stable/vaultwarden +icon: https://truecharts.org/_static/img/appicons/vaultwarden-icon.png +keywords: +- bitwarden +- bitwardenrs +- bitwarden_rs +- vaultwarden +- password +- rust +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: vaultwarden +sources: +- https://github.com/dani-garcia/vaultwarden +type: application +version: 13.0.17 +annotations: + truecharts.org/catagories: | + - security + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/vaultwarden/13.0.17/README.md b/stable/vaultwarden/13.0.17/README.md new file mode 100644 index 00000000000..a216d617002 --- /dev/null +++ b/stable/vaultwarden/13.0.17/README.md @@ -0,0 +1,38 @@ +# Introduction + +Unofficial Bitwarden compatible server written in Rust + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.34 | +| https://truecharts.org | common | 8.9.24 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/vaultwarden/13.0.17/app-readme.md b/stable/vaultwarden/13.0.17/app-readme.md new file mode 100644 index 00000000000..adff46b5f72 --- /dev/null +++ b/stable/vaultwarden/13.0.17/app-readme.md @@ -0,0 +1,3 @@ +Unofficial Bitwarden compatible server written in Rust + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/zwavejs2mqtt/9.0.30/charts/common-8.9.24.tgz b/stable/vaultwarden/13.0.17/charts/common-8.9.24.tgz similarity index 100% rename from stable/zwavejs2mqtt/9.0.30/charts/common-8.9.24.tgz rename to stable/vaultwarden/13.0.17/charts/common-8.9.24.tgz diff --git a/stable/vaultwarden/13.0.17/charts/postgresql-6.0.34.tgz b/stable/vaultwarden/13.0.17/charts/postgresql-6.0.34.tgz new file mode 100644 index 0000000000000000000000000000000000000000..be835a6724404eab0833be4a4639697122eba645 GIT binary patch literal 72664 zcmZ5{18^om+ike9ZQHhOYh&BqWMd~A+qP}n&YO*GoA2H4`|GcJ>rTy?np4ko_tRZ9 z-CcD~6GcO#gZ$?L(tywzORF-QN-J>6d-HIZuxT=zsc~5URO8`P($wTs(6X~Jb};i+ zS8)`OHn+0}x$OD)wb7c&&FgfQ4|-iHK2qk<}PN6Kd{_uEiSXZWYKHpD6doOU45NK(9bUwhFP4dTHb zL2d`Ibqfguq`YzZ8wo`FOGv!&-BCF#s}7pPrE?4T0r2=^z~d`I2N zz?Y&R;NcT{EcQmC3tS{(C`8+hP+UwXJ7)IfB^GIf8U{=##xs=Q-OI8kBh-}tPApu! zYcMU47&?d=z&%PCJO1lJCc?gvP7l#(S1*Ct#n(}*T?8B-;z6i@KSYeVUPhQd%L`LN z02vZ#ZoJm$ttsOM0fK})kcg*&X!{Cwi5szSYr(3cDUf*6jQgp8Mf|>>G692EWZI8U zp$z!ebuh48HqOS6MwLr>Jb!P=lT3yWu|SOogEQlVp5%l+0&tt4)|CVwE3{%G=lql) z0GHpKBfcFfIC_s1K>W=__=}tnvcQo_lfLtNI8L(GG>p3&jZOXX#CTWX$J*ibDw6$Z zptn?X-2&6KF#2WkR-rJkS5cnT^4S0TfCgXG9a{W0FBr$88=H?121k%}D7K4^dm8|( z<5+d}Fbsh)ZY05l7DeqW={}ypLN!Nzld-zvN(*s|J#ZM2>XixDam2 z=i2&UkRVcVQg+7tPP!s}89Z8PR(SA=)3O``Rrb%rRUm=~8tPUsXuI*39BoL|g<(pI z-gQ`&}As_ zsh9nEPkmHXRU()|>g*)#h%#|)e$;XT7PGm!`U^nNTuirgKM9H*YWw$AjMv>u(4UFv z7gAI>KWcH7*a>cDvcYl7((!x8>aMnlY4U>IILItxZ!%zpujw2eNBVefGi%s^wd z91VJ-`aKQIfW)1I&@)|T<7r}M}nXr}iuOyg6^Ee@b z2mahpvNhhASbB(91V)<&zvm>*La_(mO^)z-7I<^YD+sHmJgel(w4 z)~Vr3EaMe!Q%CNDNG&K{-JEN>#09`pLXY56ht z`!T|_^fnkh$v!2#NPSTjSE%_h@#kF7vY`1kN%2(K7o4)&8NXV|;6tef9s9m4|4wjp zY+!g`l3_L_TpdRI_WV5CDC2tw!~)Ns?t|W>Xf@0w%DsZ+>-*-Vvi(g8-S?GB^i>vY zX^y=9X@neC`KA#;O4bS@!lKvvrL_p;`CyvWyr9NFd}uRz+XiGbx59J1`O~VVUI{_4 zlfOLgi20_PI5|08dHwqV=eA$)@Zl}UM>%8fuK97<4NFaUt6h_)|#p zF_pQl)2bMmT=h5EUF;H9okY-qu@wE|qOB8e^{$2C(vb-2Upao5tmmP6_ z*wqKunkQR4PC<^0zCHUaFxUr~q~yU02XUuLjluhGtY8ZDKl!OlLj0l0HV*k?B>lZx z+ko%)k4qapT;cxy(mKlR-)aRt3`$N*?@)_2pN1+W|0axa%iD`O+ezFm#+CWLuT?3v z@7uh=r#XZHC|w}#{OVfY-#TFUEBd*=!!i~%5X`v2VIBCqA&jhNhsw3`{jck_fp;g( zZ&(Aa{8^oktWf$5gw&5UXi6vN>@V5ix10??l(|jPkVl%k@{Ak@jvR>Bw2*0pSg`O& zgeT{~A9I^?*=QDUp^(HJRp*RelOGLLy5BKl^}#PkCVw!x};XnZFo{ z2TNb;N^7e9Ljo4Z{D}^SR*%y|A+VO}iGPsuPY8GlHuVg$|9eFl-togLPLJAv&!Lv! za{NehOC{jeq`wqo0GHS8kug_+W&ET-u)7w-AY7slk}G@-h&S3ny3U=)Ac@*n4GN4j zwdKu>ZrAG7Io%8)hl^-fkA>aJ$f0qz9J1mqRPgW!#b17Ry-VdzvhHr8yX?;i8smhU zi~@}=ySaqD9HVZa7qv54^UNy@(54S1(;v-V{=~+*%iec}6%7k^mpz?~XyOLyx`+)v zCLA%TLccQYi;BR%3Et}x`k-iSj(Eo;I`S(A5W97I(O-T(S-jM7@kM(J`=L)u?e+s;+OjA1(I{$ylDx z`gHWPKdXA0*bl;cZP_GC(A?e%q#V)+1wFd8Q_?mdj9W$L78PH4^@wIvyQ{tUH9(u~ zVqsRsk#big1w4ao3ugx{F9^&M0H0;lF&(edCuawZ+7?UP$4TbyeV-NZ6Bbq0oI|-i z{79bK&B1dON^+pFki>D#eRpV%4P5ajhP-6noocv+8GA;Nqk5M;&0`b+b}yt@eR*tx zEIg$qryV3OUMW@4e;SSbzt~xyLK0%OAHecC zpm+Qn*&g~B3rvr6#Ft&$i-#=#fIR-1M|UK$(FLxOG&?>&Dr2c4dGT9*0Bs&*en7H7`~EgpXnSSKPo?~acc4{H}nMHP2NuM3-~pmoNpp=EAT@` z1{Dkyw)P-l&&bQ^`;7ltjMa<$vgwIL? zKH#fy2$03=@igIft|c7!&@Or0d^87!pSVEV%#M$^#w>_J$kh0i3vbnz{IfF%Y6k{J zX*-`+&PcylCR#ma>sDNR?@owFL;}1;+O?3HWFex}|K3b_1gatmNtH@4A52iX<+Z@WDCQKVY$cJisUE(i3X);3{)u z{<^3!V;`r+Mi`Hiv}uE|VfFr=rO@tyh*uc^H*?z$?41QSQ-3fz-a$UEp`?ucQqDg; zn>rj*)ApK^w+Iw=koLk-3$Avt`?Uf%XUJ`Au!b~UdN36;zwsn=-(Sc*r`O<2^2Vk0 z2P#`Xe-||Fec5X8S5i4nc@<;cN>4pNa~duvoBGE8`L)P%5Nwx^;HzBqn(wh6tlAIN zf=PrKEtCRlhZqoMgKVc9EM0-?(*vW$>Cs_yDeG`)q>oVhC#T1$C!;aR{r6CQ)ur(A z1fn>k2l3=aps+3;JDTm8-iyEhrATsY*Y>7vjP4fmHEkD?d*g?4;8u9?xieOuT}?)E zQj3BrqvL6fz!XY3dSALclDU*u2tCnH=-UvpUvOOxik;zR@}m1XAtDBsH+gpr69`m| z(>0v?5;D?JcL(v%Q_c}t**p_2uLQ@vOLcO^aN5i{+?KwFvnm*~vfq!25n`8KzQVF% zD%JVjIGy*$N53e?g7_pMSzGr0s;uxg7Onv1!4oo|RC!l_RoSy>TIY1D9&)(9;PX@# zHkayY6Bi}lhdyq;@pD~b6Dio~H?^?0h;q^h06nD3s))jdqr9o}ptiE9N7u+J_0}~A zVa^W|^1)Hv>GZy??84U7U`f`n@l98Dnw$A<$oVv#NnU;DwvppFTM z>aQnP)z}ckf33_{eUbtun1UevP^Ld5jJ8g?gecTTf@%ApJnnsr0(Zb$YzW!cu3sFT z?NmgxdLn4Y;5=NqjRFrKA7Zh}_qk5bROt_D^b@W$cc#s8?jx+o@gxj z*;-28v;B8=HMw|d#kNxR!$Y+fvQulS3A83XE#nS5&TJwQxWxsx# z6_Xk_*ec&aMby52vg*?ISB#07OD~yivoWo+Fh+33MW;}30~GR#Lu7oV_P>4Qq&>1V zEvq(@$QUz>$`ZUACX|EI86o@?G(9@AS@i^5_!1K_hl8a-Xev}}(V$P z6lCUeoiT3anykKW38^8ja5)Npl~#x+EpUBS&5@0MBiH{z9+8u?!L&^%j>-X()EWuk zn^tPaBr=AEllsiw^&*7$xs9Pf%Gw7Xx)ml`W`jwz_i5D{Ni2hr1)Y7V8rF|!jP|3Z z#s%Vdh%z*ZnArGGoaO1|Tc8I>6ggU<`# zq~p=B*uD$T;V!{+qIKNED2{ZJ+?`kA&l;I355-DkY2CNGT83wz#({WK6yaqW((b2> z9s_Uznj#cRgswu^`bZpxotr#q$ph=#=Q&5#ltT-nzA!5an&_P^dFliT``t}Q8s09W zYXWxelL{SEYe@^D+%Uf1t1L8atFlDsAlc{~J=4nEs&CQReMLY7Xwbc;r((YJ1mW|l z5WHdc&gnK>^?{lZV0H-+iYp*vOOK&}VM!S3v?$tyXZuKeJ@<)ijVU+VArrFP|k_ToY3nH_&=fDUtSgK(ebqJcx(AY!1U`aD|qsFaXYyTkJ zbWR$d9oC_@(|J2WF4redZo3b$!>FfF4oKJRicl#P_oFP}-UlGH7bvT7LATJtbtDDq z84;b#9PnmUlrZ(IKZB{#wPImcVDO)sxnibg%Zd@+f^uyrOWKTtu@+UC^ykEkfo(V& z^MawIgo;oV@AmP&b;2aKd%awtd@JEJ>U6xVddk+DqOd94`jWr&~H^Fp9auG~z zMmB8h-KIty;i`LUOd1bi8xI-HXfAYRTu^kpadxGmddPi5JE{;ce#GHiVq?efT|5_%SkE{1E4ay2hh zzHTI;#hNjxr-zl}ZUfj((Y^CaB}Pooge_J5CW-n&RvPb(E{fRMixM~BETZD3|c*VJ+U(Jt3+|) zTUDg7uQ~e?DRs8`;p_S)M9nWS%*(1n5gA3~-2fnG;vZ%@HdyP^CVl8(!m4YxCtQPL znqOK6#jeSx)vM$h6f6u6(`p$a0nPS{^(Uq(We(De37vBIw5s-%Kz=IXyFtJDw&i`a zy)lC-gr0vQVqeA^R7*)P6GmxDa%@EgAB;}x&-I`MT+*e(mijr`ro)?1fep;(AmQ{7 z!13kJ%^$cQRX%?8#RYOQW5beF0vWrrD&FZS0FcOlbAbkI4Pz(Ei#nC znKD}CTGCn-=lIdfXZX?TPO%a{1;-K%mwA@xpeGQzD8j4Idy^Qw{IacSUKE*Oe5^%w zd5hhEVwJoWr0)NKfzOtZ8kZ4JXv=xpJf#t9X2XN^afsHt2e&$Z?f~exQB8{AKo(^k zAjvwIJyGh|*Q1eI--CQ-&rN(3=iiVTP1>B*VV9S&ZB>EdXjx@N?syFfO3(13D{h=! z2@}=b%Ab*akSSIib1Dup$CZMI?e$KwvWS0i+tYL|Xr+y_bKbiYKVBqH_ zq$14)6mIa@kXOiRlo=K){zK3b)8hRZmNH#r5qT~Y9_77o^VwC3gnfx(nf1RQ`{KQI z<}csfV25&q`5*3vnaKS_9=PnZ*lychmM|n3#VL^5C5lkLi-Up%7w<*#W{Neu1+P3W zOM;sC7w>g)|M7LlE3So-rvskF`@8Hv$r>33IrMd4LsR8Snkj#8il5+;{R~dl1ey_I zEW!|(Ik9;)I7O+@3i?IoHKFtrHB+uHi+SPLPxPF@iuUCVGq%83=P=oubpw7TkPvI& zpCxqu!z$T`>bJBK1yWRNa&duPa|yW&=AwF*tE4sN8kp>eMV2~BU}~p$e#ujlkg6b< z0*~55J(`tQCEj>ekgbM;7Zs%1Zb%!h6Wasac-C|sZO@8%zXU9Y(C)oGbp`2PdiO}q zA`)6uxqLz$_|6de=V~||I!wNyG^(oKKVizP#pW#GtEK6Ti#2caTbhge7kQBm!}xc> z9jGCy9H7kHG~nA?ki{>gma%&^!5uJVe$K)98_!YoAmE zr%bIO9@>86%*^Ny+!dx9>E4csqJONq`?dKv4YkhmX{yJM(Iq2wK^pQg4%Uu;9&5$sdF z|Dn6X_wbw23^Ukp26&7*-gm@jl3M`~Kb1T@B&)}F^W+OLu=LjY5SETOl zhLb)mwh6Qj$v}f-Y>k*nrger<>L|(KggeKjFa2nd<5%~?bTw`EzkhyPSdI2yt^gux zo%e|q)BOI5gL>najqahc4x576*p7XbHAWIJY3NP{V10VYzHZ$I7d1GYPz6avM@y2)wift)I4OdDNA<(OqW;OJ@9c(3s9Cg&_u&FK>)06E zz`fI;#qzgy2r8OXx~>BN5($dr@}J3671wC>X(jL|x=uONrI<2N()|yF__3@j!!ajh zCVUM}-t3>aiKK1cbBHg9+xUW??^38>wikxy7kz@`Cn)-s{{#+9A*ZaG(^$qkZ5bj@ zVqq80&zzRgEY43zKb$1}WU}M4aDoR4)d97)eL%0t+G`NfSHsmuqqFNiror_>!E>xV z2Bx(P4TLY&SJGoa!_;r7K7?NA5fk;-L>ynkkml4ytko|Re=?oFC|UTy1EG06m7!qT z7;ixw6ssIb55Q>|%fN|a$UeLXSK>%G7xBwT9}(tXtY&TozZ7vwtP2;j=bcaIu5;8C z_=y=K*I)!r3Nix?p9?*D#O}z6t2eA3#j*K}(UG7Eon})>QNG`{J3JWJUzk`awsTx1$4VqiukcKAA&Fw|6DoVCM^Ng52LK_w>AF+AiNtwE>?c0p{V+N0g;I+ zRlFJw(jK24qQ>Pi^Kg3#*oF!Yw(kn_FN+mXA+EQgHjBY5xV_GH67f*|m^Kq11<|)X z2%|<(w4S&RooNzY*wNE_uEc|`bYV2Y;DgyrotrPIXzLr_r>zmZ#!MS&@;rGx^jPuX zw_hs=a*Jc3i^lE+JXnYxc-nI}_CQ&41r&4eB*W311?h|i}mZT?OhIb)197L{w_J)E+}CK z-Go{{^U9MlW0CiOJBR>D&8#iICs5ayNeg#TRwyr>VWqaR;VEDKwp&b4+J58snH)hiGedcyQRI)AsvpYt`#DkW1S2$(}vGk%ZJBZzdQlMXE@5l(|nND}z zC-3O41Kjc3pc!%V_VdyNU;8J~cpNOl)>c)Y1Mv^K4wPIE%Y05wZj@#b!%*msfSH>) z33s=d)zhtd!u%hd)7V$UfCi`)F{c_E#*cNAEV}j`8V@w2K|2;TebRR2^RvQCEzaX@_uGy4YCPcM-)%Q z1Yc3w_a~y)LDxjgWfverKVD~dKV4jG1K*{>?!>BC&4vuSYJGTijK0CLITte1x$33p zWA2^m1js~Wx@AJN@-3vAPg(a4WEJlL0+I8i22s{J`WmCl3U_`ySl9C*L#VV56o^qQ zGj`=*|C8g9Unw-Y24}zd?+zkpI|-iWM<|` AAqL)3oI@XPH3Uc8FNGZS&P&37Oz zHm)0Cug;LVEk0_6&5hsDVh@-nK~ibt%uhepgTlm~&8S|;JtI7|05Wyx1*M!sxkkqk zhk53za%TrbCVVVZQ5BgbmcGgA(`c6r0x}Hw@YFA=dOO3{j&zPDdl=O{2;UF)(d8p| zu+J80u2{D(zUMozKI=zYaA4)&Vl$0aXk@kz)mri~` z*`djU74O8+HayZ8JHYR}MyPDl=6_WU#>VAf&e~-t|fSCWu?J;c>p}&Awig zg)HEuPx7|YvR52vfUK?}_;S3nk3&=T%X)zxbMkUlaj%K1t(7%OW+wYnvsiT(v6#~J z_V1yEN{r^AMgJceMiQ6MNp{u-@xQvLYIm9XbSe7T`W9tnb3{@~otZIgmtK&^`*@dL zI!s5BZzIXjWp-0{4hHapFCiNhrgzIZGy@L&N0F$;`w}~F-`teGC+Df@X;M$svzyAY zm?nQec$_0KKK2|-_N&Y`-;_|0(k<25y;p^f&Z}LdA&2OEy05P^*!5$=5es6hzIA?g zDGtj4G}QgZ5hM9~)@*kjEaM841YbN+>0 zw+y~$`KIw0Ed)cd`&tU|mN5AHUN-1RciNjvr3IqBw^8GtO6hSr)_c^27noY+6#=@PQ2k@LM%}n{`i+#5q~k zi%%}BzziWYiM@ov#ZENmr-zz-=}CsxsrcZA8^q4TB9Zv5*dAc)ne9^b4s&}>cC(uB z)$-V@D+m;%d=1xs8$(?pAz6~ixuIlvm&1UW*tkjcIM01(N+wR9|NDhXuF|U@|IE+_ zv~OblPQW4%<|s_=+tuIEOvfH8Yc$0B*9?MLsa8i;`d^!)IHmI$0Z=BeGg%yjv}1I3=}YH9%`yvSV>8)l@bvMc`I zuHn7wIX9s>WsiA0&cFwulB9rEm{qCv!(+4!8H*Bn?rg}rtw1zbNA0c}WkuC&jpViT zUVBUXEd;{Vxl-@G=zY8Ce;$sSrWa`jE^@Mo|~tNO z7d#CJnm|&BbTl%#s+u0C{&r`a5*>cX?9P}}aDt0%UVCRZVS8JTXC6|L5nd*^0IXgS zfra{W2c}IM4JIP+DMm&-2p?@;SYGI7%2-4f%kZ1u-1$z-2a5?YT=1rrf{1>+bOM^! zJHH0E@0?5DZ9C2X7=rN`jm5^9rY+!Lz?1Aq@7A0r9Pp~Z2mtjsC34cIX;;R1bHWYq zYft_pCv7s^mF((2WQu>P3xh6gHv!1~Gup(BD9*oh<3bjeVf?Dc`oQ??jk9u?bzVm! zEx21XeM?EZ`19yg5NWDs=FV5)s(r2*dg%acKSxtrCNpdvbhA?7x%s)~)BKu$GriZ$ zu>gMvc6{DUZ*IOLFl)T+AX5vgHK%+!%B&O%0zXIu3#k!HFGVS6Ax(Bnv>4$rIW9ty z@KCq84?UP)2i&`Djd2t2mU0qpsRboiVhL=~!)Ir<=A#M;C?WE$m3^#-zY!xp+^C{% z^iUOGB0WPMQIkhxZZ8c=UEzENaUxN+vV+7Y}qG#gBED+-;%YcD%J{ zd?7p2rs00b$XPACg5FHND1P-aF$7%iV@N8jS$ntFMB#bhm+M1&x8W+!Xl&4~FETDG za{tuy3l9~~%P^viW6Pt13ZjI^5I<=Er1`K#8x*gdSfVyem!kCR06dW7leq*q?->2r z3-lt#@fYIb7u@6%Lf^UW;X%iGh!Hp_xO{Wo!v#5GrcSsF?>R92CVqZHs)Aa-KfqgD zcsLe{VI^EOJ3;a??=hgFjEvxL`%H)=8!Nn^An+o$P}k0eWl;*1u0ST3qs)`I>@3Rh zw<9=0BKt&oXIzaK<$6X2CK~;XKAHpAv#5o)KcDh;f(rkfZ>%`#j^-hIW9j;#MpXD% z*EDSEsZ(F2kWnY<@8{~}}GkxafA7QH4|larw~64x=*oflK0(zGj;E)q~}KX z0d@yCs{bcMbVsad5z6k^(|ua=|Qtp1d)T?8w2%tkqL2pOU4~L3Y#U1Kds8@+u38u+Akork-mR~F8(gC)7p51JIwk?>|%kZ(iE~~ zl439rzrBWoY8O4N=-4Uxe2SM#Vdt2brRV)9BJBX6*y=!b9=;jvM98`P-uIHtR(ARg z*Y(f6w01V5yF7Ea#=~QPPignlZ%)3NdvujUU+$8TkvCwI;wMWkB)Og*b!OQZl1^U; zuFG(SSH*#d$WkLn^GjWUitJ3&U{BKr^RmqcY%)2o*69Y}oD3=rjr~>}ZL)n@x}Hzu z#24yEYbpTTTkvb~{Wm=W+1Ew3cB&9uNWUk+6bVX>+-GVoCgC?>%OE95E{5fgg%sm$ zNbV@ituR0N^cBvs-HTsDqRsg+3u|^Qh7J zHSeZtyNi@u5n$sJR6dM`e@mNmHa)EhM3k1N){%?Dw03W3@%Z5N03Rdk;#x$W6ieQ! zW&{^YfXB(Ar2H`-L6YSZGs;OiPFYD2hZ3O8f`Bj{MM#77lMCY;u{y8)G|QlXi|#!RMqg4^tf8z z^|5gUdqd*4J9`}^H6YkxHI7y;cZ^BKOSypNA;jMJA;2G(q={l1mpKH8RrjjflQOkXco;N$gfCEC()TVJnR0_udyN9x8P+ves)$x!d;$7c(*msP4> z@5k-_;mC)j6wyu|zW#47clYP_BPGj3-?!u2qb^IL*_%8HJQ`|q852r_?0OxZweegc zKFmnTv=c`ONSm;9HqMI{CN>@}IQ)YRG;T?*K+{LCGA!<%{x?a;Sj1kQz@lJ9Fe#{> z{xe8LCZ}GFK=3|+K=3XYd;naw!R{m2i7p2B>A#ZYS^Xma_am~cy8g2@uf9>>t!?*R zVN#y}1C!^{y-VGZ56taJ3dl}ps#dQ+V38Xdw=9#>ufQd^Y)6gV@}1m%m48*Y{HOgh z$XPC0r{?JrS+x5p@z~G&b?U8b+8WQwUkOXm*^Zir)KB8Ei%?1*8ryaEnFCAIE||~lssD|1a|E{~=1g zH)-B|(?q^ErE|akr#@-XUC;cBkH;5-<44xAG#(@x*LV2W|0Nkki&O(Is%2@sJt|z? zw#!6Si3&+D5^5;OTIo?GhT;Kg_)Ku#7h&^2%$^fiJN5ut{YDGc$S_|~dL35_Rv4Mx zaF(W%X|sFvl!WX#JUdt&SyAE7ehM)-pWYK~fVtS4klsP0oLJ!y4nt4$9(!&FTqbW3 zEd?tnCKjq&`N6QeJyoNgknAA(8V`&lwINwKqqs&|x2PO`V;W{&O?<1`Du8RBSjf17z8HwXX!}6aa1e9Di7O^McWbcAfsX|#icjLrGL{-=TVoHa4LOr zsA1frMMDP<0uIMw8f=_TKM|V;E{8x{OF#9;mg0@FK>rLju#7f_DQKi1j4Zk>C6jg&geYzB+c`M?E0kb#J-Eqq-mJO29e@=w%g_A_oI0RuL)VAd!=4 z@981fev`>g_wC(OeY-!HQM-GV_Svys!l8gt0!$h@l+W= z_Fx%x3EIOAAO6DXB~+0WZ&han1!VxAOhlmP=42mAwBrv85SCk%9|;)_s0>98(=6y; z2ixX#X)MR1ibAcVAQ!7p_=#A$F&)wm5;4oP>}GLHJVhCE6khB$Dy$*?m!C#3i}_s{ z%*1x;_sZx4nWlRpuIKqF7Iz{B``UUIF6KRlzObKgx9+8jX{zxAv(rI%0jO2T<3iz3 zX@D-Nu#H?mGX-5p-$|<^boe!fen+9}S3G>3%qdFR0*Z2^-$nS^=Y}*JdHLB}guFn2 zN7YZX0>u2@EAyESfxATCORHfofilbCE~z3Nc2JP<$;O0jLJ1nG#CZmlFle0nzmhGS z>gMNzpEHz{5HRP3Xx2MJ5x2hzr?zSVNm)M~EHf;rH*REDZdFZ6rzM^R99nLjerN~O;3hM-Fp5L13IC9FT{A*#7BM+4MEa~c9bMpmpS;{gVO}&3n8ziscjkA? z|8?_dcGL1Hl7wief0<*DZK!W0WvK<_$hc$p+w0?dWZ(;`l1ue=o}S0Y-?zQaubbC5 z*r2!1_gQ3R7Rewx*FX7XM__4wV(+WTj0}>%{wH+&!sN!JNb3$21i}luW&*L=82#ZUW`N_)c+n=SRqRnZcg zN_D9c8=H=}-TmRFQqb13AX7dxGOO`rXiUOzGt|V0E6I$BLm9>GWvKJ~DXkp~{Ro4! zm(K3BqaH?J&*}ZoUDbchQus04B6NjaT=~bPMmbcE3bmS-F30YxIM@6^#-BhK@`vkp zAuAnzUqI+7%}H+AEX*m!BVdd&+jZZ6aT7ih@^uwvr6;vDg+M^VPAvvk3pd@uMw1v# zEv!m)$f~qX8XWhtwNp^wEw5c zgf&!@g^}uUwQTHrSxue4tsi~+xOqQ49~=!R&2hNhUcbI|vAsR6?Dcj6^?U+~=l-Dc zv&$(eDL$7>(Ot<3q`nx^)V<7~jeJD6rD;t{A?QorT>obcJvGWE223v&U0vW(NobDF zMRu+8u0sGA_ttfAW1nG||w$)x6!%gLw7{+Ws7X@MebEl0<7X{%K!$7w&)IEA|k-Aa# zGXJDyB#N5A{QlF9`l_3PY`Vb?MS(LAVGJ-&QXg3Yf+hzb?H>#=(pb9HZi){>KoGS8 zU1^lJhilp+?EHq6Kjp`}E_v9lt#s7ln2NR`Z1^esO;|+uBe6G1hh&A5u6WfVw0GV6 zc!oC}qw1g>?ye>iqv!NgLdt%j;aA9ovG~}zaft#$TSr|qFaD0@?w=#S7s!#*4(XcBvq( zUVmu|*5Vr-295DMx3{aNja!TJ-y}sH*{%@(MZ!3|CYquuD_kjy(Q@jmOr>Wo^~_ta z+A3`k`ZN#50Y<9Ky8Mfa70xLIZfdiWHEE&`e{H15>U_tKH3`Nwjo_mK^vHL)R#1Ke z4&oHv(Ic=Qzp&*3PQ1JdkKo!RfAI-l-eFR+v6^l&6IMzrLOfm4mY3%K@`!$`u<1TG zHBzS&q>SY9+2OBtX)(sXC2m`$g()w2L^-M_s(6S$@ec57TYf8ISba@_DzBAT$Y=TeK!8@8_e_kIfRw3~95 zU+VF&1AH9!I2ufGc@iuYvewuQN>A$HUFH$!<6qqnSRUsyiq2cl)$YY&7nOX4;etDM zoQxRZU3oJQ^Im%6M8V?Tc+Uh9e&+venwok^V-nOOAn5yWdiuUSRP~`ND*8$*tJ}UN zFvu0`7im#IZ|;_nM+?+^p=9~ndhtu^t%9@U?N^>yYSJ!MfrNu|r-SU5S@D_Vb!nWW z(Z<sPAZL=NYlNfH_KF@K@8ZweP9C$D z$U1O<#j09;XO2>~*Q4pJn`qjg)Bdpkm{JGM)61C}U*<@+4b_uxyxc5mQVAjjGF4!6%as|2&E7>;N!p5s)xowET{b`p#?BUBqOXUV` zL}v{xUQT0+an(i)eGz`Eiu+d_s5;M3;##w~@S`(@{x}~&+!--nY+NVx=$Pb$N12Wd z4nzZjgURm5z6<8_t)=SERwcffXJFm9v<=BEjrIq2$tJTT4Of)PB%Vp~eJS?QkBnx` zyKlO2@?`_c6g+c=Vp&^oXK)%k33;>!W~ke%iQ@AZHi{H3;Jv z0uqeR6D_i$U_lbd)hH?pvchU`D>L{)?BBniI7mQYHYj?w$Y2;USW_7S*cBEujIvnO z<=2(b6_!|%^F!IiM5J-6=2_k4MjFA~#8fe)4;fgG2xY8r$OA~h+=C&S?X|8-gaMQK z6Cw^`J|Z0{&p{Y}eYT+UxbGNPaJ;th^8{P$Qm~+xPzIcgR z7&Hd}La82EbX|Sg?yUm^%FkKXi>Q)6ZlPfj=pZFeUCKnf@Hr}rf)|m2ZPRV0^?&ZK zFp+n1l`A-{D9mgt!x#w0hnd}D>~&PpmzFWaAhk!77cqhq5aPy6B{=Iv;q^5J(s7%G z_(-l@s*eTV9VUM0tXlWYH@X#~TH8sRPKb7vfD)6aEe1rX7Xx_3l~>JlR?X}teyoq; zRQa5CGN8HTn@j}s2SA*TH^YSCs%q$nU}|Edq+>3t7YZ*W!^2o7n#p1tHUH^wBKqBC z9&C*4ZCB38i~$YL`lFLw($qw!m0Sl_9m7aOt%)Q599yoG!Pd;q*p$w$J-l}#jQCbN zm4cYeD)St`%npOoXd_&WBh0CQSJ5BOZi39psg4FJp)%IUz8z)O9@neeD53^J0&yM{ zBM(Qsv`PVaO51Ekj#da}mmU@wUs(Q*4K9|dPH#O-$`c1P?A@U_cJfDWHiwZMj&Bg4 z1Sw+apHD?eKqyApNP}mxtfrJh2SvxrnbT>`%qh!?99_6eJlEP zC$g$&e)Y87^l(BoCjHyb_x9Na_!Se295klkm6xp}i**sPO3O)^V!kR`FwX7P-3+S6h&+ zk8VV=F~Ku3jn{^PIP8WUmNVkQKo?YE_Z{MeOMZB2hxD(i3diE1V715n)1J@$!_%$x zvFJ6+@V{qgO-+`k-{#lx+A2?^|2m-qetzOmfufDprT01WdF9QeM#BGk!3Ee)cgG5 zo1?XrwJm=&R_IjcY;Syyn_Ea^675biNpv{_TTOJd13M$H8Z4+2LlWQ%>?#j9H>wyq z-_Wj`z)-BuyI0S(Hetr8tsUu@Z&O>rg6+-d=!tuKaso0LL*cb^!~SmKWQcjBO3W+g z-;IkhBrcxhZ$TDDDQB^x!LHf>5h5B(%P+Wy-P}m4=VB)&wot*Ry}qmYT4f5ujR*wv^=8Q_6hL+nETJ2LD5 zp}|?<;OH2RGYn`;j4);+@G&cgRZUIwqy1}tb{v;HVE@vucB|>LOJf%-aLYg3R`&Mp z^%QKLz`3x+v%oG3q!V2hU6Hgbkug1Ntjr~Ytn74j#T?UjJ#D; z9L@Iyin}|6!6CT2ySuwX2AALx2rdbd5ZpbuI|Bp{HZZtbU~qT4e82y?FZb#8L-*;` z-Dg#uuI{SZwa<1ZjiZwx-Q(b>z-)ThD+sEx9+^Adg$gqaB` zz7=7A8u0nC1ZljwB9Ap0TID9jfBPLoWtp`rOvSJ#Y@*1^n3%9Nk1u_b%_RYi zaIQA~qz1iYxIm`#1LVX;dDqB}wS3WaSmKocXgY>6r7sMM^VEhbF~e23Jd& z{jU$6&GUh$~oDtxC)Vx=k8N1>hI+x$wMdL5Y|9 zt?kX--Hf2e)4{>vZUKptm+RZPX`X|J&o?`r*a~;Gas2El|08U0z*)xP1TNbO;7QNhaDUn4I1drD;kjb z)qCV5dd){c#?c8HlCjv?x-;1+&?Uc>qj;pj4o;2+jr1=pVpkC<2mgu&{q4Vv(6;zj z@PPH{eP4SCHt@ga(e*FKz`nDic;v9LyttSy(u1rv4eA> zL6b5T`vtXE;06D3DYbV~BL3ZM(+K;&%Wj2}GIK~)7SIBYYcO#D6kROH?7w~`xF8w? zma%|tVYkmM8w5aE#IAo)oF1|7&9JqBW@Ri63;YxI#nJ*8bE<=@qe1gB7DrpY_>HGd zV$TOB@t{Q+i{k>0TQC)EP3f zuFm7%4I<@Z7?LF8a2+AUUO-T6|haHk`8x7j+KjY+ISO~h;IX1fC zqojzV51xny?a5eNZ6#`76>MYWfS@uK*99DpVB%oE#X@YygYV|SebJyz8H@7*j{9?D z=6g-%<40@k;QHtxm74eR5eMF{5d|_5MgG6_eGkJqVGAq^g0{tO0mo&X*w<2X3EYNJa9RxgXV+DIegW6;)Rtq>z z!Nk7Mc#-QtfTJel-NXjGo2NhX|95%Igz;3fgK3f22Z}Co{jPuV2g@Suy>%&BEEaGa zgNc3a`(0{pa7*yBJz8H=U@j%6^h3pAepnHrDuF$}Y(k;K%ZYD=U3;~cS* zA7kqEAlaieW^jF!gkpVEL#O+rG-hx?6i8FXqI}B=osX`7B@LC%cEqXmvxAHt1)SDv zmYOOG-mDTYeSyfgk&)YKVAJZ!-+05(6F3xsc=5sC})U< zuU%tHVRPtjZ))KfeNx5`Q_x@VE=jcQYKX6TUOT{pU0QNjTCsQyeq`8%jsD1QIG4=Id#CcWq3Ap+&`E3;eA=GUUUa&B&a zsY|MZSSMvWBha*26oXhwvyGEcCN_l`^;}*Q=ljd`s#}cbT59#1T^*Z)cA88r{sX?M z9UTW>JOwYR970`u+J;marcuZmFmQ4HhkP-525E5q9Q~O+{u_H%Dz6qa(Sg$~es<$u zI~5rG8aTb*+$&HlSo6OUtk&Gz_82(H3FuFuxQ^*Mcx|-sOS{u?&`T4oWr&{#s!47Rp$n$S<&9Q37|9=43r7xB` zp7U15*$*F+`8$O^ehhUnKBBFT_BEnm854u4DfYXKqOrQeUegj z8O;hS3w)Y!tl#tSeH$YiQ0syv?M|vT!ew>lMZs!pS&qU8^yN$+_yBJ6;t86YN(6O`7dy~?_Wg-|DmLD}%W|U5b^K|$o1KKFCVBR4chbl%qFjq?z z+bTu~wpj=w1061EQSD&V%%lnTAM!DxX?;?~`1KxO>L;XjKI`{XznS?TpSCZd|qhx1%IIo2X6QTUhumE78>~(2@fsOHB{_52yF} zqVOY16G3Ki5IpA6Xugxw_V#C?h|b3}nG}90ilqsIQH8&5a}kW8(r`fn2gjzwLx_(D zUqK{IVjQ{BYSL@+X{xw2<@$(EzES;U#f;jD2H1G>8gri?P4ECGOgXD3&XrE@XIGycxB6> zSGMae-G7J(a~HjZe$(j9y3Q4%xf6m?YRa40ei&JaG*zXQ*p}a%Hn-}#|B4@7Eo2s( zvXc~|Y^}tG+%ixL_h+rq@kT@4f8xx}l@iD9hcXj?_9GrZNjY#=(&{^W=e!0p#w(LG z92AdcA<2@6o$N4SbY1glQaWtY_eEHBYSJa?^de#((f+jvv^cNhr!mqS!yR>eQ0n~G zvL!yP=7RB6DXBD_s9w#^88&jUf!)DSV7$H>Zcy9G$nAzJ<%et-_+q;tygI4C_BAoN zC$q6iZY-TJ@Zr0)K6(thk~25ZLzW7DIm)8K{@~?k)axDmZ?bqizB!8jSwuXwQFKM@ zRucZMrg8aiPGdRCV4rg1Z(!im=?2G|VqZ8VE?E6m{f@&TTRg2M;jYOyu$FxzhmuxK zC@GP>hCP9DGp3gTP56FP7`XQla=X^yl#-{h64L4F|4X}!D7LsTjMmpg`{?A`!UJhB zJ#II^bcHvFq*eG*_aX z6(e4SAC-adb2@14oAfpwc`}e-XLX9kjB*e+<8jla8|!bfz4J3XwWycY=alro8T1Sl{W@eI>$VNw_uxXJa`^JLTK@-)5vf}EA8@ejcr znJIR6WoPxbbf9CxD5aqNjZA5E2{|D8k!c41ciH!-=4*T3%KM?uLvkI|)%ia-X1X{2U!R>5ZQ{3*vlH6sC;2WI=2QHhnL$p| zcLR|D)TanjbtdI`j(_H-Q~0#LyXH8Rp|fH1A!&7MUVp_;a*qP|rdYpA7I-KeV~TyW zPyY|C31uZ63@8>W#ZvE`S}ZE8tjAA^uFPy}gh`FOv31Zw_NSPa={&^2n%+3};KlvN z4oRJ39&i1xrj#y*Et?P9f^O-V$8(r3?5mCldJuH1( z6)yosGqlCA%ezlIx+w`kyuSo%nvqU`RxWa}E-4Hnhv0`6YJDUlfvlNJsW-V^l~=egb+W3&NEdO@QN-tZa4oQ@jj|59>-EhT97mOB(NDSp-Fr7w!>-l=kN)BT+^) zNjuH0bMmL6Z+nv_#B_GK#Rrc+x5oENywa{E?9iH1l2cLbMEeqm2d$6gom+nxa@EU? zk0_kR2{z3_T6 zmW``n(Ineuyzk=84m>Iu1s8(Z4mS28r#5RGm2ofTIDyKvi#R-NaE zE72FC6@ffxF%r(`RBAZ0H(8pu?Ne*+k&Vc^Cx!xiv(GQN>GAFDzF+#{U)a%0TEKS2 zNlp^IRzYd5){=scLLPwQ2W#l_k;N-#I?`2wQxn^Xy-O#;NYR5_93dtdm9B!Ob|p>& zk{!xNkc3ApALa|`DA8Eb#9(hC&jFGG&NsggTygaWKb)=DdJ0{rSZHTstE?irfr`hr zwj#58A`%j>D}xsg8_<=9tm{_Xh>9l00yE-#VS?CjD!!+^+g^XI82kkJkNT#?8m(c6 z;xV!-v<);Jx{>XihTr6;Vl$}Ozlr+xHnHJZ(7Qr>&4?i_ib3ILEwbBWr7p>S>R}l5 ztKSFsR9C3A{%TyR(-B!N8&BdHADgi1oi1V3JW=T|WhdvjyZjty1)w>9&0=Xgwb@ZQ zZIdtvegC3Kv8oGpzQ0T-p6c*q3{byD(ko8pN~1cUY4Y~NXiobt@18&g=M6rCePp3z zKfL6mVMg<*apm%>W0L6fzV>QTYZG*n;zs75#DJ5qLaV3<$uNbqP?qCRNSPXHDwrh| zlQVJO&ofbErg=kkV>0pUk&KlG0A}7>4V_}BFLaitYk#643KuCcqK1-YLWjPMK^KTx zIaJO8HTF>zVqBKR-U`5Y4rVfk=a1~b~{I6n}hIO#^V zxoc#+_9GxA$%aPdeIDzERXuXG%a7CUcO~X5Su6F%A$A>T77FmE{xBrXY0%^lqYn$? zDy_1@D~C>Bhs&1ocV8P7Wkx_JUO53%H#r5keeXA0>h((1-7n7TrNCj-P5R zx`Kbcy&kB(dfoewEbf#9b<7)9D2|;3|GQHIkCdvI{2hHVuCDB$@v+`YU;G&%J6%m_ z&H*>ko4)h3I}YbOnD=~9=BF%P4{pq1?fF@4SxGa;_37J~Gji^7SyMRhng`TZly`EZ z)j-q^66>z*R2vXTDfu&~pPH!{Co?cR&&!Tief<6lNRG3Pi4*v2*6vLx! z)y}Ard3IqBOhf(goWY|g*(T9TPv6b~)z`m~d6(ySso--sdP%qp4QT6iZSW2(r!uN#9c@$~H1pP*Pf#$QB9JEaDvar-O`rNDb>2o5O9N{X7 zUPQ@GEH}W^ty__NxM|qIvdc>Wd*AF4zut*%!Nxn$76CSCtb@hbWNCtCjB)Nr*D%3a z!o5n)(m&S&fe@FBjGMQO{idT}8810@jFVPr4nyfg))uyc4M(Y2(_$Z=}i z(^;>04~}pt!U)w+5?8sSOI@FK#Fehj2?1^0l6Hg{kDDPOm}Sd>uhb^dR%RycMpLen zAIeuv5ujEXDL&Ry8k!&$215#li4-Fca9JNs#GxAGY$D6CRa@~cl%|?Hj^KA$ibdM( z$N}cx)3gw9r|D$NQj8TvDgKgei|A?6qd!!%I(pudqdcJXQv7B6>2_^~pfo z!H$+?qJmb0oSc@ol5tz($yTeE^0$4<7BRY^g0ZQX2mL0zVyfKq-IlSRy+ay@N zX#)ww9tHtKTzWqwTzc42N@O)~HFf>{0t4ftbiRyYg$Nam#Et^VWak+bRTt{Zzkhm~ z|N5TG3woNqt)_iq%81MpWi^(Zp_iFjkYDHCzJyJ3m)E}ygEan`Mp4#GzA2IB^UiEN zQ%$}qi+1GWI2o_kcF0VtXs5cGetpOi!#$+Y^upcka6wr-^rNys$5cn&gIT7)+HEoK zXTI>ypGkQ6aE!(FiQ;t96GHp(w!c$L)*Yy(z)vcYi!TBihIwT^dDx=+N%@SN_3e%M zM9N6V^K3`Fu2nq!mjKRTYprrXA`Q9Vwl|QOhWT$0asvtmW(~kFER(S$_Dnl^;EpCo zKL8y&MVIN*m*&uF?o7{4Iw5o$hhc;foESy(WjhC~ryn;BWV|T$7fAJC`DGLs*BuXz=qLwTzNGB)N7#QJOT&lEyY7L#u>z1lZ#=pF z>Y@Q^(mx}<(3vyQkW1@z85>D>D2@P!u#~?gbfv2*-WwpOyDAF$ysZ4u$v5d=_gqRi z*ap}Au4pJQ%yiA|71P&*@=mX+*@V!ju?RZgaCean}{m3eO>Z_=lSlMTn<)O%wYXgYZ>c&T{DPX}+q4 z8+lK;iELGZ^LfGHZrr*E)76?WgjWK)FeUPbn|G@ z9hT1-Xf@p6qJ|94V=ZeSO<9ZOr zf+JRV5c);!pjOC^^vI+R)rd!uWp{tbDav7?wubep(c956dcjIZt&lI zo<5JpfiJh)+b0?J$9XwDujjXrvN4X~g-4T}#)R7%iZ9Cl^XKW|Uu*#=Xf-&K04<19 znul|GYuIu|>T*)<<7-gf(HatVDEf4%IX6m3C;? zgKc5%r8GojR8MH9uCAu3(?e*9>($3yWQLot+tUXuR=|g7dQ)Ay7Z&D%s2s*L`D`trcfiOiD(M$V+t%8g$}LKcgm?vy`|)ySwm9-asbF`)vLVlR zFRYr#swmWgZxeb_=5hGFOLM9!lsx(}p?1jJS*vtBQy#RRFU_69Z;x``Qn5l2jdS1d zpxEuvN}^m^q$sSmBTJ$pD<0Ovi~%XX8oXdbb2v(Df3|4P$-;nOiDyJlE?uisDLk{fDy+@q*PFo%70CACO z!`z(79hz9C(zxV2Hi>E{@Lnnxv&QF@bY>?KP?6CefdO+muQao6W~92pE_l|<)t_2o zlH@u#MC}`i!w_`NUSde17K1AW(>yYVd~>$#up$1fv7BCN@FP4JaiY6cX5nBDufw+9 zq8bI&F|Xi>yHF`=dGu;LFlRrR4xA; zOOXT``6x=S67a2HAoQ7tVgPu^EymQmmm;Mt;RU3 z%HQxDybDL=IY6D zmTGZ9mE)U@0!VL(cR^8wcqS#9uF3TJ@I^yqTl3{HG(M*81n_&P!2$AZHtKK|-z%ZG z5BT`UGd2=PRfJBOju7&Or$c1V`#YK(BiUWgJ1zEguV0zUKLzq{wij$wN9 zJ-JXaGHhYZ`Cj_+n+-M#j}!U3dvnpjpNNyqRFc>t!Ni7keVVWe`wYwZyx$IDN+^N0um2mzfjn9<{ zgto@IO4MfkIS$RV;bo{sYJ5xxmgUJF`BOHB&!-iIU+>%tTj(fwIMwd4f#ZofEK8?B zYPUy|>wz(mxlP)L{1ye%L>-zLhlUJq+}|hZx&-ikur%F6rQYUF43S2Xl4vKbOBo^7 zc|>e}LHJ~A_^KPP(PJ;QJ8Xff-jMz_Puo*`eT#T3wPnX7%I@fs2PP(c$-U{RZ206I z0m%w_9(ll)oPq;LsAU4Nkp9y{>dM2$5*@I zk`X+19P-7U@*FD(?M9A^66HAKF`%w2LrjzF(Wc}3!+6%e^F0s;h^U64EQIUR+>~@5 zm=|B9MZ;{9wDic*8cIN;!ea(BX^~3$XM*IuCjz%H(2leOIv{4`c&xk;bCGqGF*UoC{96qX z#kGYibYeh(tFX$D?^I0^2BUH52exRuRz#6zE$Y-+#8L`oCC?BJ+Zgu|JH~- zKQ|Yhw)~n_v=CiOQJ}e`jFy_YdS#ILZJ1arR!J*dqRl$cd26W9Rd>8BHlej8%m80htQk5ZwK3HXMkhhF zNiEY}IH1&=Szw?TcAfd6MHP%Fc-&LyN_nW($+E&RY3s2gdNddJr*14{tP8^0B{cXXwF8k2`Ri|(m+`wSrYuuWqu~$b^nL~<(futt0n9Oz z%GkQz6PeBFWbiI$5Ei%d`r0uN_M>_A1zL?C~Yk=}6&Jf41(~ zAm+DXSt+k9WWKl$U~TG%Qt=bbjnJu9QGF50O8v@eoKKjVMOpO z9et-3ko|KU`K>hc15NLta_@|Sg~?`pCmwjq-y9`>3Ho5M-+z(S+yYITgFQXLX`v zPr5x{XS`mjm1j{$x|W7_Np?KCP}zEkl>8i(_F!RtEuH#lPs95xlS~%=;$Q)GLRY)7 zh@$6gF8Oi^?Ft+wDL0h8c>kwm&EIE_<}meBtLW3tWmOT4rPD1u=Skiw?M{T*}^o6=8p2L4Oi@ItuzL76zdT8xctBk*3CxL&dAeT7?Yo z^THhXQn}QrpoL$twE1$+H|$CiFzCVT|Lq7aSR;R{?9DHuXPpKxu0ILHUN_tK^x?zj z>&!AiUR*@&7wUL|?Jvlp^CQ65&+0TbKVIccD8T_F@~XR3;#b2#O`H0)9vqulm$l%H zOLY?nv;MSG8C@GJMyK)=XtTR4DY)arMldVi6pz&=bwV6etLZfx2m=!pDLZ! zw1K|9#^L#2N_ybk@p1kA{l*9Xw2#Lg@CbV}_APj6T)p?mn54R`-so912kGL?b$dXD zmU??>i!2ruf$)w|DkKk46bC-Qp$molH_Ck1kcjYdjyHBx!Omw*=o$EMZKoqon}lc%bbF=O|qQ>Dcl$MKUpm-Nz;PA*djSvb*`4&J`ITCkOP>_I4WY@lAcByE`EG z0_DuOrqB}5&a;#L#kn2+DANjg^X4DcC2#-7fkG^AR(x7D0W+u;LV3Yci-Y6r5QB#Y zayx|JM&>U7L4d;-E!$}%hrgZAJEnT|;qyq&5_4K2i!V-7sZ7X8=t7!^tZ$tfmpcYb z{in=XPx3f#=rR~=25AV@K&A2dpC9_e)+?>bM~NSDux{u2m-Y8fxFF zdCyO==zc7|Uo6^rc<4Qp0|j`$0}V}^k};ZkeEs6m?~Yb{-CVK1h$Mn6D%?(_0$iTb zKv7s&4QCv#r_n86hHgV%9<8oh1D{`ehJMzi`p@>)Sbiiyb5lF{P-sykaJ~^=)Zn^cp)Pe^!VY^(Q6cK zvfQ155|+bou>dmEh&cM}`t@~E+Vm{It`6ahb%5`KV5yC?H7+(BvUDhFSgyR-Sbwe@ ztOsnVb%i#%Im-=zqwnUE$mX#S+Y659D>7MLFsuw06sWFHV^W$pX{sR5On z^}F_F=3;ZciV09#jmu}gID77Z2c2rZycW)-t>Jx)k)M#6Vr4@~6-T~y6Z-F{MGlwC zd*dSv?Qk>S*k??9m(2Wg0F#Vq^}Fdv`6M;N12tE}G7 z-oUmF8X&ataL+x&=X)O>~Bz?lD{P0e4{pOsOCQMxA}SHYAGLy z%p{vu;Y``5A%&m7?p@%IjW?-826i^y#txk)7zGHnFCYB1#?FekSEldBmD)Kof4w6A zr<)EZu8fA4%lMBv(}|Z;LQ{b-AD~fIl4jT@II-IZJM{zZ?! zm}C0LH!?`~Em)qF{)OstN1UFdjRdzw;xX5v2Wc+fJ37#`rG~G4*zPF4y53GRfM++p z8bYs$1dLcU3~Ii-YhOnKOaP;Tlw=*bQofQ=3#6_}-2W6we_gdhGI(lD5)T&HzVmja z4rbdYGNuvNZ!aw0!s(Z-*~@AvdTLQ;1sW33bf6a;7}ZF@%w9hTg*#c9_D3Pfi+spz zb#s-unjdopUc68)Mn#o!<*;@t-EJ`Jf1jlVWSYUzd5`eaeG<-a{t4&i`1&k3p>X-8G~NJ0bb+fok#gEf;XpFtcjlLk&*Pn^;<4j&viy*}ma> zrF`?0?WUsaZfomuR?z=2o&m^gxrgv?oiphu$DBr;V*nPb95}Vm)tbT zm0_eWbpfXCS;dqe;Ezd~mq-u!-}2q|ba+tsAG0iwfC6A?JqWaZ1e@`WP{viUJGQhP z8k8TDA|;0x#H*V52J84@Ko_xQFw_=sE>+FaTO0NQ5=F)4PwbZ;GK0N%ZRMrr@5&WS zvEd-CzrTw1<0!@Vy2siX6V1iiWVM`)_aHYjOis!tV*LdfQsO~|u{_!09XpVn6?}Q~ zGINLY{H;IB&DX6VCf>VX1TKiGPo|t)3bMrT&2aM~w}gDGg~!?_Li}zl$PYV?KviF`OR0zC!_3gA@stpWL#B9$&`D%G`jTlAOD6A`&TeH9RH)!(TSS- z7DcV2G}++yPT#2I9gaS8)Iuu)qbUXC*L+?E7IVI@lx-OYTX${-s&!5g^Ln;F5>eblph>?ZNLC&4k!_ARI3 zNaUB?0o?BmlC0GM#I`bX!~W^Nr3N&Ls1k-)yOoN^79+L)1UxWO^;6tjzJ?e^w+a?J zgg!CZrPL}*jIMD~{h)k84m60yF*Q9^JAQ5EVx#3MTr$gEUmbLSqDI9+0W6;opg1wH zB%SO7&*P~>rwR6?9$cL_ruDK64SlmF%0D;QWPV~gC?ms;4dg=q3G5IqJbgolebn=F zFucFv$EMA+7C?De5}CH~^}RFjkk=xii^5qs%`~PkTlxhtPZHE6gzGJ z3jJTBrIu$h?kpov_ONY9yg@1(ko6-yXqk zgZXgr))w${uu9;WzN8fveH)6%tv2BqQI>4u$MxqxEqB&=E&9;aT3GpZH<}e+pqTjYsG+E*H30{aXK=5!Oplp+RWd5pa6t$M5ykAwo65_$tuC&do^DL<6`tW0nXlk#F(|2&*gZNUbWjTVd zS2z&tDSX_A2h8egoY-7aM4B1`lnt$DoZYRPndcmLKNn_2Q{Hl@i)TVNCx)loYHG{@ z=HgvPKJsTz;zKVHjbO`9iK7EPPgX=Y708?_~{(4KfCnCvJr76*sX_Y673C8nRTm7W9Z{ zo)%wfU&m8}wq)9fwn}};yUwMqgI;TP;YPuyZ1QS}X)+Jyuc{imlPL?-b z#9<+RVs=VNp8o<#gl^vdy7fP^eA`m%dLP&X;*&^$>j#t(AKd&!h~&{z0B@Sr5!`!kP;pvIJ8-CA1q@{-BqxRWW-(?Da(3}r>@b`0 z3LAN&D{3-WSX$YT0-POciYkA$QmRW>1o3}QdwhCnRe0i%$OBLW-(N}v`o26sw@MzA z(S&~`hW2XT*mH;wyDW(CQgJ5t$@NUX{{D{UNsUU1WkV!OirH@|Nh|%Sf#I}AStb0Y z_BLUPee4fSz=_WrnWAu>J(9qZakhQKOTb#Q-;HsL#eP#`6*8BKetG{tbgn3ysStg8 zQpryqjz%uI^OZ7H)anJOEAbFCX#L>9^!~zdE!IZ&{P+GTjtygjcTL9x3G?h=(VoZ4 z%k$-+2=sCmCd1BGst7VovU$-F2iD6~DZ%+J*1P-38PKz!|U^VIEdxBdHC<(2P+f6Yh{tmfF6#ZfESCy&q z`skB$C7G{xhluz*+i_;;Dak;CnL#v4TQ9fQ)MpG#y#LP<&|~cz_*N`ng-{g#3tah9c*xEX%Akiuv40UC0#du3@9e+rNxNKC92<(a2#l~V zo;;RJ2k}|dFEP7JMOAs5-!R7V94`(GxPH_kd^8#lIZC$B4tRpQ%~#x@^GKOy)MB*Lw7#lOB^-X^Pjk&uX`Lup$^9KN z!{Z$oD!K{VpjQ0!lVOGpLfT^FwZhurLbS#o@0uld*H1CNLeSxYw#FannkC(;RtV&h8%Lfx{ofVCu)BXWhAhsb40t~00?9ln*AK`xFMQ{neXUA_3QA7(YBuB&QkVl zvG^nKv^74*wGhEIM&UknN|h28_}R?#OEDY@jBa%LZ}yVp%$X!>`EI6zHl!bO>%CG0 ziE#=qrR0IBTO_GG!=!C!wlcXj*6p1E9cbqaCdW4iOQTjjmffD%D+%G4Qx~u|`FqQ{ zG99OumNpX+1bzfGV^`$(lWU<)R?fTGD((UJGg_>UD{YbuQ`7 z9~c6QTNkS?&@mpX`cRNFu-=jw6EOqcV+b4%ni z7~n%I|D`Y8r^bdB4Z(M(tku7=bX(jG8Gcn0cPho7WfhJY4ZN|G`f)A)_A&FK)bZvu zOhuIt5*6$a_s9A7$>a4~kyF4=nv=pc}R^q0UZMkqFfn`ft4&&+D=%op@-jxyN=~rJoiiRsfXzB-L)^Q>+7Rz$1 zPzcwD#c(mq-{sM-Zt!l#0u9K{fbp@9hKLQuUt$EGyMhoDAk^8PTB<@9ldhBSH}nD& zp^;7$_~hCxBN>IH`Wd0^As$}d@8E-JHtvW%wc)4gl}JA{;|}>4v~zXy3AmO>gGQ|S zC<6%B_)^*k8N67F!PWM^o15XIg*D{UroY6bWGxvHoqSPRT)RS3)Qhm#;gJ-6%fTs{;O9hWl zg2Inl1AsC+OpoEd&NvaQ74=m;9EsdEr#5eATklmb!rjLpH~7WK10h4mB(l`}8@)dl z3Vhl%lGN?nIr@Rhb4Wii(ygeo^oDGWokNSO)XE&{xw9Hiy@Cs6dq*XyEp=?xJMBTT ztM`u5i<3}hi4W+rpTWz(9 zY9Z||DxnGMGB@0Nifpc6iP=fF$t|0Y*_dOL?AL}bk$SsI2e$O4P=JW@ z^23w}Mq0a{q)913=c3kRp~5wLxX76Vox)8h-a%spr6mrj=ood%eHI^{dNzbG24!YG zh)0{OiG>E+`gXKX!=}l>875*t{0Mew`)HJU+<7Z{rg_d*nK7w!I0-k%U;HFqWG}CSvs7sdTym%KZ<69>MSmFITHMbOkz;wE1`BrM9 zG!_l*+~I|GOgu$KEY22Zo&iDfNouSxyt|G>oXN2mQ&A{~sWnHb39+Y|l~pzEL#(2b z3uYhtkQnC4QOFg)em70D22w+2F=gu<(r4+x+`nPX3_kPPI%HN_g-$d0ZBaj-3S%b7 zcyDltZIa;#&LX$$(dOZ8JCJeZJHWu1jWvck*i^OWx@zTFexik(!vyQ4oU8)lDQ3bG z>LOi8o1=|yIqYp3f$_eCh(T_~Q*W;&?R5L<=FycfytTy$6{aWAQW(zFfRz{T1w(M> z0Jd6Lz!*GL@-YbOly{8NaxYiVpt z-6s>2WePqfSkT$Zq9CTF+i<{)7a z`Mt`Wa0vDjr39c$MDY0%#bC`q>p!Z)jn&)Z^?mp49^^>nrT^jP$(OQr9Ryl@idi@7 z4tP1hRrabWwloW;fc0oMcXI<9BprRY?y&KWMfR*yBe_m7HVp4jCr76Kun3NV5v=*= zI14k&pLBMZu+x@<@mM+{5`_d?emLqp>3C{bs=`u(?Xdhv-&5-D!v1CCqw{wd8ssxF zsolC0=@`NRvLP|>wZoY@dj2p`yP`<*IR44`CV98`V|kCbNI=NN!{ORsf%li!%We7q zzvRvzVZ*sUS}khK%_vDI*Yg(^miHSq0-!xcyOl zH6%5)Y;^+6EEQ?_2OTH^^Pu!0HJKehq}l+<gck%~;Y!L=(lO6ZJ#r^0YBKl9==AADilmeI{5&{OH??n@AzoQDl{{H{d|Qzl zffVUFH366s%+@nRt=0$l)|53cXC#aP zNX2K@AIWp5WkAQDiY@U&igUjjO)WaWMal%G8s`K0Mi#lOKS|qQW4GKO1B!i#{USL5Bn&Hf_15r}a?FO|DM6DmTXLku&X?siz(vpl(P=5${ z9>cu}3%cIkzHE@+j^gqi3k!#V3$p_^uY|LtoSI3Sy!pdl7qejb)-Y5C90GlE@vVUH-N_T79WGJy zS9K9~Us2!n(DZqbI85F#xV<|w;_;(nk?uLrku4ylcL=-SoW#i`p1!%)i($E)o93$>#X0tKpF)Q@K7HjnOm%x9>7X*E>t~{vJNS zt~d9lx4pILrJJLdD+4zP(;okOCL^UjBs>Njs24JTO@$<5fIG9}Xjs5-i;?^0fVbtg z?#<^nCRhs~_{4mMM36Id&@ghm`9x&-misD*po{Ok?7K$)YXCug|HCO>z=xuM>nDP= z{X7XXKz2^|?9@gN=&{T9((Y{RV5KN+xzb>7|1OVW>!9}+f#_|DsYQ^m$g<2Z^1|7A z*W0yvh(C~oW22`_kh>?yzdD%ze_+{pkvz9Ysuef+G-IW8m?DIX5f&XrAU{04Jl;1q zob9;l=)*UB?>`HYGiEFv-}E(NM{dzO-?t+dTlRU`*=lvH2Gti>QDGOBP89AA;;8qK zvh=@)wB$XcN4xdU1r{J5=qP0IS zN}>M@ieZJ-GK5)lbuKUpt+OZIDEmSy^yoJRtX;4zHBi+yl-+Tb9Z)yE85+DMk0TU} z5_+%UI5BI2t7wecgCx{qg{r$2lM(5f#~7=s39|3*SmVBK^_PxUT?67EISbZ1!x#pu zapdg)5gXiB2<|o^2%lt>K9Oy3E%yjY=ogsX@z**o1$>rNn@i>o)~@Xq60A(r{x4$8%T>X|3$RUJ3*gF!YyJa0qf+^7du@| zJV-AXjai`IE6ZMyV7ZCZ1^ViVa73KU3Tg5Er&eypzTi_aHMR{C{tv384=u05EW!s|a< zvQ9G#PYTU=;;tA?His8Mzk4!yUc1+46BTp0|LPL+bi_E2%QTjz4;}aQcsyXX{|Mzj zZ()6(`RcA_du4n)vEL(1n|vCb2rVgoNA$^V(c_*_Cr9d@e-q_>nFt$6?7_>n<$9}D z_@Z=hg1#6|6C=OPSfo{Ie}@{JJbh;L*2x^GuOQex`tw3;k}^EE#(-J5(Ds0|lTi%b z9-`4E@%Vh7qSQeOEp~IE$8rEx5y1H4CZkKLB>yu~3+1Kdw3qkK*JN$!RL zk=)on*tFrLK7M@uT>g7WcQ$I z79N6iED1M^2du}b5JcyUrmP>)Aav!UlMwc?=cSYh$0XaFIm}h&>osjU;&Lc~QbbbZUSH3W5gegJa~d<)4P z(F}8xV(dxm^}T>)Y2fC*`CZrNrJ#zL{J zfZqD0*)iZ!=TdV#dRGD#+pRVJI_GO~6~`eN;viCA<7m)-6@*m1qNAjWN9%KWvmxw4 zGSaM9anreQAogG8gZ@Flk`Uhu@g!=sIuO*hZX2j&r&IABM>;4cP|n@2dLL=_#M!j8 zr#=3&I869f zAuh0NUDplWvk7s07eU|9Frk*=ScdOFXd4)!aW%;Y!M;dbwtY7TIx5hM*uG`0_Xf`# zTnnR})APa2oBl6`p_#S%+e;cPx1*LC@)=GGE8d0x>9CCxU>bHq9stSP-HWDh=#C=B zu(1yiMUL)z!18t5qKKHf?-PKLmZ_-~*D- z)m5kyfGo?fP2jmYG+f;=49l`H)F45YV<4pYCM2#+OspHgb~Mv~RNvsFJRk|(Z>*XQ zYIS2(v~MZs5fnWA0Fu6`-y1s6GR&6F@&af>CRi~CYurTT;LB9n=0}p}c)G3`rh}jX zd~Ex^X;bJztXrA~ZHo}i_bhADhq!t4i?!1Q$An`~R4H51s^bNILq!eUGP3QWjWAAW z-6j=plZqQ874Q7@um8a5U;nzZBe`Ygf0ff%`7r4XQv5iNYCiIv|J_wr{rlevs4bzS@f08IY` zrUrk4Iy5ZP1Uj;Q0?>q}{*waM?zzFgoMkxu39Q}M^x*y=|8Np~peYODXji#KJ2*+I zKV@>@jz^{6Onmk#k3@Et5(aLH(|g5_Q{^hnsbCkjGmJ-cSDCZqHr}} zw>|-ilBeOA{3!t0yr3YvPv~w*-p*}Fi`{d2NT1!Q5A$!~{=dZ`*J?K*0G9552#|)* z^#0co+V20y`1e#%Rpl(9(TDR>g(Z{(en1owM}9EKQxW*sd8+)EM@4!kZ+uCq;?gj_ z+ldnz-6qk|2oLD)j-m)$mjcJVk`1X+G*Czw&?r*^-f%}zQkujp$l~;VR~ZaR+6&^k zd?=t)3Dp#@l3~6fGdw6I*MG4gMuxfT5)B)siwJZKth+j)1~Dz)1q1=d*KDAf27=V} zG-!H0!j@;+u8s`XA-e5qpfLqW9)?O1hXJ|YQN&;8;*VYB$Ulv<^OQ0^pdEqjW02C< zIZnN{vwjz(bie@@&-)m6!zr(DHo#V&=v&wWJ*h)My_|0idf0&w85XuoOl)M?E}*)J zd=GgTAZlZZiKaW)*NBg>fh>pUE^!>+fWF;`hE`LZr16NWb8Tn3gj+n(73PNXT()10 zYhspBPw&BUdTq@mlzPa-re?bcLeDf@liI-3v8H(ddc;Pq4XLRC&#gx^qZZ*3R&Db!Gv$nHa!Y!WN3UkBRE!(fgwOCjf!0)0|~%W*t{9mgOJ@O0`LmTCAzfY@*y3+RTWAzdTbrYh)Y}(>OLSy2M*Bzw1MtnXb|Gth+4oxnD{;hu89eT z9&vpOVH3c)>^swa)2ZGWgt3dm@f^`i!I2W*(liY`Dl9Z9z6@t&zfp zIV)OEVBzg(lm#gjZ4{6CK@^CEQz`^?$ben$?;RiRDn1Sw-Pz%$S{jETO)I=K!fr^5 z4O@QO+fj-yyj@|uO;a&$s&K2RC%*rH!@yHwVVN=or<}kfjPFM@%APA8rlUAwG*jYK zVHwV-pNEX{!$BHeTQ(ZRiF`YKM9gNhjToR1;!#`WlC7p}xEIObe&FCzOF?xyYKuiTkqXdH} zPWjde82_%MpKqNrO=Xk285&o{^5x&Ji$hV$=s{P#t4a?JkL?C{f0 zs^b%4^0=66HJ1F7pDz^2#erAK!h+>SBOG~uVb3ZNT%L8D8-;^ur)VU0)GP{|4%iZ4 z{nzNbbZsnb)wa%LKAa?Ft0w+a50eL(rWtx*UU%*UYt&y_l zc?wqE#A)ywpUzM@k3D5C&tgV!NYg3B04gl|=hxR+5C*@AnLMW{p;5+pnm4q^?M~<@PVbjC zm80I55{xU!0il?XIFGW0N?6fsPd1yoMNo(hdIk=dJ%_G%GdsW8AM(X z4Hiy(>S9t&_o3i0#n?#EV=^|GYt_{HqB7E>~FY{)3W?m5e+~gJi`ZB4O?o%Zc6iw%RSz zJ5;G~);nxp)$Jd9u%9A<6l#u)^Swy>_`!9Tt7eqW06dlBO(H%}bW$*lm1M@9j#vpHU zm!=WTDC-4r--`(oH{@7f*6L6_oM9CwNm(SLUt3kRTvbu>gHbh!JvE5@I33Bhe3TzJ zX<{MDv7VkC9DY6BJ2~7fOhP}Pp?5+3^6%o4bDRx##Xjgou}AqV?Cg}QTIzq&WpsiQ z0WYD;Kq~)69pOYRR717cZ!=Bh$5k^`*%yLJNzx!rgX~@*A!bt9_5$ChDQD@7i(|pu zu5{8cGNfM46~q#5pM#x>E|jMVyJs04seCLdNrNmPI4m{JFpTe5x#zh?feT?d#wuvt zss60c;=3EZxT=Sv0ZrqasbfMGVW;2uf(Dr~jG0hCIooIa04zT!t(K2N8WlYz zNkAdqo-F8T9u(K&dOH=NV)p9brJV<_UaKsFu>9 z%?g)`tY|~)$BsO#`^7;m$Szb@PITcIM?Ib;321M|6#>(bU8;#;Z&TwL5m z$_*7-9XCv;aPY6Bw&2l>rlTN|Lx@w4rak2i4QpzNLdF}Qw=+rPf|1nxE2Qy&<^e4m z*D@-{xaQJ&p2jYni2|u=69FW(mJ(L#A{D*0&%@xBMwBs?b7~-dV;N4fJW&(gJ?lSP z7V~!{0}85+3sg!nhi=|xJ{CnOX{fnE567X8a02a))MY2*9}^C2X;pmVUwz}J9zT)q z0yY#NWV;>csW3IxTs2~7iW>P&r}1tS{gS@nfceD32Q z%u{+bOey08^KZt!b`J-gc)i+Y^O?Q+`a!t8!oFqqHtaq*Z5!tI`N)4XhQE|<h#} z&XW1e&gw`v%<2X1Eu*(#^!lW2n9b**-UO3RGczhaf66t=fGH!2Bc^cE9y0|iBm6xW z;*Dd1ogJyM;)xjTq$)1f7H7)c zFd)+5=?8pk#I;W*mGhsOQbVg0&)k(BHRUc1vW!N(vOB3KE>jazD%>}O*1lA667;#P z8phaDxf!3Qgt9(YA#Y*-X=Na&@EJEa3MzzusuCDSk;hG2stn`1<^vhW!b-2Ow9qVt17Oe#S%<}~T;S0YL!-<5Mg zl|hOL_46>ie0JLSd!%qKH_}vrktb-kU>0VN+qxlMa7Q zrjXk;6ONmbEEokLPD_{m&zvQHF43%{dRIiCgJ|X~n+^UH5Oa>SG3*JxDPthw^a)0s z%rYGN7jZ@ekvufmbAB8N*Ly~Kz238$a2BBqenO07!V8WRSfY7eb4-e0NgRduhU$rw3+XA%eLwgv(U)hNT)KcwOvGdY+#HnEDO3cq) zb9-Q%XA^nKfM#Pk8AKUPIV)XX9E)#-R2_#UYNM9~?+WZwL#o`GV~Hrzoy1V5Y$X}9 zn-HI3)H2LFq)II=A-?HNuI{%n>Ti6-ihOnI6~;hq8LAT@h^o|5=`pQY2tmX$iajOv zYyI%n-xASzd#ykWXn# z|NTEZwO$u0cSV~f+TFP6dg@()XR&%$W~Ve)@5(8d5T{jM&r(@hfUc|G6=)X8(z2Ha z*YB#yU8dkw;nuiJ%f?Zam7|OT&kOHxO6&9aD)>&l6aI~OOP$ToDR?{fCA4f)%9t$0 z)DLdz-`vlCgBuGQHZw{ivY1ejp43FpJyk9wa#l}b5oIwP(V&j7N=$kp7OGf+ zr%$I&#$n8|@u^rpVZ=A%O)5!$6Ekr?KoB(^8RH*LjY1K7qXEkft!$QTn*+?IX zxT)UfQdniBHqiTPZM!P|62;F-Ebaj;*8F9=5f7JynRUNSvLabs}ah0&T3fG<4mVA?iKxK`-KqjVhVqQr;x9oPXFaSpHAwC$0t^ zRvT+-yo*%4*+r@a3ufYqyPOk~ke+|oe_s6h=KQ&m+>+-C9VOZQL6AN#&bsI0-S%9Z zQ(X7q>>)$swLn60TeqmhQ;X%j*F@ZH=3}W%{l_2-h1MfXrs%#ZNRSrxxU}Rrp3~}1 zU4{Rna2aH=Jf~#9KMwN|EseFwSZq1L^_25({r}|Te2x9D*^qvf;D7)2yl7gaf%BF> zt3MZ~C#(15=Go*fk)NM%ie!g^IC-f-d8!mCiM5q0oN|F*M>`G>3vlX*{24Wl!osmp zCfv>lN><&P){HbjvPkC?aFWJx95s?AK_6zxJD)~Wb?@k zSUF?f95A7Ms9#=PetSNVvr(a-=^Xz-F|JvBd{2ufixnC&Dp3xCTN)`$j!F({7Cw)J z>y~=TUutAL6RaswM|l`NSE6_VlTb%RI*JGj^1U;RD^JC|(a1jQIHVb+)>*yCPPxPK z>S{`JaS=kH-vcH%l!Q1KJs&T6k&aS*&o|zLbyAD;l#TW|4$=92oTsWlS)<{)aOIIW z`bSyvQ8+KYO(6Kzt6c}i3d>zpCig_FWXsAX@Wvaq^o@(W;#5{_5_cS{t;3g6Ww|TN zhk`7*xzaengCe1PLM-lyI|e6lz2r$LAhRjfJsGe2N7S0HWW9G5uyV+vJCAuBISsGJHWUE{bK+OBdzvG*|zGJ3{U*YWVLhE%~) zIL3ZOV>t?b@K81mB`lm97W_tc6~}R22NiPZREUKUBRP@_S$Xf_!@iOyain}3a%C)! z_~PO){8k7q-f;T%@qT5Ol!s5r8GJE@IOY0Ec1LNX;IN*?zEhj!Hj`YSrX_b8@m$*dCSDM4JD&|w1N#c94t7ONMqDBOzE`#5w{PLyf{ezsbZ;DUF zLs-h7xFuiA$8#Z}2#(6La~!G*ev|ueB+x0vXo@8m^H@=)LwTw|$!UKG*0{xK7!O!S z-nhkSpM!6?T3OzbXVo|fWn46_5&0BX|=4_PwfD2r#?w@aQA8+fYd9=I85N@#b z(>&VpMRUHWs!;7e4vc2!|H{>c+=29NF!>f^brUx6<{ukI7!J>h1Acm=dfSI^S>!YZGn zwWNwKR4roV#UvM3XQfLlPD@9~27Cb8%~E%)<*k&7z??DockgVY`}V@el0ktBv>J9DWDFO(k7& zawR?#C=*JAmuC%ML@8UO&q4mh2QU#wsl3Cx)kjL{>5>i#9f8_c(hEPjSIa6J3;3!G zTQy;=vTYeHUBzD$QKs4K$eIgnOonvAa}F6VlYp0BoEF0xSD^U=^Y25m@7xtHLhGxS zyQtjLY^`PE)eBwp-f)$tv2Is*k%02X0;)=e6mvAH`(Q{^(w21*#PtX4*q8((=c(@X8+$_<|l>81R=MgQn^Ape?(agZU!iCTQ7iX^{c z)=xQKNDn-pa1uu>OK~8|lD0a;WI?PT8mRPEhT;2|v0xC1G9ldV?LUpg!wB;7)w3P` z*X6`jtQy}j1^XhK|Gq|(Ecn>ETv8L#%HC8Qc`A;wKrKIcwp0E#hsZ2W;xHcEUnYD@ z?ypH{dACwrsg(CB%MMf~dQiuc!4-u?-LtBA+X#QZyrFly%6|q?Mh7(gyI_wJ@EzZ) z|H-m6hz9bTyCIFPBZjkp`Jz_U)b}DJK3=x}l#=@IQ>Ab+F$q~57B^1V2G&gA6zem_ zE9Ri;WU3k@*U$ID05e)8z7$#;jj}Y5pY~}+`ZAx5&sLIfv43=4CPK0c0wAS8MX8izs`8{v zX(RFIN%`5`-Cb|u^PLH&Sb4R#3|ld!FUx(i1qGgZJJoIA-5uqr@{uYz%W)XqD=8)M zXhb7V(6p%9UI#xo8Z;NXV;(k46c@o4q^CmT`R^`)O8GlEDI?|T@mtJVL2J{&QF3U;LF=9gTh{1#f8gp z)WGscj#bX0ABSOlCraKvRYEQtNROEkQ7+SQdM^u!7S&Frd69TMFucMR1^zV0Z>ZBoA)RM(aHIK@jF^Iq8~5;~q&ub{=L zQh!0LdSRnzSig(2{G~bBZt-o=qQkN6DFX){jj{mC4633KVd>Z5on1~`Ko`4C#m_1n zT#+q&P-Tr<>DP|)L7BT;>WY<{MXB136P0d)Fuc4AGBT_Mi|BVz<=HEWRI;x}=eK&5 zs5b9gbLuv4DHZupYUSC=8Jw!xw_pw@7hai$n$D#N!&N2FPBUe`Dkok|L|160V z7I>84v{rX-?9~z$!Gt@ju*CSNA| zB;x<|I0?nKQ7mlKiM}`PN^S2Q9hKsVww9nN=jybAP;3 zqegU-Gh_U?+-w1?G>@X$nHbBgVEib@952qK#KY13lG3$x{FU4DA;d)e6}~Rgq6Yt< zLStg?YMmAj%n1EY!RbIySl#*J7F)nsuk<&m!Yd+6f_s5TUB~rQu`n*~&}Xrdq_UHV z#V8RGQKVK5OuSQ5xo1=r=aqa>l_-vCQec{Z+BZ*%blQIJmhm3zDU)^8r7&|8LH-bD z)w*)!fuH|F8cmX%6)!g{f&%*xMG|~J$*p*R-VX{1$%_Rsd0OiWIR>e zrBqVuGom6AgRg=gz-(#LQz|; zFO~f-)0Qe4o2p7mb4{tjJy%WYs1=Q0)b64aO}#e#7#dM+hUe)+V>P9AgG@5m^~EtC z^>KU?h%Y#EOeR}gRkz9o?+mKzV^RYspeAt_qX^^jc2IR`yijsDK>x2j-e9i1UJShU zx&UamFRDkWYx^RNbItH^;q~r`52x)-6^WcvT^857Sk1XZ@5w>yW|x3!i5`UWlreQJ`qlFu{jcL^QqN;={77mqOTtEd004lg>*6N>VEQN0Oyei0L&Gvnpd;%i zfHX@-KPlkBNB`4LKjqx~{|T(!*Yx22ApidP&;DO`#5qtEQV?cI5&Lw*oF-`y$qF39 z@q4*REbCrLRw(kNib_M=-Y?&M9Y3Brsgd+{{@VZ7zjprl&njo=iEPjtCisb>{)->M z{M*1+dLN|LP^y#46?H<4+V9Lx1kg)4*hjWy}!NF}1`6s}# zeh$_sht%nZ`$^v26`dgHF|AD?s$)jKV~jq6D8M{C2V-27N1G>2-H_g~^m_m(SSLx= z+YZ?I6~^}N&eH$F4GJq~j0ylqxSIxwQWks^mI|5H1b~tj*#bo>BY_$)0CEmx8-SvW z1YpDfpgavcnat)%SDlublcUQFH&^VqoQvx0XQ4Q=B!iiFZFJGm}y8Qr6wHSkip%71hjr{RD9-c0ukdg|=|Fbr$&^`>Xf{@=_YL@-WnyOrd>Hw%!ouQOf76p?25tW$xj5N|Wq_NaH9J1w zVoW78ykxFrh<{|(QfK{(TM;d}z@GI#7!F37{6FYVCQs}CF&?u1ugFT)Lcxi}z=KwC zzY@v@tP5Do7TYqWq0Xh4cu;CXS$QdpmIyq<6`q4<#pRrn7eYuVUaG=PQM#lmFp*yr zppY<7sfq5VPY0rO?;9EiNIGwm<0qBE+0m;egg`}u>;Ob>*Hs`DI5I5XVZ3nTC43#Z zqC=^q^ilAn10y`(ydeWj!8zd254;?Yq8L8C$&N-soiUPACwWX9@T^iUlf<$=AnW|M zccdWpnwWjWBy)_$ z6=tTOCJKRp*@RNdd~*-m3a>ysiKUH*UlL>C92H)f$Nvr2p&gdsjq*{yMF5qGxcthF z5zQ(jEV*$hMKrM84?&j4>5c{PkW_f7JyTf8XT9` zeQg-4DFx5xH3KhA7ywG-wl!xWxr@o5HhH8DxLd?0UPRIY zI{Z58I7Jhk5}kplPiHATb-BBf(5f*VQyFofnY2d^lQb?7G_Sf*k+u}VP{0ccjg-EfHVO`@lHJ})d!wPCY38PQK=$}X!tt0<& zukyBMfP3Y?k#7I#Po}dc`R_3vV%(PP|L5$cLZ$T|*n~JXRjN(@MHa)fg7 z0vrM^h<&~7e!X>olZUiZKKcMuI+y0ozGE3vo24d6t5p#9Vx-AEr4cM>XqpUFnD0LV zLTUa(9Qr7Aq;`yC(%*#EvQ+4wHxAs1mXS5VyhVw_)O!6%`V z?8ZGdg%SeK5vxt|LRBXj=a0+~NR569Qi^e~xXkO`9+8`{+ks*jyoaH$nN5+amr3kj zOQwX%&Pru1M!P-bX$_1!Q--aUJBba3nXsOe%pCVKa>#pjjn3eIZgvS`VxRQlq;cQ& zw}&LX0ZCW3AGQ@mJyEWPH)`kZvpX=?;s3(n@$>k9jK-6p&i@C)C;tB^58?mU$crN% zOKg%8FqZbXAQ#5aXSw)tEl8e~aE-)-&{Z(RyyUZiqIXa%(BqA|`RZ-fA-ZqKq;iX43Xh1ezwLZ~!je4l* zm&zNU#;evxjn~+N+P9k^^b7yYHB4kwO!i;yyeMyNeP97v_`6p-jc+~G0ln;_PJ)n} zdS1MVa;@ybbf{w@)B>R2Ol8R&bhIN@yB;qWEKvb4?@}y4>}ybQ>Z)k3D0iRcq`2G; zsBTdyTG^%o#(vDFBSTO2EU0#Lvj>?trTJUJI-Nt$HZMzs$wkVVW!dbjU0zuFTwqxw z(wt>snhF+ZXr7vk%Fqm}+P-AnBu;Y}TCpmN@Tyu;>ioaIMWB}axAi{f{jb5WKhy7j z&H7LGKOW^N-T$~Og8i}FG9+0++uI;y-!mTuC0lRr0T4eixcuo%Hm}N=&&xJSTw3go zhv+wOC>%rxI^;WL!{kMW9p#W}a(ZL^+~b+lu5^Zkk?ZOwLppKwa$TgUV$vo67!?G2ae21Hygef7OO_DX3nvhvA&8s*>Uy$P{ zL0okiwRkqwau~I>(AeLz#I4IPNuC+}nf$>`-F5>f1BfN^`wic>LF5O~@@W*CHIv36 zVu4^_5`3S=o1}vB2RtZ@ylxsFiEJoyz-@LJylchUL6F=7RJD&>$iqnMW(o9|_vaM~ z5zLT#!CxEPYR$yuxE5s$bRAkHnLnPMSZDvI+If2kV9);FpY-+f-~PBidfNXV<6-+h z0@sF&h-?$LZ`IsxW7v!Z&!&KXA3jaJ<=-Umw+$+9V9YLsSrkby_L8Ajwe0`h)R%he zpRnG~<^MYz_e=8sWb(BBALS|8e|WN_mi8WDNUm}K=0Vu&`v3CC?~(-z}v&eZi0R(toE;)93*R-3D9CMv2o_53`LJU{ul zbf!$!eUq}v+w+=F$$ieA6?0K{_S`cWOU|AGhtK5eDWP6!vdYzy*OOg6HIn{*uAZU? zPoAD_o(B6rq^ehQF<_tkKhw{DhQq<=>HhblJd*q`>(`C-0M&V+Y`arSxGZCKwcenZ z2#opz-~{LA6NmYwf+lViB>wmp7lQ-4F|ga z-+0=8TK|vnw21$3&8EXcM}SgXa#)dPTOq2mr6sWNJyRdf=tK{ z6+xm3@B{LqFEj{*61(6&ks#hgFHwj-Vx$q zVi;^=ya!RrI)c?e?;bG_1KXf48ZP(h_zk6HXA84n2=riGc2AKPic#AZN6t4~J}G#X z<}3^)s<%+E+4VYggMt}`ux_D#YICcQvrzp-O_}S^FDAuf`Br;0LyptW9%a( z^|HFYE|6@EG51!=z$9Smx&qe<{=288%>p5|Bz{CFYCENo+#IA*+!isMR z|4;HM?~naox~F6C0d`Hok0t%34j(Jgr~}lm?OMds zvWy}FT|I=dqcXdGbBlK3Fon%r2RM1UK@M<8Qt?ZeuN>fX@oSQ4$?-N>9Gxvl%sTwc{;fpM{|EE=cNCCnyOqJm(ppp^|&2J z3Zo-8Q^&&F)j*Q0;dSODxi_SIAUMkKm~QdzIe4~;vs{iH#h{aX+SW6^L#k1b$}Y_o z-0w)Ulg(Dz7eNmP~0K??44kF{X?`}dZE{;W@H`JYJ~bq)mf z`Txvjy8qvJ+JBP&ALS9}e~O5pC$47afI*a@wDKUZN+QO~oTWSz-w#NZ>l5H821EY! z9Dj6El*Cz($LS7y`gBrJFo#R<>61fYUT(sW2IJ7Ik!qbp6e9-ha+Y-^!#exP+@|{n zDB7MJNZSL;$z8qa@It!rnb)Q!B=L(VO|)=VG8ZX@89!!ezU9xfwqlIAQ=-2JleKe6 z&QDm1^BrlbN2@R5R2nm5K6S@-P-(h3V5AAJ!$^7i96Z|+LYDh}Yv}M+?xfi?M0WX; z0}e@=g`k+~c%N0%P&Skr2x>_h=dl-uC*bDn@&KmGOr9rp(6}TyyrNNz&0XpOr`six z0siw|s5-1AD*zT&>1B}0Hol&t+z2TNXObzGDk(o=y@pwx^E6l!BcA+;`rS&twyt3u zg9V7w3S^f-UZ`<(%Y6$oG#%G1eJy;3izzAeI(jI;Rk#z-OXE22xmmXA1^&Abx>3@U4)BTS}c?ADw=Ip~1 zEl`RgFNl_48RUg<)6tYb5JY(_9iULNd4tm(v&H=}c8JEZ9^D8Hfjk>Xixh@%IB5Yv zRopaqbsSif%}a4kV3Pfhv5!u`a5BZ4K#taIZ|j0vv=j0wHE$*+5%$Td_eXo`^M4+0 zuc7g;PW zF!E`HirzekdfAHn-Sx;nS%^>qf@l#$LB89M^aC4dKI7Ad|BG(cybQ93|MzE;68|6c zpYDG=%475Yk|X&(rt?=3)YtC%RSFescKi}u_$*#urfu#s`+OC&sr2}2B#hTz|2z^j zk^fk{)rXP)#$)~d7yj|I{vYEJ@}Gz*PDi()%~u2#m%?Y;7qBS|xz%KQMj-wOllJ$t zy1YTfX4}YO%i9&G@8CK-0Uzm!4pH2>1h~rc3r9qA*yl5d6tZ7%ln#L+by-VOjqlJmr6SoTtqH@2mgITR~a>7o6Cj|MPEq^nbNj z9sOUeaZmlffl@E+bALpoUQCIHQtD-Te14^VkJpVrrnb)w-L71`Gr#De+$&h3A{96# z#}?ihUW`F1xr^9gs*WS&Pbq@_n<(6!fIO8$-L>@0so{%LIlg}!`^TUCX|w-}VSX6< z&tNvv&BP;bj!s3Z~cjWY(LjkKW(S~>=*u8Yp-qieeIUmlYYe_>BI?&XfD;(saOjTz$~DM#@+`h zT5e!^ugtG95JQ6pwIq&h5^-6>fC>HdT@bQJ*MC-X_tT?2&Gp*m%0pA3m2w|bA)M1e2AYK?%>jN11q$V`nF2bCY+MgG}{=)^q znawJH%r7y04vn9+{fG*`=xt+tKf7mOAKusOp@aE6?KNN4(~|!`Wc-H_7WVb{50fYT z|52XO{m=Uz{~EYtar(|ejtvPQl9I43F zo3}Tw-VKxzgW1p>Ox?cQ?+u2IIngyGre#umpw4&~G;4kK?)-8)RxzW^-rW&#i$$>= zn&@H~axo-kf|xLv7S*5e?<}u=ww=Z?HIIF=+7 z?9a@p*}Lr7i^vY$?2&~URAOp))3f}D&L8T!?JQB<>eD8nQyB_;n0EZXpz zb^IN0*)Z6m2xZx28qY~X%8R-#58XYjd^U%Qmh#_2#{cL~2YUX$@!%=`@8dk5A^wN1 zJ9a-;cF<=syQ%Bh{mkas{nO>eyVJKfKb+8r>e{wahvn8|w;#cLI!2NAWw<#tTmQmR z-N*vCcl}Sx_kW-Ke;((t+5dj#BmE#2K*lnv`G#~1Vz%xTINj5}CroxF_ec#B#n#vP z3>H4A&$aJ#J?QwiUjGd&K>O@J)6qm*|C7PwDgM`^JYxSZ7T0|(K*rTm*nq@mlNCsO z++zpQ%GI$1X;qrof+o`=%^F1C+}j>hC?(ggE>EvcZ{A!f7K8tEo=iq%lhGg2X7so7 z*RQXCKEFBpK^bA<252>(jEVU~wHtjFTgtemEoE%BrIb7Q?$!Tu_WJG1S1&JK-TeIK z>TlQY&M$u&m!?x0zDE0he>+r7+D$du)uzh+$^1t#&!F6sB#`&Z{-4QE^O>F+@*hh8 z(EQ#%fA;x*%u4d#a58+-{~qP3%>N3t?5{B7PWV5<l_yERo7n?BT`9b#E zpu75=h96n&6cDyH_E(iC3NpvYO zN-f~mMcF(F!666NQH+?j4W!=w(S-l=+(S(rz^nQHpg%6%{~r#APx1dAm+`?}z9;Oesfj z%(&4ToZsmc_`20RN;JSUOEd*kYExknxJ4xiHGy76^o3%1cn-*f{6Az)mdfhHD`Dr{ zZssVBP>wP$^&QYraVo5PHPI2M+_&LE4pU_^Z5Y?K5!8oeZ5)wx!@*eB8;5n(5UlS( zeS7;>!Z&EHOmmIX8iv1v->#Jxf|c&0mwCpPVF_B`QK?!)6%A&l#yX|`>gtTaC&9=D zi#m)EQYDCqP8JnN-h00|1*oLnIC%=uBDfWOE@qP(#Jx1$@E=+_ci@iQ7Fwus2D&-ExhD39km3R?V-gOo~#TXd@Oc1k(_&gv1+_@sTl-s*>M| zq-?-RnYona2|pPjG$#=yjT2v<>w+(6-*N35k`C(buHb~1DOv;{910wNHi0c+2EZJ8 zwgJ9)M_*qhGRngA&C#I7GjhOFCUg zOOVfzEgQ4=m&zt}A{4z5297vYgafTrbFl&%R=%j-WSnyPIg?qb;?2o)ic`^cigFl4 z4NrBXF0%SuSy`cQ?PjYUKlkq@#KFut0k;Sxra;^GS4XO($d<9r_iB%g6(s0+D9e6~ zeIzo95s_Z>T6~w)!7Bv)pVJ^mZz2yl#C2X0u@vVDKqAo~NqNcgI3@0dl3tYs|56$_ zK0f|FaC8N+L?{M|GA0Kc0%}8*c!pCf+hrKfVd#Kovb{o@GSu0on3TnD1y!k->7Lkw zd5SdI|GA+2u;+jM*PJ&oTOj8;ic6g+mQn6YOb2>%;=yWQ5OW2IGNB}Y! z?rT=nSh>C_@;y=eUbR7%M2tHTTkKGwubZTC9(!@94n+qzKiu40UJHY1wY`*+ohB^F zGH-=2omP3CWF`yae$k|rq4Y3LsiexMn{yU!vK*!7mre&9(r`8WV~6ddG-tLbSRM|K zf1>5ZPi0@#3f`$&Tl!Ew#4xsYe(CHf z`8tOFw=jf}htg`i^l2+qaC3HfV6p%gC5p})kkyY-j1ZJIiVB5vV4%+-5zQ1< zdlCD@x{Nm`YGt826hSUxA3GheQMisbPZoJUoZxA zNjTKW3u;v@zMJ`)tMIjM6=T!9u0>o1wPDJ>?4H<`$lrZ%7@|mp)sfjAx%_;{jWQQ8 zW!uD3#u3Ei`%H(buUmp3GnNiB$PD;tRs*fz5s`Xmm)6o z%<64P%9~+m-*nYdE3J~$;t0l(FZn(eBz*x6>Fz@db*R^$6=s!+D#s8ZTc`O}j4~J| zkKl6s@>Ljf<&Hrid&W)<=<;2~@hyfJ#_{bY0nT>d07qQnb>w!PqJ~rSOLFkW9aBBK zwRt8=%Cez&`NCLECuErcv0fAIAVHQF!;7jqyb*rYpiCcm%^WfoP%cJq^2$9@AS`>bJggjV9U@{j;2)GmdSu+ZNzYhQPEIhZp75grOAG&%CF)p zMc`hEVBkU0wO<;u>5JWlnf`gw(4UmO$xy=4b{z)#n>F- zbTU}R5KYB2u-$I=pm{(53Q+T3YI06na@$JdFl6Sc6h{7On5^K%W(_8?a}7sAGe9f0 zXW?y6X{)&AsMa&>8}}He#8bX)(y(;H;iT95dVBKqmipsy6lkLq{4+Kzd&B!wt3oy8 z|1g;MJe20WcliI;O(Or&XP^J?U^vj_|JmRv|No;rCix$wxe~mWd%K8>Ew!Cp#MZ2a zLqTc&Lmc`_q)W+<$5vSNk1-{mVXiR7yF!jq$kvGFHOp@gS&J8Ui8{tp;Ckq(xV39l z@l#T_titrAyGSujrvNP?9d}euqh{1~2!gZ|MQ=*iuR2D*D(3!D(%JB|gj*Pd^oBWB z9#|ILBBdS2?C;Un+211vINffS?6i%8Pd`&Ge0A^cK>4nid=S)Vi=w^(s&7snW?~D< z!_4*AZek_`Ih*$WhIW(?A3+{p=V=fvi}=#YCW9f~qFoilG}yu%)dhL?7}05;p3nU> z-v672|JfV=cTlqb4W9Dq1Km5^n zwB+zwV=ps!{T^c0x!z>?ON5fMIN3>7vtn1{{<9Pd4C_roq<>|D`y1L(ZwY=jz89mS zG2t97_w-$oq6|fO;r-v0RYv}U(o^S?%E8EiIt-M#gIlx%u`&$RgqQY&FOHPJk+8$l zOzi!p&8VR0K1$I|t2wEp&F+h%RZG$|Sju9Ff*=CHhqK~qR!O&F#+y9!#Y@$%UD&^s zcEF)<$<@i{N@SD7kj~z9BlmKV#%mExnuv9kJ=@cxXAC7WIocy$C^^-%5zQ&>>pu21 z>&h170m5PIQ){Iy7C|X)_W%z)*jCPr#~I)@qb67 z;Zy$qM|nt&l{0!zOTOSiBX|SorLh$3(VF-{niucm^frv4?`8>N7r1MgU$s-5;Dd18 zjB=DNpog+ECV`TcNK`9a@%AWlw*%LU0@sVY1=gi`%yrV_KjR<*&U4_jfNim()}=wi z?*9&Kvf27qqFvQy0DJxahW(QN-{2|#+oL=*$5I%^@4??TbHr?9EaOW|?Vvu2T_WnlPgK>y1ae9QYApzy+uv%1(FXVOp-KC(f|uDh24+1+v(A38}&*K z>sEA%UXOJc%L$^Tiy2Z7_qGE^wQpx=y+!F+yiQ2`z5g1xgJZ{FjoV96R}JOBFqoqp zDoq+yP0H|B$h#H9$a31=t{FLsV4q#>thZj5lqh+fY6`Mj2kFKXI`v7yZ2vUl|Ll%N zLkr+O{@*YA{|!e^{(q11$nqb%uiQ-Z<7XUr@$vX4WVTeK@Fd?^XiV#|iQy)Y%x2s( z48%Q663*YrDNmx^c-~5}JIhsUp*6~I)-Zxg5I*(l zLjqZjRdSUhUeNF@c+jovNoFjPs{oCEbRm0D=(kiPSC5~xs7Z=XhXK?Ja47CJ8$NTj zfqqhaIXc#RBZXE%wg)Shr|EKo3>?mPWQbp0T;sAqv?K`{JMO{x0;F^Ypg>p-&y39m@-ASxfaeHo zGK^;iAVHpCTRmk8Cn0ItM3sI;hV&kE2)<*9ARcJ0mB5wfTd9aP=Xme-&pS0Uo?g$| zo`QBnU2^o<+7Osx-k1Do#n`h;a*Al6-3DWrn9GzJP%9O2*@@S>3Zw4rGNB^UHAt(~ zTZw?JL}`j+e#m4;JiW;@XKRL*BGTC&=E&q+%~l|FRN^@7??N(7Q4$jW`u}i%^Ui6` zUwE%{w$4P>Q_qVxQI1&x<{;HQ$&@-5+Uk|ewrW9_1_e__kI&VTk)Y&4*s(#4)S!~3 zsVf2`iTe~a0a*kM^PZGXo#!;TeVTe)^0A}9=5v6Z-iNTN}<)dTe znBTmQk}%$_#Zjzg3VK=ke5ZyHvIB-_9Y-0mz$IU=QDd-K4s*2Fgaoh&@--`9g59mS zR+|F|wlEBQptpJWb=Glg7@4@Tb%Vy^>d-m)AHZ?R|Hb_m2P}T`qkUW6Z+=v)(t-=P zmn;#(@h>PQG`;w@`~9B5}0N0 zt1`ksoCDYLGyv)z%uO0rcnhYK_6r z+pA@`X}11(NXUn@{|<+9I`+LDf$TQ;^}!bFUxT3#VFYqMjaD>b4kB&DxP)TFO#5mJ&Z z!vemImJ;CFWDMcFOvO^OI`|42N|k}bk8o5nhH!4AVo}pLNsXUX>KcnQr8KNFb?q(H zBYjcdJdw@#RJB`oOrT|cs~GJWAbqy$Uu?tjdFH+me$#QNyAq6zRWcRBDo~nbw5Cyv z3Z7CV0VwE95?0V;B8wjf7qOQI9fM%eN#4wk&@U^8v1A(>?hwIB1u5@(1(`%!YNct z8N>D|C94s@47WXt{Zh_UA#-_@@>vaRv)U|)7{4p*r2d?imZc!J8hnP6!q8?VlcKO{ z?GzQz>#?YOosd{-dXttesQU@2U4?@YXF^l!PN6j>gx@mmBIty55|qRy{nMijeT}V& zg4rvH8DX{`MU$AFwSt!OkBez#KHHb_==R^j9Yz$_k2rbiO4 zWI`;}62(^^ZNImDTPBLz3I!PA$by7=SdJd__SM_4&|&VIK_3arfKfM{YTPfBAOb(%{8R!_SZ# zkHMfnv*PB(>v<4SR}N~LC{l`+z=wh=X?az%gGnW%jAnKxVdP7Dv;BvdLvWMFYnTTf48t91guQSvsdN4`V1zgzHiuVy-k+KYwKsi`>bF6T?E&GXZ_BbewoHe zRoj;Dym8CtqIGkD3K2}XsRn)D(&HB`0O&zcYeDdF2P_@0iG&KmhJ_%xt^3M+cu~7v zgZ8w(s*|9yMPnDm`b>i@j}cA-qG-HM=b$<(Wa$*7xFF>mUNmy5$eCFrxO5w-h|m2t^6f%6t8S%KH{B!n6w&{iG6c_O(6ENo#EP za>HWB5D;xli7^F7XOZQ=yww7wyw+@@WWfg&Ig-6rIE#j*0)uli9SC`^@&=s;DqD5w z&+?PSoSN{l-iAkEkWOR1eCJQYFfr6`!eS|xt+ZM_FZ@BZ>V-8?#L`(a`9^5Fc_8?}6gkB57yZc?wtn2?LPQrWd zu%ww3Q_S7Lb+tR-9{=CbXr{-1o{XnY@jo8rsm%YLuaK4j9=}<~n@Hv{;GglFrhyMK zkZz)bIaycIlN@Q(=_LhbBbFBBB(ZE;TV%vmQdHs$>qm^WnrEym z;*qY|&MLdQyhn=*m6!cg8F1xwtwZ`oQGFSd(xoR!d(^tb6j+M8{aVAPPX}EV-dH2? z0RX`oF4_HW)^ivpL4?lndpAW%oCSHD?!c!{Cze7v6j_CpAz=~tH_>VKHbdzN=#v+P zLHdMB<>W04!}$Fr|MV*JAe}jK8CgK!X*01v!v6-K3r=6ZJ^&y^8A;zPGV>C{3P)ai zl}!XSlMUl(3nQO4*#%B-9z?xt zQIEIqpTJwKV;_HC{>OXu8~FGU&_2;J3mEWZcH1OkQDUEyTc^8tg9kps{k-_@dOHTE zXRovWO*%*n5=}hI5)`3#m)RV(1 zt(vHQprm6WpR>(e{m5Pv07@kc*guS{^zZnzkpI}NV3gLq2U0En4f=!eP?P`0{o(XU z{(Fq)j^0VS!Ezl8A|M8rUpewY5a~BtrHe^+ISzw6wL#pvV+VE-(lQjHz*p zT1MnO(ND}Yacc_GQnK3J-BrjY`*cMGN0=@dtHysl1a=RHo9?$@7bqJDYo%7gV1c}y z$L$y5=lvn)SelEdva?26h9{KRoTQIG7T-=J(l!S!O-2KFX&#$Q8z|bIC_DD$_vbI! zd?VIGWeHShTgoyjzMgsh;VXe*`L zlqD|~mRl!Qo`f9CGXq%~woU%}E{)gqFu)}XHSJCgPR=q;{SED|(4weDR=;>()Ri*z z6g^U4P!(G5BYSu%99vzCy0NN!Xu>LbJe8e>xcq(};&R!hh%0sXBd)z;!}^i4yn^8! zm8zS3?R*eBLs{!4ZkRHl2pSE_dlm~O;at*aM_Gcr zV6h_&_9zIf9inI(q;a&y6yXkIrc9CIhnaVyXlqcXZt=3BnFbW~MYv2nyVX93Mfhx6 zQkc}!I+aYS0V+kmZGsf}z%g|%qXC`B@mRb7YnWub27pp%DSjkq@XL_&FKGzrfIKS~ zmylnR^s=;@T@8IbeF96-?5Imbq0|eGqZuM!$|kUwS!tjp(Lk&lzFemJRvUdQrIw}* z*cV_KqMo$4^n&HqKQvIYqeC;ud(V``XCS7sdsJapEK4@%8f3eYuKhsKmhT$nlNk0< zHO&IX$|ZK(1>#k~i4{Iv)G@MOd9DB>$M0JBz1qrNKCez3BUvnQmoWPE`dd@?QW_^7 z4}1_x;hhVukNGsYECP*LekPo;93;AcA{)&LU~C4PENW6KHc`3?=`@}rGuFZ-toO|U zpn($TxyVhrK^Ldj;QH+J^((;RdH8_1wnmGXb`qB?+nX^DH~@-=K=F~EP&g!JAMueZ zImLbyM+l^->`74o5)Ns_D~svdY$t!#-a!6jX#1l)E$n|u>^F-5v*-MG+Aqg{nvS00 zzdp)C?SBV1D-s@qn)8A@h@%SopLZi`TZ{kXqv(~L1G zE4?@Yzx?9?o07W^0RPpz5$R8QsCvz>wnQvVRH0MopKF+7mnrnnB}xOrE8@r}m825i zmkLrfl zvo-J$Y@*;d@DXHjnv*PA9nCsYoL=!%i55_*ZBo*l3lORc4k)|f6pgXqpk<&X{ah!^ z3jpa2I{kwL-J~M3nV*EuPKvDQ>sQbk7 zE2ZcV7h^;9wy^m&g_e6l_&%yBBUEu9Vb}WDg}jQbo|IH}`BGsDgT{enaShlzTD#ly z@PeieKp$}JUW!F+>OjvA)}$NWcl_3x=!eu<(u-%}&Y?~q)v-!CjJqq&TIG9!hb1qc z;-h3qRwM1d*`(B=KLdVDR;cJHNgC&|7l+DQ;`M=klfF7X+}vC`#I>XR{@V26=8Tl5CnN0b z3Aj1CES=yKUoqlkgvz%u?Ld`n`GGR7x8eWfwB+IPe~+d!-T!kmnmpxye3Xase=?$g zW*Q9Q2!!!6@al1Wc6280+azhQhUt#yMPz!o&g@I-3H#u(>LSOj43l5tc8ccMO<%c1 zc>|K_F?)bonC%;7WhsPNR-j9Z6}TPJ13LDVT90e>$l+npH9R^U<05`WsC%Gke=FCQ=)lVCj}|KJu3B?)Yy7k0Na{i#lqxbiGnq_^S1D_f-rLtx zK+$hmf;^K8#8BB|HHX;3lSrEa%D{I^-V6mwb~2 zj&Ev3ONnKHNH+g!bQL27C@JkecxtY;lO`*^Zq;Ue5#E?x3>TmZz zwJ}$HW53&lQ^i0%olZQ=(|Z4JU;x^)|Boj#-T!YinM|Jc|HpWU z{b&FFU&|IG&XqO$HD`$OPHz_ggho}owwStQE?KZ`eP@^9&<$P+0>zc>t#`qLlB*qh$PYFpOJQ-CC%`$hq+^htt6Ru|f1%gG zI?zw`jE#uGrgq3rUiL)muEC-?E>kj2%j<7mnDpiuD5+$XofZdx^f#TK1^bsE8?D5Y zG_)4|`(j^RRq`y)8@9Ln82h50^y;J>C1D>xOl6@4kRK<~bTs(sOzom^<-*iLP4b_# zwS>#)#l=veY8xb54khJ&}gxcQ|dXAtl816JD7pBt4H9c4`c{!Ob z0~<5Tmr$Uox<<(uB83G9*oCzF9L|4+t)r}#gQ z@)+Vj^1F-~fLMa}JNJ| znHNW)OUz90b|xgTZTIV~1KcY_F7UgAnL7-G1Nb?q&EJD)JrX~XNEJKEy2z1k8?RzQmGukVEo}_3S#2e}-700)m z1UTD)100Hg*1s%)UeQSc$l)yInLodTS;kJt`O7qpbM-at4i`Kn42pwu2I&Pj1XRb8 zin+MHK%vX0h66g_BbZOeKJuj4;6?j&fZ@Vb5cNjMKGFL195A5_iahoDxV>XVYo?mY7Q9JAMhkJ=`dfI?>wUdF`Fi_* zzTS3OD<`8-e@aa5`T}GBzRgfdFS#?M)wOD=^%CZA4l@M!_?LRQNy8}4vSwKR?<@<~ zv5#J`Fo}54e;zej|m;(<( zCEQkby~AT^K!SdF1Oymx6AJ9pXGDUE$Zrz(+Xfxn8KdSiNMbxM1w%TNSOkSASk!(n zSByyrP!iXu3(Vc5A#lj7#2^|?$QEtjng1B=;FW7=r^cdf*_fqc58j{`uagkvNNwwP zWckg|$BR-${d2J^2``g6_lG=*YNh}2O6O6K*Ej~+cmHEJ)%`yv{r=Pak4Je7`XATt zlGx99Dmp$%fS3q7u!36zAn;KLcgP2rjy2W1(p}@mT3!LckG+#Md%5cm)_zF)fz3~QMO?bC93<{bVi`e>KZ5iC#Pu^+^^I!p6RvD$YlksS%XpPn4 zL$&T`tlQdXSQmG@`S5q>%U)ArB~N@9Lt-6>Hd~@bbn{esID*x%r%5V~)U%dWH50Hz z1|^nS15gdkYWncBYpJer?O|H8nb`20_>4{33~isMS+lwAi({dU`(?4ieb%M^?`V;G z+^3cPmm)u?tNhit|3BzYb^UKJc=G>#l;_LR|H#C;kLpJN7_~kM`u9@!NbC34`3f+5 z)INWHPL!6DBH5_ZcQj&<{|kotV9Fr@TcyCM1@e3#4hd`6}Y5HP1 znjI@!v_$4T8?zX&hm-i(Qg|3)zY@Zy>D z;0@Wt+y;$330ePcPfhu6lLuked&i<<293f$?T!CG9hTz%4W8mZJ^9j7PY zJd$41Zl08)x3I{F^s@>{g)7}Qd5?nSDn9`Og->haxPqyFuW`fxKJPfv7H}1Q zHKqPA%29%EP|B~?bpJ?WSuuL|7&tLzc(FUcp{wPyjG&|Dt3tm4esPVoDPIVy$2D9D zpmb4)Uvnb!r3qA8LxF0DqiEuQN$hj__we6Q9yA}1B=$9a=*8E>U8=jgYlXawiXBOxAM`=##W?CAKxIIGQo0y+5su?U7 zCCEGg`rk0SRSCiq#5CN;9&R-%yV~!w8jEf3@m6E=4Yq4ubq}}ZN-1b-Ex7wHH^X9U zxzuVeG_A?MXE|CG}vd>2X92+R_6^8q!|)aDs-kr1!}gkFEbT)BlOLW+UDI z|5qpe|6ru&{~OMRPx}93JoWT{nK$Gs1dC`pkAbL5|ZO@@Hl zZ<DI}&SSy_;|TaD3F93Nw45>ZLslnQ*R0Yh}Hq3wTk*)VMTmM-er{tDXBL=W%{SQZD{r=x@JbQ}&{3uUz`A^<~ujzaM zBt5ZdH{}zCB-ALjP$_bfSqzi|krl!qsN5;FwnU?H0+=#1y~X`C3~h=$uOH4Z z8e@@z_o zBZ3o16reHvh&smb>B^oef1IuOcX^ua|9KK_S(ecT62LzBf7&m_f9{W;o$|4!pD#Q)}SS+(%RykX^U;IhK}dlkod)fzWKlZAA0M5xTfyOEdP2h||9pCNaendr3AieH1$>kvFGoH&yt@Ok z^_ay0p#eWS&p|>&8{9TyjRB40o~LoN40j+!7=6r?e2~WgZsWi&Q!xVpIetrHe?xOI zqG%hWakNHJ?jHO{5G`V`%JU>U>Gk~B%iMX8M{pguUcBxVS^ayf_cv6aRmV=PPgt^BkoS zv98kb2JcrW0`pA}`j{&v(7PpP5C>lYa#M_De$GI)LSYE7ZbyASf@t|1q$q@Wutg-O zxbz-I{=ruuLM(^VVUnUn@B#TWu+jhOxPWAeiX&1JqXZI^f-s1Xd*Hsjes`V6DLVKH zoRJ9%emc7bevoDd?lQ=GVWVn}qCr*}*q% z_C7iI#+}34gKyk?jsK3*V0rM(|9kKi_z9-uKGgZkSJ{D^r13wImmj!+k6@1$Pvd_c zxZBK&eboCSFi`9IKl|bI;`>*x-+b?`{d=}iz5XY|*`Tkl|Nc|{pT~K=0%t22Em0UR z|7)K9_2A&(zaTl$f5D`!?vZ=!4#&=4|EmZ8dhpd(Ux8ng5C1si(#SH%SDQJJL-KTk z*mQzPLgrKgQ`D1dj$GGOAa%guus!DKgcT~~ep{>8e*8Lr5{T&+nTX&3A@+^W6j1(lPEv3hxAw32a z^cdLaQLhmbJ^C6w1~NTH?dJTbVV_4;eeT=(+;7|G!LioozTD?wyFL$&n)P{bWbgCf z*wW|0aqB)GseK+C8~e;AG83mj7OxTTg9W*Gl#|#wV3US_$;hhbk(&ACcx!i#Y~86x zGp##0%JS~W9l0~DOGk2-2DV`=#*Gaq8NPl)Hr=ma(}S6rCovUuV;K zx?^fQ1Q{ZCgb+wk6mLl|g*3*pB_==-IW4? z=%_3zDeoo3CMCqy@fHCXhCmpjfVg%^)X|%>vnz`2xZ&IzehX--B;Jit;pAE>X%}VNDpp3|WU@ zT5my%PEDtzQ)Xb}h7)&uTm`I|Tsa<(Du4}}ar^ObRt2mfW4|Id2mW2d%_IvA8uAVIYf$hBfqnGwVU9ViO<-tprFx6-|*C$U*rwMk)IvVQWG-p4bpCvvZ_plJ%CV;k*KXFA(^pqvfehta9Jx8;2&?a%V z7C5yHy%0AC-BG`02U~GjO9ySjS!>x$6U`=42ZzVH*@LD?CMj(J#F8{zBjV4SA}>X_ z>+u43D9yVWyY>)AoG6qO^$ZpTDTa1Z*hIM2b}!BBHI_-Cs}>2&y%m=xxB?gk(Jiv7 ze>S64dz+Pt??}eiYOzq~=IE#%wfKOHj>Z)x3Y&$ZwceoFCyX6r1Hu@(?tTWAcotHJ z6XXLgPE+LN;g0pbnWQ~Bs*<#A+iTn2YZj@2+bt-*dDbV z+aq;skJPapl(=pdW5FYSPjw#Z{S!n>5JVtD={E4N78F+4o{lVochq+9X6oP_se?Dr z2d}`MW(XGOvRf*6n_xZ3TsC|S8Pm+lm}ZvYo3$OjnL2#4>fvK7hfdpdkmc|e5myqC zJR7WFP}P|m?wZ>PqIF)%?;mYq*%j*UJjzy z1m%kcG$(k*$kK3SPpvC^YLTa=ZRM${Do;&Sc}kxeLByn{B#q~YrfVV;$b&VCH#G74 zdjxM$3bI|6qjhHMhgle!wiSk^sxUNFgdzL!khc3w8ty(5>+UnPNKezY($iFxo~DZQ zG?>=x;JBGMI~rTX*{MZ(nzogmrYeV?D$>)SrnO=;YG$n%ji&Yvnz`__Ef=1uTzIN* z;i7{o7Y=vCnUbB|(&HPNjou4kuoj-RWECb`?=Otyj2iAnBkOK7wQ%BTTTVPtmGG&; zi6uHn?3U{*{CF#bJDb`vv8dFOwkq{RRjDV6NMM-#W@@zF%xgeUG)re#Tl#zRk!MlP~c6sSERY>t!OxP#2_^i=-j#4=TWg5r12uN@1gLxyLwB5)j z>P9|MHuAbhZo^qKNo6>*N-7h}Mm}k~kx$f(e4=dR{j#KTO*P{k`2OuVKiv-F9af#6 zD>5|`wdG8hlo&_Nn8NU=f+?6c{Yl$Rf1+;s6J^sk5CgM3==&rh77PIl1DIuq?)$`q zfWRuwa^epw(}vQa*`_c&vf6DYmQ8=scGDm0bm$xDz*lY%<>b}^vzwsHpU&v;<6pZU zE>*(FgvfUZ${0Bsa=#<1EI781W89V;Bh8m-yoVmAzR!oBnH@;vFqi=dUdPb?7KSkL zPzp{lU0C;`!PI4!?i&~-1fXI(&ZkGXB-B{T0 zqbyFSi8P4FmOx3+Oe`8st%~c&<`p$+?G-iByrM?3S5&_{v})(-I z{9uW)98+jI8_gEuDWyik6Ud?JQ=vG~k$Yl?a#4Tc(ZMiO-lKL3~Wf=&087Y0d&KmyYo44(t&!-Sko zUYR#0+WTFjuyRD8pIJfl*nO@7Mn24P;MO! zv%rr(v>uItHX1{DH1xCRvpCrSHDrieItR^T;H`qtr#ZhYcI1)GcWTtqcZ$^17v8|! z8773IQX_bx|S&~tlugEb<2A07VMf50X(C`>#U_V9~*}SMmExo94 z&0~!`eVIHnZLI&VO_qZsjkkf10K08XJMXR5u@4q7pvP%&lg9~4*8$C=Kq)b4rqK*0 zR*hz4ao`%Yb>JGgngDw&lc8*{#+uz0rkJO&X+brbJVkIF1`z`O9Bk4s18`||=^j}; zqDE~!qBLjxk>nA@dSOPxCPlUuA~hLuW+bLqa@=Gf?Pi-aap(9t57-fOcetoBO2ZD-kxU&r{{sX(ke`K+Yj@nvAN3JHb$s(Km-j23!Hng7) z?5WvC9yP#u)96%F&C4BHOMP#u(^Iw*ED%!4v)J17I4 z8vQzG3@p?bw57&CrN%&|hRqj!V4=pKEj9Y?V5H*FuY*V5rq}gb>veriuj@;CUH_Om z_*zggua|ynrKYbbHGN5`*@KFCc>1kH?!GE=_a%|L8WXd~+ixfGGP}e;m0bFT+>3EJ zvf^SET>EVW*S;#a_6xxkqcOFjVHRBbZ3Wl9D!BFw!L=F5& z+sZ+GRSxPGau7ztrcLxMa!|jW93%xEOR_XzlL^p~6*7#!|U-U0C@2l0Z1u(Ec^#0h4tg_@Zv)Xa3D zrqm-`KSVhq(GSVh#!a-zkS}^i?Dt~Dp$N`H1e6ksIK}j^_0S|N&Dsh}GgUyDX>wAj zd#q1!Xz?wVZf>$}uyVc3OM}F0AD>y|ompFXXQs+KGfmzx3>rPC*d~$gxnslEBpA)w z3Pv+kFq&zC5y97thRFg(-nT_#tfDcgA{*m9FpA=wTo-yBWI3JTP)y26 z5LI55rYG@~n9ck#j;T8aY3+QSr16$`IFY{)@FO~~c!{uR)5K*s+eJD25U|l}iG zZlcrdB92I~>O7WsknZl9^NW?lb6FdhW(vlnLcy@fdaXpgsXG|!BO{A?ec`MjPtz-u z<>|)DY0wKY*@GycuH2G?Y(c7GD*FN7^_t!1I<{TsqCGIsgnnpA6xC~jf-;gtY*BHV ztaEx_LZ)WRDGszjoHcin4>H& zT$cjs@q64X^2o6*@CZZD+UxcMeyn%eGT>^2fK9?~lEaXg7ZiUkACXJQBnAxh@(m2b z9iAk}rzB}67?JyaZR5XMGSu=v4knYq^eO)DV?1AhbLO^B z@_8S8w~44`}Etd}R?*T23PxPz(N@AiKs zMPEwX?BL)dxGK^^d?XoY!AI~DO0jebJ|2ARO3z2-AN&`AcrLDIk$w;|9UPFb>p=z} z_yL7$@S2f@-c~H~R^0q>ehtokIK8?7=hxuk%?wra&X1RON1=k3XZvOIfa2wblcMiJX ztU&2yka=;p20%6iBZOH}a5oP;+>}^OC9t(>avvHK}0wM zOXt9tB4L?iO5+|7oAP{D>`S-;K_-udr)vfyRNUGpmb-Wvcyw3bl=%q$hA?-(*(I2} zbL!#0s8v_y^<^gCRrY{`kCI+=R@enTGCLsn2!6f$^egxXt`p=1iyeT`&ZtUdV1-h0 zxeRMk_+z>QL5|j$3tmBQW!As4RlEs(s#OPhMhp?RXy?*xrU+Ev!3fN$W!?o0Ypl^o zcw$yQM|d;;NH`-mc90P$GKS!p0YhBB8%LRoi{c%J!l!!rCPh9Vd5h?5AP5zWx?b#4 zCY1H4ywRPN|J7h!*j4v4`g1 z7d+Mc*kd~%AGu zpA$N#3?YmN4O^9@$U{EK&RhqzYkJyNM(x#yAS2g=*m)cqc>G4Ezzx?K0Q!)S1DJs5 z8gmk)HNz8`FL(rg4g7a$27j&KOl}ZisVb|n7GVTfVabZAGbLLy>|(K@87$h$t%x9Q z%^P_ir?)}0d>N!Fk$aB3GhvvlB=Ccjom{gu87C-0KD$FAHB2;%44l)PedIn3ofR-i zXl1_Fv-P}=H&LFz6%$bP0Mpb}m}ddASVvfjGHnt05m3^=fkQ zB#qZO48jMPDgu-=RfKR6#!D(>W~+e2n76VX<~X(H-1oF*$?u2X!%nw)duU|7y`CyL4D!RzPrqX0u@{3TNuA&WE`{0mWM08TbKv&bRQFm1d5px*tH4{)B#Ufr;hJ2fo3pJ_RoHB8F=bY2k5EI}-sxmf z%0u7BQY)PRbF{#7B2P)lJf^MFl?C&aOD1PwOV!pOUTrLbLI6i=CxdqR#^uX6&>)!mYCY z;-;>de0oUM3dxAjg&mp{l!ZZHLBBwd0TjiXfn#UhA;d}mk%FG*tTtSI8eQAV;$ z?02Ks zN4>9jTU{9WT^Qv-m%m|5I!uBHos+3(nO(F<<>V@WxXC6AFXJ%qGCx;lE;5=lcMHAL2Cl7p@y( ztp}X4iVRMnSyoOG*>Yo_C>pSKlSS4@%`--CropU{fY)f))R=J&4c$JUL-XNaG=%e` zF`P~3v*TmmgU81c@3`-e(R?zSP8NgFa5@|Jj~27z$z(j3BX2tEFBZe0=b_P24Yc?~ z!onKXSt{oeD|DE3_ROflFUv9q&bSy_#4(qwBt)Xco2ZNDon+nSC7Ccwx7PWt5PBsW z`7PRs!)LY|{e^<~3&Y7(ab@z8TX_1K?DeP8SFH2-l0}k7WH*BKVGa%Oidv)qaf6I< z%}~!A0(}d{dzHfs6t2iw9b{Qx{W7|*>4!Z%&(k;zQM!ke6{U^h7STtgaEuagCMXxd zDtkQkPKNTH579b~GL-8r+O2EM1C#ZRm)GlC$z(2Ar&mQvgEk#X5%H_VC}C0IBlvZI z+ql?}V5{*0_$Ujo@|VPZR<67avLKFr2r|q7Uk7Vq>}G&Q#K=tHUz1A^v@}@J;vl5u zHJCB+d3Z}4#@qy^c|cjb#P*^f>d zsx4MXoGP=5v`>`#Gnl}65C(aGv?c67-*--a`Nwm|PvZptMHcm0aac-D%JFv~*~`~K}YUe@Z#I!1?j4XVuHmwza`q!d(@lrwFWZy8=}m|-Nd72G&tDR2TF zT8^Y2#_Bw#{oCtrh5w?o>yo2p`-V$DOZ%)G{*`nt%4jz<5@U6eN+KC0H5*Cieeq=H8PZM5;lANC^HD6Y^}cJUIuv#oU?F~^2i*M633z*R2EOfp%hT)YpI@GUzuesc_lkvACq90kKK%up6$QwH zqV0ESyk@@ua9utYSbbxeWf;$4=q@&4h!=+t%PY1E6y-sR zh&MGB)3GMcw@(Hw$QTnUPa3&cod#h9VqSzZCz=IQ9OyCB31mE_NpxgXR$t#{NcqlW zO_uu!MR^*~w>^}5JzO#aU9g5pg3&s^#HCY|v8wnx;WhW4!_fD;tod#p6Uzz8y)MC^ z`##850aZytg5+* zMmnLOrVeXSMpP_W$6LW5>ds*ncn(>=L_mob6gyUdoj>L&M2p~7{&IVi5f+st&_jH! z!%ZHqVIFwIo92uNG#Qa-gw96|$;5L&f<`VRB?*dr3Yq$blSYeHGU0O|YSNG3Qusq| z_yt~7T;uo^ljSf&3EoRlM?nN*7jKByNt`hWWX;<}k>A~9%vPdMn(&fe`u`w*sB$rx ztX=d0u9FbCVeG+>2*`NpbC#!@4cPomU?v>=%*~M_P5y_;8RU|j^*jjp@|n~n*(gXm z=VX@qSnP@79AFmB{p|nx0u0>2xZAJO5ci+4@jiZbxLY*h{WO9G7uen|T2}6f4%oAD9!A zy1Y*aQVgYZ8{I6h__K%XrG}_a_Rg>w{D_4DQkzOwv>fN!^mr|ZXga{`IbJ{bAC!Bp z>vmjlPUNr@VPw`+A%_tdZ~)IGp@ZNYN8zscOlraO7Wn{j$MKy3{X8sBiDDnVd3`N* zUqOOz<9x+j`7U@$Xe!oW2E*bh@GCN$`6x|S>dtbReLH_cWmnxXgS@tqR z?%RE{LOKK@oiKO19Hr|Zq7yVueU$F^1`mS;@^+r?i}C5#l5ka&ck@zG?m z4OX$Ekk8%cz=ph9@2spB4ZM;9Yh1uTqM^zR{~imK#ft0 zeRR$9C|isU%yXe~;@5B}k-@Y($K@^*UKkJqrf~@<%`{j6tX`J_uh({|y*-Oz?v3DN zIv;w2;|Uzk#~zw^)7fI)_lEuB#ptL%nofoTH1|h?slOP)nLj<6kB5`_u{S=NkNWkn z;!8rY!R}iS{~vot*W9*^eD|;5Fb{2JM2V7ROV+fVN!&KgOwwv%r+w;#5CK}aP$Z9_ zlvC6E_Zuue2!4S2u;Ti1(L-X1;O+ug0K1F*FdN_Rc--^yRr|OanB~2rjan6qRj0M- zmd9+Mk6C>tIyg;jpk+M5b&Tk$O*niRfgR@qN@SojWI0J3^`ZmyV|%6SC~ao?`TY0m zsav&VG;F-G4hb(RY9nk*4C51$|z=NEkOnAAHW-SQe7NOzXD0}}0 zh&L72LFp|km4T|L(61QLgTZ&4w0CLru2_90=p0-jIsq>BZjlA_>CiKO+sLrPm zLtq`c6U+Gmr4?IF5C%uM7OqswoknJ-8g8Hthv9Ky-HL_LziOOtb#?WEYA<9YCMJz^ zF$~q2ocw!DSfP7ltchY*-zr6q+LTm@OEjn^`q8joMqvHqjNk=52X7O!qM?ZFWHe1= z!4~DJRCz(yfeCsQUlsi_$y-c3atcjIEL{;%8-~P;2w)J>QZ4LczPV1o$7uwSm&*BRrK6QP zp?*2Lr`ahnP|ZVVwH0l>70Q}2zH#`K<0!{mc-*UPZ#M;>dvgV*@#G}$!x)0gEL>qg z`yv>^?9T(vL|*{lP_2H|g1y9S{4VkF_Asyq-4cqedmxkA$}2yUG`JDOWV088=q*Xi ztfb@^LY}C)#CD2o@hF&VjtE2P#L%?(|AP@It(3MeIM=nTH+c;1Ty4P6C|<+-2C9pJ zosO1;qO8BQbpj+Dv`RD*MvA$SF1=+f)+8T&5oqk>nZb#YPHtHFN%|P7qj08P4u?b^tC+^XAzhsO_%^rt4N?pSpaPEsE4}Uz1gu zZ{3pLkW;L(h&kWBdG^{{pzuAx!hE@91z9~cwP=_-X(~}5m#A>~Tk?`1#VuACNhhO! z5#`C>W|!muf*bl55i~vrT7*!{0w*E}lK$TDDS+rq8PvE<*IQd7IBNKQO10YBC zN{(ogzJjdm;Xy~wIqX(sm8BwcgB-Uu+-)2Xn?q}XF&))x)FQ9#c6kTaXIa&Z`V*@LR`4JGxs+rYw((~6)M7|+jF7X zf%zW%@RpHWem4`IL%TBWrs@Hth;tNmYVPN{11ckJ*IjI*sl1VBO9qD*VNS5{m8rk? zaQ;Ch(oRPSqdIzruS5;laqbcZs&-e2I+g>xCCXQKqisXgjCmi9`@=HkeS+}SViYdI z#pQ4u`Qd2nUxj0TIQ7RE4KKnlnvTfCpNvo#MaW-Vq7V&nxQHerbm%1p0u)Mx*%2|XU?D2rqc8Fu_G6Vy@vx$EF*|0(PyFYdrUVZA&hxkiK6fqg~MT`6K!znzU=P66-Os>e!0D!%Qw}Py^39heTzRI@PBS}4BS)0DObJA*?e(0GpRTSch7X!S`o|0U8vZwYzcvucC(Vmz^t7CRD9<76I?aF82Qn|U>hUi8<-oc>~%4zvi0&Q@oLbexg zvPuV9pgbsFDx@doN^_)6#*B)9QDWjp^_x0=ZlaKJi0`e=hMY#IK-D1i%T-~@fe+-V}FRl>1Z(>lFM@+ zUrfk!dcGK6`6%?miwTLwy9iQpWWGRFzEy@0M+WS^Nn;V;Vtjv26Rg5*IjnwIKI_(Q zoBF1SrVXCNbq}yz)XHa_`th@-YP~1)dw?zB9pMFh$kah@J`0I&;8_=OY%Pn#wxpfH z*wK&W)oGKEzC)8RUaJ5@v`9BZmB&`wF$zO{VVDz4yF@X{x`T1x{RdRFbHdVf9yao| zK7SZ4C2UMzjo(rP(?b`;Ba`LnGxO31^_d z*ms^22SLaqm?aA+*kR=P;U^PG!hD+*!Y(II)}E~Hy^gU10fpd(u%V2~NOhEK7b)Hf zN94iYYnX4$2yB`}X}%JhTVtRF&|^n=Srl21~QvnR-}qSFC!c#xEqcj9Sh-)xcg zw`yP#k@~I^#(@#n0Cz{YwKdvW5@CzB7My4ewYGO5Ez%H(H{@ZihKcMA9I9&5SCs+H z%|765gP!>RhW~MUJr7{IgSS7 z@fa$>w^SER{!-hM^d2g=enW?>-3eD!6uFaR}8D906!u}!H!j<;P1I`m_6=QA41xUpxf4=G{aYl)GxlT5B zNtvsT&7`~Qw|sM5$j$X>ud>(n91X8m?zsjT&y*zJse87F{nhu6PI#+Vy&bg7MQHUK zqXgN+_g z1PhT|f+P+Ah% z;w;k-`**KgKT0#iZFy4zuKmcf{$~`&3lzS;O<$#V?6>5nJWuoBVFxCSrF78DYoNtd zsDxm)yl*)KfC!}zN~rQ$wMerxPVcri8CMyvbtQ%-d8%xK?Tuqk0LArs@KzC*3hGS*c zJ|ALqH5`sECTMbr!s%!-UHD{tIg0QIBY#Auh@kL%e1)R(FdCtY(c~%|FT$&<=wcX6 zcT*Q?Ei<4wf?sNP~>#8?T3uHpwE2o7UVz0 z0KVrW{@!K9HYRLINZ~qzAE3Z?SqYqfee&dqa}%P3Zz}7!U}tA%XMa1trp{~1D!V;D zOx6ijd6xNxIrDaX{sxR?W;KQJM^cD;U-MBbHUIRyef@m>eEod=-1qa}00030|8iKH I-~he|01OtAPyhe` literal 0 HcmV?d00001 diff --git a/stable/zigbee2mqtt/1.0.25/SKIPINSTALL b/stable/vaultwarden/13.0.17/ci/default-values.yaml similarity index 100% rename from stable/zigbee2mqtt/1.0.25/SKIPINSTALL rename to stable/vaultwarden/13.0.17/ci/default-values.yaml diff --git a/stable/vaultwarden/13.0.17/ci/ingress-values.yaml b/stable/vaultwarden/13.0.17/ci/ingress-values.yaml new file mode 100644 index 00000000000..2f22100f940 --- /dev/null +++ b/stable/vaultwarden/13.0.17/ci/ingress-values.yaml @@ -0,0 +1,67 @@ +# -- Configure the ingresses for the chart here. +# Additional ingresses can be added by adding a dictionary key similar to the 'main' ingress. +# @default -- See below +ingress: + main: + # -- Enables or disables the ingress + enabled: true + + # -- Make this the primary ingress (used in probes, notes, etc...). + # If there is more than 1 ingress, make sure that only 1 ingress is marked as primary. + primary: true + + # -- Override the name suffix that is used for this ingress. + nameOverride: + + # -- List of middlewares in the traefikmiddlewares k8s namespace to add automatically + # Creates an annotation with the middlewares and appends k8s and traefik namespaces to the middleware names + # Primarily used for TrueNAS SCALE to add additional (seperate) middlewares without exposing them to the end-user + fixedMiddlewares: + - chain-basic + + # -- Additional List of middlewares in the traefikmiddlewares k8s namespace to add automatically + # Creates an annotation with the middlewares and appends k8s and traefik namespaces to the middleware names + middlewares: [] + annotationsList: [] + # - name: somename + # value: somevalue + # -- Provide additional annotations which may be required. + annotations: {} + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: "true" + + labelsList: [] + # - name: somename + # value: somevalue + # -- Set labels on the deployment/statefulset/daemonset + # -- Provide additional labels which may be required. + # -- Provide additional labels which may be required. + labels: {} + + # -- Set the ingressClass that is used for this ingress. + # Requires Kubernetes >=1.19 + ingressClassName: # "nginx" + + ## Configure the hosts for the ingress + hosts: + - # -- Host address. Helm template can be passed. + host: chart-example.local + ## Configure the paths for the host + paths: + - # -- Path. Helm template can be passed. + path: / + # -- Ignored if not kubeVersion >= 1.14-0 + pathType: Prefix + service: + # -- Overrides the service name reference for this path + name: + # -- Overrides the service port reference for this path + targetPort: + + # -- Configure TLS for the ingress. Both secretName and hosts can process a Helm template. + tls: [] + # - secretName: chart-example-tls + # -- Create a secret from a GUI selected TrueNAS SCALE certificate + # scaleCert: true + # hosts: + # - chart-example.local diff --git a/stable/vaultwarden/13.0.17/helm-values.md b/stable/vaultwarden/13.0.17/helm-values.md new file mode 100644 index 00000000000..6e6e12f6245 --- /dev/null +++ b/stable/vaultwarden/13.0.17/helm-values.md @@ -0,0 +1,54 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| database.type | string | `"postgresql"` | | +| database.wal | bool | `true` | | +| env.DOMAIN | string | `"https://{{ if .Values.ingress }}{{ if .Values.ingress.main.enabled }}{{ ( index .Values.ingress.main.hosts 0 ).host }}{{ else }}placeholder.com{{ end }}{{ else }}placeholder.com{{ end }}"` | | +| envFrom[0].configMapRef.name | string | `"vaultwardenconfig"` | | +| envFrom[1].secretRef.name | string | `"vaultwardensecret"` | | +| envValueFrom.DATABASE_URL.secretKeyRef.key | string | `"url"` | | +| envValueFrom.DATABASE_URL.secretKeyRef.name | string | `"dbcreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/vaultwarden"` | | +| image.tag | string | `"v1.23.1@sha256:094eae865c2650b033313228359aafdef5f00008b8f44cb856ee418270cebdf9"` | | +| persistence.data.enabled | bool | `true` | | +| persistence.data.mountPath | string | `"/data"` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"vaultwarden"` | | +| postgresql.postgresqlUsername | string | `"vaultwarden"` | | +| service.main.ports.main.port | int | `10102` | | +| service.main.ports.main.targetPort | int | `8080` | | +| service.ws.enabled | bool | `true` | | +| service.ws.ports.ws.enabled | bool | `true` | | +| service.ws.ports.ws.port | int | `3012` | | +| service.ws.ports.ws.targetPort | int | `3012` | | +| vaultwarden.admin.disableAdminToken | bool | `false` | | +| vaultwarden.admin.enabled | bool | `false` | | +| vaultwarden.allowInvitation | bool | `true` | | +| vaultwarden.allowSignups | bool | `true` | | +| vaultwarden.enableWebVault | bool | `true` | | +| vaultwarden.enableWebsockets | bool | `true` | | +| vaultwarden.icons.disableDownload | bool | `false` | | +| vaultwarden.log.file | string | `""` | | +| vaultwarden.log.level | string | `"trace"` | | +| vaultwarden.orgCreationUsers | string | `"all"` | | +| vaultwarden.requireEmail | bool | `false` | | +| vaultwarden.showPasswordHint | bool | `true` | | +| vaultwarden.smtp.enabled | bool | `false` | | +| vaultwarden.smtp.from | string | `""` | | +| vaultwarden.smtp.host | string | `""` | | +| vaultwarden.verifySignup | bool | `false` | | +| vaultwarden.yubico.enabled | bool | `false` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/vaultwarden/13.0.17/ix_values.yaml b/stable/vaultwarden/13.0.17/ix_values.yaml new file mode 100644 index 00000000000..70e53e1f340 --- /dev/null +++ b/stable/vaultwarden/13.0.17/ix_values.yaml @@ -0,0 +1,154 @@ +image: + repository: tccr.io/truecharts/vaultwarden + pullPolicy: IfNotPresent + tag: v1.23.1@sha256:094eae865c2650b033313228359aafdef5f00008b8f44cb856ee418270cebdf9 + +service: + main: + ports: + main: + port: 10102 + targetPort: 8080 + ws: + enabled: true + ports: + ws: + enabled: true + port: 3012 + targetPort: 3012 + +env: + DOMAIN: "https://{{ if .Values.ingress }}{{ if .Values.ingress.main.enabled }}{{ ( index .Values.ingress.main.hosts 0 ).host }}{{ else }}placeholder.com{{ end }}{{ else }}placeholder.com{{ end }}" + +envFrom: + - configMapRef: + name: vaultwardenconfig + - secretRef: + name: vaultwardensecret + +envValueFrom: + DATABASE_URL: + secretKeyRef: + name: dbcreds + key: url + +database: + # Database type, must be one of: 'sqlite', 'mysql' or 'postgresql'. + type: postgresql + # Enable DB Write-Ahead-Log for SQLite, disabled for other databases. https://github.com/dani-garcia/bitwarden_rs/wiki/Running-without-WAL-enabled + wal: true + ## URL for external databases (mysql://user:pass@host:port or postgresql://user:pass@host:port). + # url: "" + ## Set the size of the database connection pool. + # maxConnections: 10 + ## Connection retries during startup, 0 for infinite. 1 second between retries. + # retries: 15 + +# Set Bitwarden_rs application variables +vaultwarden: + # Allow any user to sign-up: https://github.com/dani-garcia/bitwarden_rs/wiki/Disable-registration-of-new-users + allowSignups: true + ## Whitelist domains allowed to sign-up. 'allowSignups' is ignored if set. + # signupDomains: + # - domain.tld + # Verify e-mail before login is enabled. SMTP must be enabled. + verifySignup: false + # When a user logs in an email is required to be sent. If sending the email fails the login attempt will fail. SMTP must be enabled. + requireEmail: false + ## Maximum attempts before an email token is reset and a new email will need to be sent. + # emailAttempts: 3 + ## Email token validity in seconds. + # emailTokenExpiration: 600 + # Allow invited users to sign-up even feature is disabled: https://github.com/dani-garcia/bitwarden_rs/wiki/Disable-invitations + allowInvitation: true + # Show password hints: https://github.com/dani-garcia/bitwarden_rs/wiki/Password-hint-display + ## Default organization name in invitation e-mails that are not coming from a specific organization. + # defaultInviteName: "" + showPasswordHint: true + # Enable Websockets for notification. https://github.com/dani-garcia/bitwarden_rs/wiki/Enabling-WebSocket-notifications + # Redirect HTTP path "/notifications/hub" to port 3012. Ingress/IngressRoute controllers are automatically configured. + enableWebsockets: true + # Enable Web Vault (static content). https://github.com/dani-garcia/bitwarden_rs/wiki/Disabling-or-overriding-the-Vault-interface-hosting + enableWebVault: true + # Restrict creation of orgs. Options are: 'all', 'none' or a comma-separated list of users. + orgCreationUsers: all + ## Limit attachment disk usage per organization. + # attachmentLimitOrg: + ## Limit attachment disk usage per user. + # attachmentLimitUser: + ## HaveIBeenPwned API Key. Can be purchased at https://haveibeenpwned.com/API/Key. + # hibpApiKey: + + admin: + # Enable admin portal. + enabled: false + # Disabling the admin token will make the admin portal accessible to anyone, use carefully: https://github.com/dani-garcia/bitwarden_rs/wiki/Disable-admin-token + disableAdminToken: false + ## Token for admin login, will be generated if not defined. https://github.com/dani-garcia/bitwarden_rs/wiki/Enabling-admin-page + # token: + + # Enable SMTP. https://github.com/dani-garcia/bitwarden_rs/wiki/SMTP-configuration + smtp: + enabled: false + # SMTP hostname, required if SMTP is enabled. + host: "" + # SMTP sender e-mail address, required if SMTP is enabled. + from: "" + ## SMTP sender name, defaults to 'Bitwarden_RS'. + # fromName: "" + ## Enable SSL connection. + # ssl: true + ## SMTP port. Defaults to 25 without SSL, 587 with SSL. + # port: 587 + ## SMTP Authentication Mechanisms. Comma-separated options: 'Plain', 'Login' and 'Xoauth2'. Defaults to 'Plain'. + # authMechanism: Plain + ## Hostname to be sent for SMTP HELO. Defaults to pod name. + # heloName: "" + ## SMTP timeout. + # timeout: 15 + ## Accept SSL session if certificate is valid but hostname doesn't match. DANGEROUS, vulnerable to men-in-the-middle attacks! + # invalidHostname: false + ## Accept invalid certificates. DANGEROUS, vulnerable to men-in-the-middle attacks! + # invalidCertificate: false + ## SMTP username. + # user: "" + ## SMTP password. Required is user is specified, ignored if no user provided. + # password: "" + + ## Enable Yubico OTP authentication. https://github.com/dani-garcia/bitwarden_rs/wiki/Enabling-Yubikey-OTP-authentication + yubico: + enabled: false + ## Yubico server. Defaults to YubiCloud. + # server: + ## Yubico ID and Secret Key. + # clientId: + # secretKey: + + ## Logging options. https://github.com/dani-garcia/bitwarden_rs/wiki/Logging + log: + # Log to file. + file: "" + # Log level. Options are "trace", "debug", "info", "warn", "error" or "off". + level: "trace" + ## Log timestamp format. See https://docs.rs/chrono/0.4.15/chrono/format/strftime/index.html. Defaults to time in milliseconds. + # timeFormat: "" + + icons: + # Disables download of external icons. Setting to true will still serve icons from cache (/data/icon_cache). TTL will default to zero. + disableDownload: false + ## Cache time-to-live for icons fetched. 0 means no purging. + # cache: 2592000 + ## Cache time-to-live for icons that were not available. 0 means no purging. + # cacheFailed: 259200 + +persistence: + data: + enabled: true + mountPath: "/data" + +# Enabled postgres +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: vaultwarden + postgresqlDatabase: vaultwarden diff --git a/stable/vaultwarden/13.0.17/questions.yaml b/stable/vaultwarden/13.0.17/questions.yaml new file mode 100644 index 00000000000..f906ded41d1 --- /dev/null +++ b/stable/vaultwarden/13.0.17/questions.yaml @@ -0,0 +1,2213 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: vaultwarden + label: "" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: yubico + label: "Yubico OTP authentication" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Yubico OTP authentication" + description: "Please refer to the manual at: https://github.com/dani-garcia/vaultwarden/wiki/Enabling-Yubikey-OTP-authentication" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: server + label: "Yubico server" + description: "Defaults to YubiCloud" + schema: + type: string + default: "" + - variable: clientId + label: "Yubico ID" + schema: + type: string + default: "" + - variable: secretKey + label: "Yubico Secret Key" + schema: + type: string + default: "" + - variable: admin + label: "Admin Portal" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Admin Portal" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: disableAdminToken + label: "Make Accessible Without Password/Token" + schema: + type: boolean + default: false + - variable: token + label: "Admin Portal Password/Token" + description: "Will be automatically generated if not defined" + schema: + type: string + default: "" + - variable: icons + label: "Icon Download Settings" + schema: + type: dict + attrs: + - variable: disableDownload + label: "Disable Icon Download" + description: "Disables download of external icons. Setting to true will still serve icons from cache (/data/icon_cache)" + schema: + type: boolean + default: false + - variable: cache + label: "Cache time-to-live" + description: "Cache time-to-live for icons fetched. 0 means no purging" + schema: + type: int + default: 2592000 + - variable: token + label: "Failed Downloads Cache time-to-live" + description: "Cache time-to-live for icons that were not available. 0 means no purging." + schema: + type: int + default: 2592000 + - variable: log + label: "Logging" + schema: + type: dict + attrs: + - variable: level + label: "Log level" + schema: + type: string + default: "info" + required: true + enum: + - value: "trace" + description: "trace" + - value: "debug" + description: "debug" + - value: "info" + description: "info" + - value: "warn" + description: "warn" + - value: "error" + description: "error" + - value: "off" + description: "off" + - variable: file + label: "Log-File Location" + schema: + type: string + default: "" + - variable: smtp + label: "SMTP Settings (Email)" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable SMTP Support" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: host + label: "SMTP hostname" + schema: + type: string + required: true + default: "" + - variable: from + label: "SMTP sender e-mail address" + schema: + type: string + required: true + default: "" + - variable: fromName + label: "SMTP sender name" + schema: + type: string + required: true + default: "" + - variable: user + label: "SMTP username" + schema: + type: string + required: true + default: "" + - variable: password + label: "SMTP password" + description: "Required is user is specified, ignored if no user provided" + schema: + type: string + default: "" + - variable: ssl + label: "Enable SSL connection" + schema: + type: boolean + default: true + - variable: port + label: "SMTP port" + description: "Usually: 25 without SSL, 587 with SSL" + schema: + type: int + default: 587 + - variable: authMechanism + label: "SMTP Authentication Mechanisms" + description: "Comma-separated options: Plain, Login and Xoauth2" + schema: + type: string + default: "Plain" + - variable: heloName + label: "SMTP HELO - Hostname" + description: "Hostname to be sent for SMTP HELO. Defaults to pod name" + schema: + type: string + default: "" + - variable: timeout + label: "SMTP timeout" + schema: + type: int + default: 15 + - variable: invalidHostname + label: "Accept Invalid Hostname" + description: "Accept SSL session if certificate is valid but hostname doesn't match. DANGEROUS, vulnerable to men-in-the-middle attacks!" + schema: + type: boolean + default: false + - variable: invalidCertificate + label: "Accept Invalid Certificate" + description: "Accept invalid certificates. DANGEROUS, vulnerable to men-in-the-middle attacks!" + schema: + type: boolean + default: false + - variable: allowSignups + label: "Allow Signup" + description: "Allow any user to sign-up: https://github.com/dani-garcia/vaultwarden/wiki/Disable-registration-of-new-users" + schema: + type: boolean + default: true + - variable: allowInvitation + label: "Always allow Invitation" + description: "Allow invited users to sign-up even feature is disabled: https://github.com/dani-garcia/vaultwarden/wiki/Disable-invitations" + schema: + type: boolean + default: true + - variable: defaultInviteName + label: "Default Invite Organisation Name" + description: "Default organization name in invitation e-mails that are not coming from a specific organization." + schema: + type: string + default: "" + - variable: showPasswordHint + label: "Show password hints" + description: "https://github.com/dani-garcia/vaultwarden/wiki/Password-hint-display" + schema: + type: boolean + default: true + - variable: signupwhitelistenable + label: "Enable Signup Whitelist" + description: "allowSignups is ignored if set" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: signupDomains + label: "Signup Whitelist Domains" + schema: + type: list + default: [] + items: + - variable: domain + label: "Domain" + schema: + type: string + default: "" + - variable: verifySignup + label: "Verifiy Signup" + description: "Verify e-mail before login is enabled. SMTP must be enabled" + schema: + type: boolean + default: false + - variable: requireEmail + label: "Block Login if email fails" + description: "When a user logs in an email is required to be sent. If sending the email fails the login attempt will fail. SMTP must be enabled" + schema: + type: boolean + default: false + - variable: emailAttempts + label: "Email token reset attempts" + description: "Maximum attempts before an email token is reset and a new email will need to be sent" + schema: + type: int + default: 3 + - variable: emailTokenExpiration + label: "Email token validity in seconds" + schema: + type: int + default: 600 + - variable: enableWebVault + label: "Enable Webvault" + description: "Enable Web Vault (static content). https://github.com/dani-garcia/vaultwarden/wiki/Disabling-or-overriding-the-Vault-interface-hosting" + schema: + type: boolean + default: true + - variable: orgCreationUsers + label: "Limit Organisation Creation to (users)" + description: "Restrict creation of orgs. Options are: 'all', 'none' or a comma-separated list of users." + schema: + type: string + default: "all" + - variable: attachmentLimitOrg + label: "Limit Attachment Disk Usage per Organisation" + schema: + type: string + default: "" + - variable: attachmentLimitUser + label: "Limit Attachment Disk Usage per User" + schema: + type: string + default: "" + - variable: hibpApiKey + label: "HaveIBeenPwned API Key" + description: "Can be purchased at https://haveibeenpwned.com/API/Key" + schema: + type: string + default: "" + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10102 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8080 + + + - variable: ws + label: "WebSocket Service" + description: "WebSocket Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: ws + label: "WebSocket Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 3012 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 3012 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: data + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Resources and Devices" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/vaultwarden/13.0.17/security.md b/stable/vaultwarden/13.0.17/security.md new file mode 100644 index 00000000000..4a10c8c78fd --- /dev/null +++ b/stable/vaultwarden/13.0.17/security.md @@ -0,0 +1,880 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: vaultwarden/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-vaultwarden' of Deployment 'RELEASE-NAME-vaultwarden' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-vaultwarden' of Deployment 'RELEASE-NAME-vaultwarden' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-vaultwarden' of Deployment 'RELEASE-NAME-vaultwarden' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-vaultwarden' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-vaultwarden' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-vaultwarden' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + tccr.io/truecharts/vaultwarden:v1.23.1@sha256:094eae865c2650b033313228359aafdef5f00008b8f44cb856ee418270cebdf9 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/vaultwarden:v1.23.1@sha256:094eae865c2650b033313228359aafdef5f00008b8f44cb856ee418270cebdf9 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-dev-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-dev-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-dev-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-dev-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6-dev | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6-dev | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6-dev | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6-dev | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6-dev | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6-dev | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp-dev | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgmpxx4ldbl | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls-dane0 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgnutls-openssl27 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgnutls28-dev | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgnutlsxx28 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libidn2-dev | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmariadb-dev | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmariadb-dev-compat | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmariadb3 | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpq5 | CVE-2019-9193 | LOW | 11.14-0+deb10u1 | |
Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/
https://security.netapp.com/advisory/ntap-20190502-0003/
https://www.postgresql.org/about/news/1935/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtasn1-6-dev | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libunbound8 | CVE-2020-28935 | MEDIUM | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28935
https://linux.oracle.com/cve/CVE-2020-28935.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html
https://security.gentoo.org/glsa/202101-38
https://ubuntu.com/security/notices/USN-4938-1
https://www.nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt
https://www.nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt
| +| libunbound8 | CVE-2019-18934 | LOW | 1.9.0-2+deb10u2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html
http://www.openwall.com/lists/oss-security/2019/11/19/1
https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
https://linux.oracle.com/cve/CVE-2019-18934.html
https://linux.oracle.com/errata/ELSA-2020-1716.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCR6JP7MSRARTOGEHGST64G4FJGX5VK/
https://nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
| +| libunbound8 | CVE-2019-25031 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25031
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25032 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25032
https://linux.oracle.com/cve/CVE-2019-25032.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25033 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25033
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25034 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25034
https://linux.oracle.com/cve/CVE-2019-25034.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25035 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25035
https://linux.oracle.com/cve/CVE-2019-25035.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25036 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25036
https://linux.oracle.com/cve/CVE-2019-25036.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25037 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25037
https://linux.oracle.com/cve/CVE-2019-25037.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25038 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25038
https://linux.oracle.com/cve/CVE-2019-25038.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25039 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25039
https://linux.oracle.com/cve/CVE-2019-25039.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25040 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25040
https://linux.oracle.com/cve/CVE-2019-25040.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25041 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25041
https://linux.oracle.com/cve/CVE-2019-25041.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libunbound8 | CVE-2019-25042 | LOW | 1.9.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25042
https://linux.oracle.com/cve/CVE-2019-25042.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 4.19.208-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 4.19.208-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-36385 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
https://linux.oracle.com/cve/CVE-2020-36385.html
https://linux.oracle.com/errata/ELSA-2021-4777.html
https://security.netapp.com/advisory/ntap-20210720-0004/
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-20322 | HIGH | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
| +| linux-libc-dev | CVE-2021-3493 | HIGH | 4.19.208-1 | |
Expand...http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3493
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
https://ubuntu.com/security/notices/USN-4915-1
https://ubuntu.com/security/notices/USN-4916-1
https://ubuntu.com/security/notices/USN-4917-1
https://www.openwall.com/lists/oss-security/2021/04/16/1
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 4.19.208-1 | |
Expand...https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-38207 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
https://security.netapp.com/advisory/ntap-20210902-0007/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2021-38300 | HIGH | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/09/15/5
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
https://security.netapp.com/advisory/ntap-20211008-0003/
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 4.19.208-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 4.19.208-1 | |
Expand...https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 4.19.208-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 4.19.208-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-16120 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120
https://git.kernel.org/linus/05acefb4872dae89e772729efb194af754c877e8
https://git.kernel.org/linus/48bd024b8a40d73ad6b086de2615738da0c7004f
https://git.kernel.org/linus/56230d956739b9cb1cbde439d76227d77979a04d
https://git.kernel.org/linus/b6650dab404c701d7fe08a108b746542a934da84
https://git.kernel.org/linus/d1d04ef8572bc8c22265057bd3d5a79f223f8f52
https://launchpad.net/bugs/1894980
https://launchpad.net/bugs/1900141
https://linux.oracle.com/cve/CVE-2020-16120.html
https://linux.oracle.com/errata/ELSA-2021-9087.html
https://ubuntu.com/USN-4576-1
https://ubuntu.com/USN-4577-1
https://ubuntu.com/USN-4578-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4578-1
https://www.openwall.com/lists/oss-security/2020/10/13/6
https://www.openwall.com/lists/oss-security/2020/10/14/2
| +| linux-libc-dev | CVE-2020-26141 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26145 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26145.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26541 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
https://linux.oracle.com/cve/CVE-2020-26541.html
https://linux.oracle.com/errata/ELSA-2021-2570.html
https://lkml.org/lkml/2020/9/15/1871
https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/
https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 4.19.208-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
| +| linux-libc-dev | CVE-2020-36322 | MEDIUM | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454
https://linux.oracle.com/cve/CVE-2020-36322.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://ubuntu.com/security/notices/USN-5136-1
| +| linux-libc-dev | CVE-2021-20317 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-28950 | MEDIUM | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://linux.oracle.com/cve/CVE-2021-28950.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://ubuntu.com/security/notices/USN-4911-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 4.19.208-1 | |
Expand...https://lkml.org/lkml/2021/8/28/238
https://www.openwall.com/lists/oss-security/2021/07/22/1
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 4.19.208-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://github.com/szymonh/inspector-gadget
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 4.19.208-1 | |
Expand...https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2004-0230 | LOW | 4.19.208-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 4.19.208-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 4.19.208-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 4.19.208-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 4.19.208-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 4.19.208-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 4.19.208-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 4.19.208-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-12615 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108549
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K60924046
https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp;utm_medium=RSS
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html
| +| linux-libc-dev | CVE-2019-16229 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19064 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4300-1
https://usn.ubuntu.com/4300-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2019-19083 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-0929 | LOW | 4.19.208-1 | |
Expand...https://source.android.com/security/bulletin/2021-11-01
| +| linux-libc-dev | CVE-2021-26934 | LOW | 4.19.208-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3760 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-45095 | UNKNOWN | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mariadb-common | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:7ad9b2cbcb614f0c2409c401804da15ccf82e7072acffa0b6aca1dcbf72a6018 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/vaultwarden/13.0.17/templates/_configmap.tpl b/stable/vaultwarden/13.0.17/templates/_configmap.tpl new file mode 100644 index 00000000000..8809925abdf --- /dev/null +++ b/stable/vaultwarden/13.0.17/templates/_configmap.tpl @@ -0,0 +1,116 @@ +{{/* Define the configmap */}} +{{- define "vaultwarden.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: vaultwardenconfig +data: + ROCKET_PORT: "8080" + SIGNUPS_ALLOWED: {{ .Values.vaultwarden.allowSignups | quote }} + {{- if .Values.vaultwarden.signupDomains }} + SIGNUPS_DOMAINS_WHITELIST: {{ join "," .Values.vaultwarden.signupDomains | quote }} + {{- end }} + {{- if and (eq .Values.vaultwarden.verifySignup true) (eq .Values.vaultwarden.smtp.enabled false) }}{{ required "Signup verification requires SMTP to be enabled" nil}}{{end}} + SIGNUPS_VERIFY: {{ .Values.vaultwarden.verifySignup | quote }} + {{- if and (eq .Values.vaultwarden.requireEmail true) (eq .Values.vaultwarden.smtp.enabled false) }}{{ required "Requiring emails for login depends on SMTP" nil}}{{end}} + REQUIRE_DEVICE_EMAIL: {{ .Values.vaultwarden.requireEmail | quote }} + {{- if .Values.vaultwarden.emailAttempts }} + EMAIL_ATTEMPTS_LIMIT: {{ .Values.vaultwarden.emailAttempts | quote }} + {{- end }} + {{- if .Values.vaultwarden.emailTokenExpiration }} + EMAIL_EXPIRATION_TIME: {{ .Values.vaultwarden.emailTokenExpiration | quote }} + {{- end }} + INVITATIONS_ALLOWED: {{ .Values.vaultwarden.allowInvitation | quote }} + {{- if .Values.vaultwarden.defaultInviteName }} + INVITATION_ORG_NAME: {{ .Values.vaultwarden.defaultInviteName | quote }} + {{- end }} + SHOW_PASSWORD_HINT: {{ .Values.vaultwarden.showPasswordHint | quote }} + WEBSOCKET_ENABLED: {{ .Values.vaultwarden.enableWebsockets | quote }} + WEB_VAULT_ENABLED: {{ .Values.vaultwarden.enableWebVault | quote }} + ORG_CREATION_USERS: {{ .Values.vaultwarden.orgCreationUsers | quote }} + {{- if .Values.vaultwarden.attachmentLimitOrg }} + ORG_ATTACHMENT_LIMIT: {{ .Values.vaultwarden.attachmentLimitOrg | quote }} + {{- end }} + {{- if .Values.vaultwarden.attachmentLimitUser }} + USER_ATTACHMENT_LIMIT: {{ .Values.vaultwarden.attachmentLimitUser | quote }} + {{- end }} + {{- if .Values.vaultwarden.hibpApiKey }} + HIBP_API_KEY: {{ .Values.vaultwarden.hibpApiKey | quote }} + {{- end }} + {{- include "vaultwarden.dbTypeValid" . }} + {{- if .Values.database.retries }} + DB_CONNECTION_RETRIES: {{ .Values.database.retries | quote }} + {{- end }} + {{- if .Values.database.maxConnections }} + DATABASE_MAX_CONNS: {{ .Values.database.maxConnections | quote }} + {{- end }} + {{- if eq .Values.vaultwarden.smtp.enabled true }} + SMTP_HOST: {{ required "SMTP host is required to enable SMTP" .Values.vaultwarden.smtp.host | quote }} + SMTP_FROM: {{ required "SMTP sender address ('from') is required to enable SMTP" .Values.vaultwarden.smtp.from | quote }} + {{- if .Values.vaultwarden.smtp.fromName }} + SMTP_FROM_NAME: {{ .Values.vaultwarden.smtp.fromName | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.ssl }} + SMTP_SSL: {{ .Values.vaultwarden.smtp.ssl | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.port }} + SMTP_PORT: {{ .Values.vaultwarden.smtp.port | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.authMechanism }} + SMTP_AUTH_MECHANISM: {{ .Values.vaultwarden.smtp.authMechanism | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.heloName }} + HELO_NAME: {{ .Values.vaultwarden.smtp.heloName | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.timeout }} + SMTP_TIMEOUT: {{ .Values.vaultwarden.smtp.timeout | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.invalidHostname }} + SMTP_ACCEPT_INVALID_HOSTNAMES: {{ .Values.vaultwarden.smtp.invalidHostname | quote }} + {{- end }} + {{- if .Values.vaultwarden.smtp.invalidCertificate }} + SMTP_ACCEPT_INVALID_CERTS: {{ .Values.vaultwarden.smtp.invalidCertificate | quote }} + {{- end }} + {{- end }} + {{- if .Values.vaultwarden.log.file }} + LOG_FILE: {{ .Values.vaultwarden.log.file | quote }} + {{- end }} + {{- if or .Values.vaultwarden.log.level .Values.vaultwarden.log.timeFormat }} + EXTENDED_LOGGING: "true" + {{- end }} + {{- if .Values.vaultwarden.log.level }} + {{- include "vaultwarden.logLevelValid" . }} + LOG_LEVEL: {{ .Values.vaultwarden.log.level | quote }} + {{- end }} + {{- if .Values.vaultwarden.log.timeFormat }} + LOG_TIMESTAMP_FORMAT: {{ .Values.vaultwarden.log.timeFormat | quote }} + {{- end }} + {{- if .Values.vaultwarden.icons.disableDownload }} + DISABLE_ICON_DOWNLOAD: {{ .Values.vaultwarden.icons.disableDownload | quote }} + {{- if and (not .Values.vaultwarden.icons.cache) (eq .Values.vaultwarden.icons.disableDownload "true") }} + ICON_CACHE_TTL: "0" + {{- end }} + {{- end }} + {{- if .Values.vaultwarden.icons.cache }} + ICON_CACHE_TTL: {{ .Values.vaultwarden.icons.cache | quote }} + {{- end }} + {{- if .Values.vaultwarden.icons.cacheFailed }} + ICON_CACHE_NEGTTL: {{ .Values.vaultwarden.icons.cacheFailed | quote }} + {{- end }} + {{- if eq .Values.vaultwarden.admin.enabled true }} + {{- if eq .Values.vaultwarden.admin.disableAdminToken true }} + DISABLE_ADMIN_TOKEN: "true" + {{- end }} + {{- end }} + {{- if eq .Values.vaultwarden.yubico.enabled true }} + {{- if .Values.vaultwarden.yubico.server }} + YUBICO_SERVER: {{ .Values.vaultwarden.yubico.server | quote }} + {{- end }} + {{- end }} + {{- if eq .Values.database.type "sqlite" }} + ENABLE_DB_WAL: {{ .Values.database.wal | quote }} + {{- else }} + ENABLE_DB_WAL: "false" + {{- end }} +{{- end -}} diff --git a/stable/vaultwarden/13.0.17/templates/_secrets.tpl b/stable/vaultwarden/13.0.17/templates/_secrets.tpl new file mode 100644 index 00000000000..ca5ec74b0af --- /dev/null +++ b/stable/vaultwarden/13.0.17/templates/_secrets.tpl @@ -0,0 +1,36 @@ +{{/* Define the secrets */}} +{{- define "vaultwarden.secrets" -}} + +{{- $adminToken := "" }} +{{- if eq .Values.vaultwarden.admin.enabled true }} +{{- $adminToken = .Values.vaultwarden.admin.token | default (randAlphaNum 48) | b64enc | quote }} +{{- end -}} + +{{- $smtpUser := "" }} +{{- if and (eq .Values.vaultwarden.smtp.enabled true ) (.Values.vaultwarden.smtp.user) }} +{{- $smtpUser = .Values.vaultwarden.smtp.user | b64enc | quote }} +{{- end -}} + +{{- $yubicoClientId := "" }} +{{- if eq .Values.vaultwarden.yubico.enabled true }} +{{- $yubicoClientId = required "Yubico Client ID required" .Values.vaultwarden.yubico.clientId | toString | b64enc | quote }} +{{- end -}} +--- + +apiVersion: v1 +kind: Secret +metadata: + name: vaultwardensecret +data: + {{- if ne $adminToken "" }} + ADMIN_TOKEN: {{ $adminToken }} + {{- end }} + {{- if ne $smtpUser "" }} + SMTP_USERNAME: {{ $smtpUser }} + SMTP_PASSWORD: {{ required "Must specify SMTP password" .Values.vaultwarden.smtp.password | b64enc | quote }} + {{- end }} + {{- if ne $yubicoClientId "" }} + YUBICO_CLIENT_ID: {{ $yubicoClientId }} + YUBICO_SECRET_KEY: {{ required "Yubico Secret Key required" .Values.vaultwarden.yubico.secretKey | b64enc | quote }} + {{- end }} +{{- end -}} diff --git a/stable/vaultwarden/13.0.17/templates/_validate.tpl b/stable/vaultwarden/13.0.17/templates/_validate.tpl new file mode 100644 index 00000000000..e4832c2f6e5 --- /dev/null +++ b/stable/vaultwarden/13.0.17/templates/_validate.tpl @@ -0,0 +1,17 @@ +{{/* +Ensure valid DB type is select, defaults to SQLite +*/}} +{{- define "vaultwarden.dbTypeValid" -}} +{{- if not (or (eq .Values.database.type "postgresql") (eq .Values.database.type "mysql") (eq .Values.database.type "sqlite")) }} +{{- required "Invalid database type" nil }} +{{- end -}} +{{- end -}} + +{{/* +Ensure log type is valid +*/}} +{{- define "vaultwarden.logLevelValid" -}} +{{- if not (or (eq .Values.vaultwarden.log.level "trace") (eq .Values.vaultwarden.log.level "debug") (eq .Values.vaultwarden.log.level "info") (eq .Values.vaultwarden.log.level "warn") (eq .Values.vaultwarden.log.level "error") (eq .Values.vaultwarden.log.level "off")) }} +{{- required "Invalid log level" nil }} +{{- end }} +{{- end }} diff --git a/stable/vaultwarden/13.0.17/templates/common.yaml b/stable/vaultwarden/13.0.17/templates/common.yaml new file mode 100644 index 00000000000..23381ff8a0c --- /dev/null +++ b/stable/vaultwarden/13.0.17/templates/common.yaml @@ -0,0 +1,38 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + + +{{/* Render configmap for vaultwarden */}} +{{- include "vaultwarden.configmap" . }} + +{{/* Render secrets for vaultwarden */}} +{{- include "vaultwarden.secrets" . }} + +{{/* Define path for websocket */}} +{{- define "vaultwarden.websocket" -}} +path: "/notifications/hub" +# -- Ignored if not kubeVersion >= 1.14-0 +pathType: Prefix +service: + # -- Overrides the service name reference for this path + name: ws + port: {{ .Values.service.ws.ports.ws.port }} +{{- end -}} + +{{/* inject websocket path to all main ingress hosts*/}} +{{- define "vaultwarden.websocketinjector" -}} +{{- $path := list (include "vaultwarden.websocket" . | fromYaml) -}} +{{- if .Values.ingress.main.enabled }} +{{- range .Values.ingress.main.hosts }} +{{- $newpaths := list }} +{{- $newpaths := concat .paths $path }} +{{- $_ := set . "paths" ( deepCopy $newpaths ) -}} +{{- end }} +{{- end }} +{{- end -}} + +{{/* inject websocket paths in ingress */}} +{{- include "vaultwarden.websocketinjector" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/zwavejs2mqtt/9.0.30/values.yaml b/stable/vaultwarden/13.0.17/values.yaml similarity index 100% rename from stable/zwavejs2mqtt/9.0.30/values.yaml rename to stable/vaultwarden/13.0.17/values.yaml diff --git a/stable/webgrabplus/0.0.6/Chart.lock b/stable/webgrabplus/0.0.6/Chart.lock deleted file mode 100644 index 9a9b6871dca..00000000000 --- a/stable/webgrabplus/0.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:52:20.282788476Z" diff --git a/stable/webgrabplus/0.0.6/CHANGELOG.md b/stable/webgrabplus/0.0.7/CHANGELOG.md similarity index 89% rename from stable/webgrabplus/0.0.6/CHANGELOG.md rename to stable/webgrabplus/0.0.7/CHANGELOG.md index d3e31fd2a6d..6256d1fdddb 100644 --- a/stable/webgrabplus/0.0.6/CHANGELOG.md +++ b/stable/webgrabplus/0.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [webgrabplus-0.0.7](https://github.com/truecharts/apps/compare/webgrabplus-0.0.6...webgrabplus-0.0.7) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [webgrabplus-0.0.6](https://github.com/truecharts/apps/compare/webgrabplus-0.0.5...webgrabplus-0.0.6) (2021-12-19) diff --git a/stable/webgrabplus/0.0.7/CONFIG.md b/stable/webgrabplus/0.0.7/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/webgrabplus/0.0.7/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/webgrabplus/0.0.7/Chart.lock b/stable/webgrabplus/0.0.7/Chart.lock new file mode 100644 index 00000000000..9472e88a867 --- /dev/null +++ b/stable/webgrabplus/0.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:39:11.931449561Z" diff --git a/stable/webgrabplus/0.0.6/Chart.yaml b/stable/webgrabplus/0.0.7/Chart.yaml similarity index 98% rename from stable/webgrabplus/0.0.6/Chart.yaml rename to stable/webgrabplus/0.0.7/Chart.yaml index 8956994d5d5..c54889ea023 100644 --- a/stable/webgrabplus/0.0.6/Chart.yaml +++ b/stable/webgrabplus/0.0.7/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: webgrabplus -version: 0.0.6 +version: 0.0.7 appVersion: "3.2.2" description: Webgrabplus is a multi-site incremental xmltv epg grabber. type: application diff --git a/stable/webgrabplus/0.0.6/README.md b/stable/webgrabplus/0.0.7/README.md similarity index 100% rename from stable/webgrabplus/0.0.6/README.md rename to stable/webgrabplus/0.0.7/README.md diff --git a/stable/webgrabplus/0.0.6/app-readme.md b/stable/webgrabplus/0.0.7/app-readme.md similarity index 100% rename from stable/webgrabplus/0.0.6/app-readme.md rename to stable/webgrabplus/0.0.7/app-readme.md diff --git a/stable/webgrabplus/0.0.7/charts/common-8.9.24.tgz b/stable/webgrabplus/0.0.7/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [whoogle-1.0.25](https://github.com/truecharts/apps/compare/whoogle-1.0.24...whoogle-1.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [whoogle-1.0.24](https://github.com/truecharts/apps/compare/whoogle-1.0.23...whoogle-1.0.24) (2021-12-19) @@ -87,13 +97,3 @@ -### [whoogle-1.0.16](https://github.com/truecharts/apps/compare/whoogle-1.0.15...whoogle-1.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [whoogle-1.0.15](https://github.com/truecharts/apps/compare/whoogle-1.0.14...whoogle-1.0.15) (2021-12-04) diff --git a/stable/whoogle/1.0.25/CONFIG.md b/stable/whoogle/1.0.25/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/whoogle/1.0.25/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/whoogle/1.0.25/Chart.lock b/stable/whoogle/1.0.25/Chart.lock new file mode 100644 index 00000000000..0a1dfb092ea --- /dev/null +++ b/stable/whoogle/1.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:39:18.902185327Z" diff --git a/stable/whoogle/1.0.24/Chart.yaml b/stable/whoogle/1.0.25/Chart.yaml similarity index 97% rename from stable/whoogle/1.0.24/Chart.yaml rename to stable/whoogle/1.0.25/Chart.yaml index 3e748e63ce8..2ab3311740d 100644 --- a/stable/whoogle/1.0.24/Chart.yaml +++ b/stable/whoogle/1.0.25/Chart.yaml @@ -20,7 +20,7 @@ maintainers: name: whoogle sources: - https://github.com/benbusby/whoogle-search -version: 1.0.24 +version: 1.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/whoogle/1.0.24/README.md b/stable/whoogle/1.0.25/README.md similarity index 100% rename from stable/whoogle/1.0.24/README.md rename to stable/whoogle/1.0.25/README.md diff --git a/stable/whoogle/1.0.24/app-readme.md b/stable/whoogle/1.0.25/app-readme.md similarity index 100% rename from stable/whoogle/1.0.24/app-readme.md rename to stable/whoogle/1.0.25/app-readme.md diff --git a/stable/whoogle/1.0.25/charts/common-8.9.24.tgz b/stable/whoogle/1.0.25/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [wikijs-4.0.15](https://github.com/truecharts/apps/compare/wikijs-4.0.14...wikijs-4.0.15) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* move `envTpl` to `env` ([#1578](https://github.com/truecharts/apps/issues/1578)) +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [wikijs-4.0.14](https://github.com/truecharts/apps/compare/wikijs-4.0.13...wikijs-4.0.14) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - -### [wikijs-4.0.6](https://github.com/truecharts/apps/compare/wikijs-4.0.5...wikijs-4.0.6) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - diff --git a/stable/wikijs/4.0.15/CONFIG.md b/stable/wikijs/4.0.15/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/wikijs/4.0.15/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/wikijs/4.0.15/Chart.lock b/stable/wikijs/4.0.15/Chart.lock new file mode 100644 index 00000000000..664ee283f3e --- /dev/null +++ b/stable/wikijs/4.0.15/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.34 +digest: sha256:a2f9da8eb5a143b88948556b5b4d13040d445dcb0d438eefc699eaa01c458c7a +generated: "2021-12-19T23:39:28.774719534Z" diff --git a/stable/wikijs/4.0.14/Chart.yaml b/stable/wikijs/4.0.15/Chart.yaml similarity index 98% rename from stable/wikijs/4.0.14/Chart.yaml rename to stable/wikijs/4.0.15/Chart.yaml index 5b7fb70060c..44cb842915c 100644 --- a/stable/wikijs/4.0.14/Chart.yaml +++ b/stable/wikijs/4.0.15/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 appVersion: "2.5.255" description: Make documentation a joy to write using Wiki.js's beautiful and intuitive interface! name: wikijs -version: 4.0.14 +version: 4.0.15 kubeVersion: ">=1.16.0-0" keywords: - wiki diff --git a/stable/wikijs/4.0.14/README.md b/stable/wikijs/4.0.15/README.md similarity index 100% rename from stable/wikijs/4.0.14/README.md rename to stable/wikijs/4.0.15/README.md diff --git a/stable/wikijs/4.0.14/app-readme.md b/stable/wikijs/4.0.15/app-readme.md similarity index 100% rename from stable/wikijs/4.0.14/app-readme.md rename to stable/wikijs/4.0.15/app-readme.md diff --git a/stable/wikijs/4.0.15/charts/common-8.9.24.tgz b/stable/wikijs/4.0.15/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG#rTy?np4ko_tRZ9 z-CcD~6GcO#gZ$?L(tywzORF-QN-J>6d-HIZuxT=zsc~5URO8`P($wTs(6X~Jb};i+ zS8)`OHn+0}x$OD)wb7c&&FgfQ4|-iHK2qk<}PN6Kd{_uEiSXZWYKHpD6doOU45NK(9bUwhFP4dTHb zL2d`Ibqfguq`YzZ8wo`FOGv!&-BCF#s}7pPrE?4T0r2=^z~d`I2N zz?Y&R;NcT{EcQmC3tS{(C`8+hP+UwXJ7)IfB^GIf8U{=##xs=Q-OI8kBh-}tPApu! zYcMU47&?d=z&%PCJO1lJCc?gvP7l#(S1*Ct#n(}*T?8B-;z6i@KSYeVUPhQd%L`LN z02vZ#ZoJm$ttsOM0fK})kcg*&X!{Cwi5szSYr(3cDUf*6jQgp8Mf|>>G692EWZI8U zp$z!ebuh48HqOS6MwLr>Jb!P=lT3yWu|SOogEQlVp5%l+0&tt4)|CVwE3{%G=lql) z0GHpKBfcFfIC_s1K>W=__=}tnvcQo_lfLtNI8L(GG>p3&jZOXX#CTWX$J*ibDw6$Z zptn?X-2&6KF#2WkR-rJkS5cnT^4S0TfCgXG9a{W0FBr$88=H?121k%}D7K4^dm8|( z<5+d}Fbsh)ZY05l7DeqW={}ypLN!Nzld-zvN(*s|J#ZM2>XixDam2 z=i2&UkRVcVQg+7tPP!s}89Z8PR(SA=)3O``Rrb%rRUm=~8tPUsXuI*39BoL|g<(pI z-gQ`&}As_ zsh9nEPkmHXRU()|>g*)#h%#|)e$;XT7PGm!`U^nNTuirgKM9H*YWw$AjMv>u(4UFv z7gAI>KWcH7*a>cDvcYl7((!x8>aMnlY4U>IILItxZ!%zpujw2eNBVefGi%s^wd z91VJ-`aKQIfW)1I&@)|T<7r}M}nXr}iuOyg6^Ee@b z2mahpvNhhASbB(91V)<&zvm>*La_(mO^)z-7I<^YD+sHmJgel(w4 z)~Vr3EaMe!Q%CNDNG&K{-JEN>#09`pLXY56ht z`!T|_^fnkh$v!2#NPSTjSE%_h@#kF7vY`1kN%2(K7o4)&8NXV|;6tef9s9m4|4wjp zY+!g`l3_L_TpdRI_WV5CDC2tw!~)Ns?t|W>Xf@0w%DsZ+>-*-Vvi(g8-S?GB^i>vY zX^y=9X@neC`KA#;O4bS@!lKvvrL_p;`CyvWyr9NFd}uRz+XiGbx59J1`O~VVUI{_4 zlfOLgi20_PI5|08dHwqV=eA$)@Zl}UM>%8fuK97<4NFaUt6h_)|#p zF_pQl)2bMmT=h5EUF;H9okY-qu@wE|qOB8e^{$2C(vb-2Upao5tmmP6_ z*wqKunkQR4PC<^0zCHUaFxUr~q~yU02XUuLjluhGtY8ZDKl!OlLj0l0HV*k?B>lZx z+ko%)k4qapT;cxy(mKlR-)aRt3`$N*?@)_2pN1+W|0axa%iD`O+ezFm#+CWLuT?3v z@7uh=r#XZHC|w}#{OVfY-#TFUEBd*=!!i~%5X`v2VIBCqA&jhNhsw3`{jck_fp;g( zZ&(Aa{8^oktWf$5gw&5UXi6vN>@V5ix10??l(|jPkVl%k@{Ak@jvR>Bw2*0pSg`O& zgeT{~A9I^?*=QDUp^(HJRp*RelOGLLy5BKl^}#PkCVw!x};XnZFo{ z2TNb;N^7e9Ljo4Z{D}^SR*%y|A+VO}iGPsuPY8GlHuVg$|9eFl-togLPLJAv&!Lv! za{NehOC{jeq`wqo0GHS8kug_+W&ET-u)7w-AY7slk}G@-h&S3ny3U=)Ac@*n4GN4j zwdKu>ZrAG7Io%8)hl^-fkA>aJ$f0qz9J1mqRPgW!#b17Ry-VdzvhHr8yX?;i8smhU zi~@}=ySaqD9HVZa7qv54^UNy@(54S1(;v-V{=~+*%iec}6%7k^mpz?~XyOLyx`+)v zCLA%TLccQYi;BR%3Et}x`k-iSj(Eo;I`S(A5W97I(O-T(S-jM7@kM(J`=L)u?e+s;+OjA1(I{$ylDx z`gHWPKdXA0*bl;cZP_GC(A?e%q#V)+1wFd8Q_?mdj9W$L78PH4^@wIvyQ{tUH9(u~ zVqsRsk#big1w4ao3ugx{F9^&M0H0;lF&(edCuawZ+7?UP$4TbyeV-NZ6Bbq0oI|-i z{79bK&B1dON^+pFki>D#eRpV%4P5ajhP-6noocv+8GA;Nqk5M;&0`b+b}yt@eR*tx zEIg$qryV3OUMW@4e;SSbzt~xyLK0%OAHecC zpm+Qn*&g~B3rvr6#Ft&$i-#=#fIR-1M|UK$(FLxOG&?>&Dr2c4dGT9*0Bs&*en7H7`~EgpXnSSKPo?~acc4{H}nMHP2NuM3-~pmoNpp=EAT@` z1{Dkyw)P-l&&bQ^`;7ltjMa<$vgwIL? zKH#fy2$03=@igIft|c7!&@Or0d^87!pSVEV%#M$^#w>_J$kh0i3vbnz{IfF%Y6k{J zX*-`+&PcylCR#ma>sDNR?@owFL;}1;+O?3HWFex}|K3b_1gatmNtH@4A52iX<+Z@WDCQKVY$cJisUE(i3X);3{)u z{<^3!V;`r+Mi`Hiv}uE|VfFr=rO@tyh*uc^H*?z$?41QSQ-3fz-a$UEp`?ucQqDg; zn>rj*)ApK^w+Iw=koLk-3$Avt`?Uf%XUJ`Au!b~UdN36;zwsn=-(Sc*r`O<2^2Vk0 z2P#`Xe-||Fec5X8S5i4nc@<;cN>4pNa~duvoBGE8`L)P%5Nwx^;HzBqn(wh6tlAIN zf=PrKEtCRlhZqoMgKVc9EM0-?(*vW$>Cs_yDeG`)q>oVhC#T1$C!;aR{r6CQ)ur(A z1fn>k2l3=aps+3;JDTm8-iyEhrATsY*Y>7vjP4fmHEkD?d*g?4;8u9?xieOuT}?)E zQj3BrqvL6fz!XY3dSALclDU*u2tCnH=-UvpUvOOxik;zR@}m1XAtDBsH+gpr69`m| z(>0v?5;D?JcL(v%Q_c}t**p_2uLQ@vOLcO^aN5i{+?KwFvnm*~vfq!25n`8KzQVF% zD%JVjIGy*$N53e?g7_pMSzGr0s;uxg7Onv1!4oo|RC!l_RoSy>TIY1D9&)(9;PX@# zHkayY6Bi}lhdyq;@pD~b6Dio~H?^?0h;q^h06nD3s))jdqr9o}ptiE9N7u+J_0}~A zVa^W|^1)Hv>GZy??84U7U`f`n@l98Dnw$A<$oVv#NnU;DwvppFTM z>aQnP)z}ckf33_{eUbtun1UevP^Ld5jJ8g?gecTTf@%ApJnnsr0(Zb$YzW!cu3sFT z?NmgxdLn4Y;5=NqjRFrKA7Zh}_qk5bROt_D^b@W$cc#s8?jx+o@gxj z*;-28v;B8=HMw|d#kNxR!$Y+fvQulS3A83XE#nS5&TJwQxWxsx# z6_Xk_*ec&aMby52vg*?ISB#07OD~yivoWo+Fh+33MW;}30~GR#Lu7oV_P>4Qq&>1V zEvq(@$QUz>$`ZUACX|EI86o@?G(9@AS@i^5_!1K_hl8a-Xev}}(V$P z6lCUeoiT3anykKW38^8ja5)Npl~#x+EpUBS&5@0MBiH{z9+8u?!L&^%j>-X()EWuk zn^tPaBr=AEllsiw^&*7$xs9Pf%Gw7Xx)ml`W`jwz_i5D{Ni2hr1)Y7V8rF|!jP|3Z z#s%Vdh%z*ZnArGGoaO1|Tc8I>6ggU<`# zq~p=B*uD$T;V!{+qIKNED2{ZJ+?`kA&l;I355-DkY2CNGT83wz#({WK6yaqW((b2> z9s_Uznj#cRgswu^`bZpxotr#q$ph=#=Q&5#ltT-nzA!5an&_P^dFliT``t}Q8s09W zYXWxelL{SEYe@^D+%Uf1t1L8atFlDsAlc{~J=4nEs&CQReMLY7Xwbc;r((YJ1mW|l z5WHdc&gnK>^?{lZV0H-+iYp*vOOK&}VM!S3v?$tyXZuKeJ@<)ijVU+VArrFP|k_ToY3nH_&=fDUtSgK(ebqJcx(AY!1U`aD|qsFaXYyTkJ zbWR$d9oC_@(|J2WF4redZo3b$!>FfF4oKJRicl#P_oFP}-UlGH7bvT7LATJtbtDDq z84;b#9PnmUlrZ(IKZB{#wPImcVDO)sxnibg%Zd@+f^uyrOWKTtu@+UC^ykEkfo(V& z^MawIgo;oV@AmP&b;2aKd%awtd@JEJ>U6xVddk+DqOd94`jWr&~H^Fp9auG~z zMmB8h-KIty;i`LUOd1bi8xI-HXfAYRTu^kpadxGmddPi5JE{;ce#GHiVq?efT|5_%SkE{1E4ay2hh zzHTI;#hNjxr-zl}ZUfj((Y^CaB}Pooge_J5CW-n&RvPb(E{fRMixM~BETZD3|c*VJ+U(Jt3+|) zTUDg7uQ~e?DRs8`;p_S)M9nWS%*(1n5gA3~-2fnG;vZ%@HdyP^CVl8(!m4YxCtQPL znqOK6#jeSx)vM$h6f6u6(`p$a0nPS{^(Uq(We(De37vBIw5s-%Kz=IXyFtJDw&i`a zy)lC-gr0vQVqeA^R7*)P6GmxDa%@EgAB;}x&-I`MT+*e(mijr`ro)?1fep;(AmQ{7 z!13kJ%^$cQRX%?8#RYOQW5beF0vWrrD&FZS0FcOlbAbkI4Pz(Ei#nC znKD}CTGCn-=lIdfXZX?TPO%a{1;-K%mwA@xpeGQzD8j4Idy^Qw{IacSUKE*Oe5^%w zd5hhEVwJoWr0)NKfzOtZ8kZ4JXv=xpJf#t9X2XN^afsHt2e&$Z?f~exQB8{AKo(^k zAjvwIJyGh|*Q1eI--CQ-&rN(3=iiVTP1>B*VV9S&ZB>EdXjx@N?syFfO3(13D{h=! z2@}=b%Ab*akSSIib1Dup$CZMI?e$KwvWS0i+tYL|Xr+y_bKbiYKVBqH_ zq$14)6mIa@kXOiRlo=K){zK3b)8hRZmNH#r5qT~Y9_77o^VwC3gnfx(nf1RQ`{KQI z<}csfV25&q`5*3vnaKS_9=PnZ*lychmM|n3#VL^5C5lkLi-Up%7w<*#W{Neu1+P3W zOM;sC7w>g)|M7LlE3So-rvskF`@8Hv$r>33IrMd4LsR8Snkj#8il5+;{R~dl1ey_I zEW!|(Ik9;)I7O+@3i?IoHKFtrHB+uHi+SPLPxPF@iuUCVGq%83=P=oubpw7TkPvI& zpCxqu!z$T`>bJBK1yWRNa&duPa|yW&=AwF*tE4sN8kp>eMV2~BU}~p$e#ujlkg6b< z0*~55J(`tQCEj>ekgbM;7Zs%1Zb%!h6Wasac-C|sZO@8%zXU9Y(C)oGbp`2PdiO}q zA`)6uxqLz$_|6de=V~||I!wNyG^(oKKVizP#pW#GtEK6Ti#2caTbhge7kQBm!}xc> z9jGCy9H7kHG~nA?ki{>gma%&^!5uJVe$K)98_!YoAmE zr%bIO9@>86%*^Ny+!dx9>E4csqJONq`?dKv4YkhmX{yJM(Iq2wK^pQg4%Uu;9&5$sdF z|Dn6X_wbw23^Ukp26&7*-gm@jl3M`~Kb1T@B&)}F^W+OLu=LjY5SETOl zhLb)mwh6Qj$v}f-Y>k*nrger<>L|(KggeKjFa2nd<5%~?bTw`EzkhyPSdI2yt^gux zo%e|q)BOI5gL>najqahc4x576*p7XbHAWIJY3NP{V10VYzHZ$I7d1GYPz6avM@y2)wift)I4OdDNA<(OqW;OJ@9c(3s9Cg&_u&FK>)06E zz`fI;#qzgy2r8OXx~>BN5($dr@}J3671wC>X(jL|x=uONrI<2N()|yF__3@j!!ajh zCVUM}-t3>aiKK1cbBHg9+xUW??^38>wikxy7kz@`Cn)-s{{#+9A*ZaG(^$qkZ5bj@ zVqq80&zzRgEY43zKb$1}WU}M4aDoR4)d97)eL%0t+G`NfSHsmuqqFNiror_>!E>xV z2Bx(P4TLY&SJGoa!_;r7K7?NA5fk;-L>ynkkml4ytko|Re=?oFC|UTy1EG06m7!qT z7;ixw6ssIb55Q>|%fN|a$UeLXSK>%G7xBwT9}(tXtY&TozZ7vwtP2;j=bcaIu5;8C z_=y=K*I)!r3Nix?p9?*D#O}z6t2eA3#j*K}(UG7Eon})>QNG`{J3JWJUzk`awsTx1$4VqiukcKAA&Fw|6DoVCM^Ng52LK_w>AF+AiNtwE>?c0p{V+N0g;I+ zRlFJw(jK24qQ>Pi^Kg3#*oF!Yw(kn_FN+mXA+EQgHjBY5xV_GH67f*|m^Kq11<|)X z2%|<(w4S&RooNzY*wNE_uEc|`bYV2Y;DgyrotrPIXzLr_r>zmZ#!MS&@;rGx^jPuX zw_hs=a*Jc3i^lE+JXnYxc-nI}_CQ&41r&4eB*W311?h|i}mZT?OhIb)197L{w_J)E+}CK z-Go{{^U9MlW0CiOJBR>D&8#iICs5ayNeg#TRwyr>VWqaR;VEDKwp&b4+J58snH)hiGedcyQRI)AsvpYt`#DkW1S2$(}vGk%ZJBZzdQlMXE@5l(|nND}z zC-3O41Kjc3pc!%V_VdyNU;8J~cpNOl)>c)Y1Mv^K4wPIE%Y05wZj@#b!%*msfSH>) z33s=d)zhtd!u%hd)7V$UfCi`)F{c_E#*cNAEV}j`8V@w2K|2;TebRR2^RvQCEzaX@_uGy4YCPcM-)%Q z1Yc3w_a~y)LDxjgWfverKVD~dKV4jG1K*{>?!>BC&4vuSYJGTijK0CLITte1x$33p zWA2^m1js~Wx@AJN@-3vAPg(a4WEJlL0+I8i22s{J`WmCl3U_`ySl9C*L#VV56o^qQ zGj`=*|C8g9Unw-Y24}zd?+zkpI|-iWM<|` AAqL)3oI@XPH3Uc8FNGZS&P&37Oz zHm)0Cug;LVEk0_6&5hsDVh@-nK~ibt%uhepgTlm~&8S|;JtI7|05Wyx1*M!sxkkqk zhk53za%TrbCVVVZQ5BgbmcGgA(`c6r0x}Hw@YFA=dOO3{j&zPDdl=O{2;UF)(d8p| zu+J80u2{D(zUMozKI=zYaA4)&Vl$0aXk@kz)mri~` z*`djU74O8+HayZ8JHYR}MyPDl=6_WU#>VAf&e~-t|fSCWu?J;c>p}&Awig zg)HEuPx7|YvR52vfUK?}_;S3nk3&=T%X)zxbMkUlaj%K1t(7%OW+wYnvsiT(v6#~J z_V1yEN{r^AMgJceMiQ6MNp{u-@xQvLYIm9XbSe7T`W9tnb3{@~otZIgmtK&^`*@dL zI!s5BZzIXjWp-0{4hHapFCiNhrgzIZGy@L&N0F$;`w}~F-`teGC+Df@X;M$svzyAY zm?nQec$_0KKK2|-_N&Y`-;_|0(k<25y;p^f&Z}LdA&2OEy05P^*!5$=5es6hzIA?g zDGtj4G}QgZ5hM9~)@*kjEaM841YbN+>0 zw+y~$`KIw0Ed)cd`&tU|mN5AHUN-1RciNjvr3IqBw^8GtO6hSr)_c^27noY+6#=@PQ2k@LM%}n{`i+#5q~k zi%%}BzziWYiM@ov#ZENmr-zz-=}CsxsrcZA8^q4TB9Zv5*dAc)ne9^b4s&}>cC(uB z)$-V@D+m;%d=1xs8$(?pAz6~ixuIlvm&1UW*tkjcIM01(N+wR9|NDhXuF|U@|IE+_ zv~OblPQW4%<|s_=+tuIEOvfH8Yc$0B*9?MLsa8i;`d^!)IHmI$0Z=BeGg%yjv}1I3=}YH9%`yvSV>8)l@bvMc`I zuHn7wIX9s>WsiA0&cFwulB9rEm{qCv!(+4!8H*Bn?rg}rtw1zbNA0c}WkuC&jpViT zUVBUXEd;{Vxl-@G=zY8Ce;$sSrWa`jE^@Mo|~tNO z7d#CJnm|&BbTl%#s+u0C{&r`a5*>cX?9P}}aDt0%UVCRZVS8JTXC6|L5nd*^0IXgS zfra{W2c}IM4JIP+DMm&-2p?@;SYGI7%2-4f%kZ1u-1$z-2a5?YT=1rrf{1>+bOM^! zJHH0E@0?5DZ9C2X7=rN`jm5^9rY+!Lz?1Aq@7A0r9Pp~Z2mtjsC34cIX;;R1bHWYq zYft_pCv7s^mF((2WQu>P3xh6gHv!1~Gup(BD9*oh<3bjeVf?Dc`oQ??jk9u?bzVm! zEx21XeM?EZ`19yg5NWDs=FV5)s(r2*dg%acKSxtrCNpdvbhA?7x%s)~)BKu$GriZ$ zu>gMvc6{DUZ*IOLFl)T+AX5vgHK%+!%B&O%0zXIu3#k!HFGVS6Ax(Bnv>4$rIW9ty z@KCq84?UP)2i&`Djd2t2mU0qpsRboiVhL=~!)Ir<=A#M;C?WE$m3^#-zY!xp+^C{% z^iUOGB0WPMQIkhxZZ8c=UEzENaUxN+vV+7Y}qG#gBED+-;%YcD%J{ zd?7p2rs00b$XPACg5FHND1P-aF$7%iV@N8jS$ntFMB#bhm+M1&x8W+!Xl&4~FETDG za{tuy3l9~~%P^viW6Pt13ZjI^5I<=Er1`K#8x*gdSfVyem!kCR06dW7leq*q?->2r z3-lt#@fYIb7u@6%Lf^UW;X%iGh!Hp_xO{Wo!v#5GrcSsF?>R92CVqZHs)Aa-KfqgD zcsLe{VI^EOJ3;a??=hgFjEvxL`%H)=8!Nn^An+o$P}k0eWl;*1u0ST3qs)`I>@3Rh zw<9=0BKt&oXIzaK<$6X2CK~;XKAHpAv#5o)KcDh;f(rkfZ>%`#j^-hIW9j;#MpXD% z*EDSEsZ(F2kWnY<@8{~}}GkxafA7QH4|larw~64x=*oflK0(zGj;E)q~}KX z0d@yCs{bcMbVsad5z6k^(|ua=|Qtp1d)T?8w2%tkqL2pOU4~L3Y#U1Kds8@+u38u+Akork-mR~F8(gC)7p51JIwk?>|%kZ(iE~~ zl439rzrBWoY8O4N=-4Uxe2SM#Vdt2brRV)9BJBX6*y=!b9=;jvM98`P-uIHtR(ARg z*Y(f6w01V5yF7Ea#=~QPPignlZ%)3NdvujUU+$8TkvCwI;wMWkB)Og*b!OQZl1^U; zuFG(SSH*#d$WkLn^GjWUitJ3&U{BKr^RmqcY%)2o*69Y}oD3=rjr~>}ZL)n@x}Hzu z#24yEYbpTTTkvb~{Wm=W+1Ew3cB&9uNWUk+6bVX>+-GVoCgC?>%OE95E{5fgg%sm$ zNbV@ituR0N^cBvs-HTsDqRsg+3u|^Qh7J zHSeZtyNi@u5n$sJR6dM`e@mNmHa)EhM3k1N){%?Dw03W3@%Z5N03Rdk;#x$W6ieQ! zW&{^YfXB(Ar2H`-L6YSZGs;OiPFYD2hZ3O8f`Bj{MM#77lMCY;u{y8)G|QlXi|#!RMqg4^tf8z z^|5gUdqd*4J9`}^H6YkxHI7y;cZ^BKOSypNA;jMJA;2G(q={l1mpKH8RrjjflQOkXco;N$gfCEC()TVJnR0_udyN9x8P+ves)$x!d;$7c(*msP4> z@5k-_;mC)j6wyu|zW#47clYP_BPGj3-?!u2qb^IL*_%8HJQ`|q852r_?0OxZweegc zKFmnTv=c`ONSm;9HqMI{CN>@}IQ)YRG;T?*K+{LCGA!<%{x?a;Sj1kQz@lJ9Fe#{> z{xe8LCZ}GFK=3|+K=3XYd;naw!R{m2i7p2B>A#ZYS^Xma_am~cy8g2@uf9>>t!?*R zVN#y}1C!^{y-VGZ56taJ3dl}ps#dQ+V38Xdw=9#>ufQd^Y)6gV@}1m%m48*Y{HOgh z$XPC0r{?JrS+x5p@z~G&b?U8b+8WQwUkOXm*^Zir)KB8Ei%?1*8ryaEnFCAIE||~lssD|1a|E{~=1g zH)-B|(?q^ErE|akr#@-XUC;cBkH;5-<44xAG#(@x*LV2W|0Nkki&O(Is%2@sJt|z? zw#!6Si3&+D5^5;OTIo?GhT;Kg_)Ku#7h&^2%$^fiJN5ut{YDGc$S_|~dL35_Rv4Mx zaF(W%X|sFvl!WX#JUdt&SyAE7ehM)-pWYK~fVtS4klsP0oLJ!y4nt4$9(!&FTqbW3 zEd?tnCKjq&`N6QeJyoNgknAA(8V`&lwINwKqqs&|x2PO`V;W{&O?<1`Du8RBSjf17z8HwXX!}6aa1e9Di7O^McWbcAfsX|#icjLrGL{-=TVoHa4LOr zsA1frMMDP<0uIMw8f=_TKM|V;E{8x{OF#9;mg0@FK>rLju#7f_DQKi1j4Zk>C6jg&geYzB+c`M?E0kb#J-Eqq-mJO29e@=w%g_A_oI0RuL)VAd!=4 z@981fev`>g_wC(OeY-!HQM-GV_Svys!l8gt0!$h@l+W= z_Fx%x3EIOAAO6DXB~+0WZ&han1!VxAOhlmP=42mAwBrv85SCk%9|;)_s0>98(=6y; z2ixX#X)MR1ibAcVAQ!7p_=#A$F&)wm5;4oP>}GLHJVhCE6khB$Dy$*?m!C#3i}_s{ z%*1x;_sZx4nWlRpuIKqF7Iz{B``UUIF6KRlzObKgx9+8jX{zxAv(rI%0jO2T<3iz3 zX@D-Nu#H?mGX-5p-$|<^boe!fen+9}S3G>3%qdFR0*Z2^-$nS^=Y}*JdHLB}guFn2 zN7YZX0>u2@EAyESfxATCORHfofilbCE~z3Nc2JP<$;O0jLJ1nG#CZmlFle0nzmhGS z>gMNzpEHz{5HRP3Xx2MJ5x2hzr?zSVNm)M~EHf;rH*REDZdFZ6rzM^R99nLjerN~O;3hM-Fp5L13IC9FT{A*#7BM+4MEa~c9bMpmpS;{gVO}&3n8ziscjkA? z|8?_dcGL1Hl7wief0<*DZK!W0WvK<_$hc$p+w0?dWZ(;`l1ue=o}S0Y-?zQaubbC5 z*r2!1_gQ3R7Rewx*FX7XM__4wV(+WTj0}>%{wH+&!sN!JNb3$21i}luW&*L=82#ZUW`N_)c+n=SRqRnZcg zN_D9c8=H=}-TmRFQqb13AX7dxGOO`rXiUOzGt|V0E6I$BLm9>GWvKJ~DXkp~{Ro4! zm(K3BqaH?J&*}ZoUDbchQus04B6NjaT=~bPMmbcE3bmS-F30YxIM@6^#-BhK@`vkp zAuAnzUqI+7%}H+AEX*m!BVdd&+jZZ6aT7ih@^uwvr6;vDg+M^VPAvvk3pd@uMw1v# zEv!m)$f~qX8XWhtwNp^wEw5c zgf&!@g^}uUwQTHrSxue4tsi~+xOqQ49~=!R&2hNhUcbI|vAsR6?Dcj6^?U+~=l-Dc zv&$(eDL$7>(Ot<3q`nx^)V<7~jeJD6rD;t{A?QorT>obcJvGWE223v&U0vW(NobDF zMRu+8u0sGA_ttfAW1nG||w$)x6!%gLw7{+Ws7X@MebEl0<7X{%K!$7w&)IEA|k-Aa# zGXJDyB#N5A{QlF9`l_3PY`Vb?MS(LAVGJ-&QXg3Yf+hzb?H>#=(pb9HZi){>KoGS8 zU1^lJhilp+?EHq6Kjp`}E_v9lt#s7ln2NR`Z1^esO;|+uBe6G1hh&A5u6WfVw0GV6 zc!oC}qw1g>?ye>iqv!NgLdt%j;aA9ovG~}zaft#$TSr|qFaD0@?w=#S7s!#*4(XcBvq( zUVmu|*5Vr-295DMx3{aNja!TJ-y}sH*{%@(MZ!3|CYquuD_kjy(Q@jmOr>Wo^~_ta z+A3`k`ZN#50Y<9Ky8Mfa70xLIZfdiWHEE&`e{H15>U_tKH3`Nwjo_mK^vHL)R#1Ke z4&oHv(Ic=Qzp&*3PQ1JdkKo!RfAI-l-eFR+v6^l&6IMzrLOfm4mY3%K@`!$`u<1TG zHBzS&q>SY9+2OBtX)(sXC2m`$g()w2L^-M_s(6S$@ec57TYf8ISba@_DzBAT$Y=TeK!8@8_e_kIfRw3~95 zU+VF&1AH9!I2ufGc@iuYvewuQN>A$HUFH$!<6qqnSRUsyiq2cl)$YY&7nOX4;etDM zoQxRZU3oJQ^Im%6M8V?Tc+Uh9e&+venwok^V-nOOAn5yWdiuUSRP~`ND*8$*tJ}UN zFvu0`7im#IZ|;_nM+?+^p=9~ndhtu^t%9@U?N^>yYSJ!MfrNu|r-SU5S@D_Vb!nWW z(Z<sPAZL=NYlNfH_KF@K@8ZweP9C$D z$U1O<#j09;XO2>~*Q4pJn`qjg)Bdpkm{JGM)61C}U*<@+4b_uxyxc5mQVAjjGF4!6%as|2&E7>;N!p5s)xowET{b`p#?BUBqOXUV` zL}v{xUQT0+an(i)eGz`Eiu+d_s5;M3;##w~@S`(@{x}~&+!--nY+NVx=$Pb$N12Wd z4nzZjgURm5z6<8_t)=SERwcffXJFm9v<=BEjrIq2$tJTT4Of)PB%Vp~eJS?QkBnx` zyKlO2@?`_c6g+c=Vp&^oXK)%k33;>!W~ke%iQ@AZHi{H3;Jv z0uqeR6D_i$U_lbd)hH?pvchU`D>L{)?BBniI7mQYHYj?w$Y2;USW_7S*cBEujIvnO z<=2(b6_!|%^F!IiM5J-6=2_k4MjFA~#8fe)4;fgG2xY8r$OA~h+=C&S?X|8-gaMQK z6Cw^`J|Z0{&p{Y}eYT+UxbGNPaJ;th^8{P$Qm~+xPzIcgR z7&Hd}La82EbX|Sg?yUm^%FkKXi>Q)6ZlPfj=pZFeUCKnf@Hr}rf)|m2ZPRV0^?&ZK zFp+n1l`A-{D9mgt!x#w0hnd}D>~&PpmzFWaAhk!77cqhq5aPy6B{=Iv;q^5J(s7%G z_(-l@s*eTV9VUM0tXlWYH@X#~TH8sRPKb7vfD)6aEe1rX7Xx_3l~>JlR?X}teyoq; zRQa5CGN8HTn@j}s2SA*TH^YSCs%q$nU}|Edq+>3t7YZ*W!^2o7n#p1tHUH^wBKqBC z9&C*4ZCB38i~$YL`lFLw($qw!m0Sl_9m7aOt%)Q599yoG!Pd;q*p$w$J-l}#jQCbN zm4cYeD)St`%npOoXd_&WBh0CQSJ5BOZi39psg4FJp)%IUz8z)O9@neeD53^J0&yM{ zBM(Qsv`PVaO51Ekj#da}mmU@wUs(Q*4K9|dPH#O-$`c1P?A@U_cJfDWHiwZMj&Bg4 z1Sw+apHD?eKqyApNP}mxtfrJh2SvxrnbT>`%qh!?99_6eJlEP zC$g$&e)Y87^l(BoCjHyb_x9Na_!Se295klkm6xp}i**sPO3O)^V!kR`FwX7P-3+S6h&+ zk8VV=F~Ku3jn{^PIP8WUmNVkQKo?YE_Z{MeOMZB2hxD(i3diE1V715n)1J@$!_%$x zvFJ6+@V{qgO-+`k-{#lx+A2?^|2m-qetzOmfufDprT01WdF9QeM#BGk!3Ee)cgG5 zo1?XrwJm=&R_IjcY;Syyn_Ea^675biNpv{_TTOJd13M$H8Z4+2LlWQ%>?#j9H>wyq z-_Wj`z)-BuyI0S(Hetr8tsUu@Z&O>rg6+-d=!tuKaso0LL*cb^!~SmKWQcjBO3W+g z-;IkhBrcxhZ$TDDDQB^x!LHf>5h5B(%P+Wy-P}m4=VB)&wot*Ry}qmYT4f5ujR*wv^=8Q_6hL+nETJ2LD5 zp}|?<;OH2RGYn`;j4);+@G&cgRZUIwqy1}tb{v;HVE@vucB|>LOJf%-aLYg3R`&Mp z^%QKLz`3x+v%oG3q!V2hU6Hgbkug1Ntjr~Ytn74j#T?UjJ#D; z9L@Iyin}|6!6CT2ySuwX2AALx2rdbd5ZpbuI|Bp{HZZtbU~qT4e82y?FZb#8L-*;` z-Dg#uuI{SZwa<1ZjiZwx-Q(b>z-)ThD+sEx9+^Adg$gqaB` zz7=7A8u0nC1ZljwB9Ap0TID9jfBPLoWtp`rOvSJ#Y@*1^n3%9Nk1u_b%_RYi zaIQA~qz1iYxIm`#1LVX;dDqB}wS3WaSmKocXgY>6r7sMM^VEhbF~e23Jd& z{jU$6&GUh$~oDtxC)Vx=k8N1>hI+x$wMdL5Y|9 zt?kX--Hf2e)4{>vZUKptm+RZPX`X|J&o?`r*a~;Gas2El|08U0z*)xP1TNbO;7QNhaDUn4I1drD;kjb z)qCV5dd){c#?c8HlCjv?x-;1+&?Uc>qj;pj4o;2+jr1=pVpkC<2mgu&{q4Vv(6;zj z@PPH{eP4SCHt@ga(e*FKz`nDic;v9LyttSy(u1rv4eA> zL6b5T`vtXE;06D3DYbV~BL3ZM(+K;&%Wj2}GIK~)7SIBYYcO#D6kROH?7w~`xF8w? zma%|tVYkmM8w5aE#IAo)oF1|7&9JqBW@Ri63;YxI#nJ*8bE<=@qe1gB7DrpY_>HGd zV$TOB@t{Q+i{k>0TQC)EP3f zuFm7%4I<@Z7?LF8a2+AUUO-T6|haHk`8x7j+KjY+ISO~h;IX1fC zqojzV51xny?a5eNZ6#`76>MYWfS@uK*99DpVB%oE#X@YygYV|SebJyz8H@7*j{9?D z=6g-%<40@k;QHtxm74eR5eMF{5d|_5MgG6_eGkJqVGAq^g0{tO0mo&X*w<2X3EYNJa9RxgXV+DIegW6;)Rtq>z z!Nk7Mc#-QtfTJel-NXjGo2NhX|95%Igz;3fgK3f22Z}Co{jPuV2g@Suy>%&BEEaGa zgNc3a`(0{pa7*yBJz8H=U@j%6^h3pAepnHrDuF$}Y(k;K%ZYD=U3;~cS* zA7kqEAlaieW^jF!gkpVEL#O+rG-hx?6i8FXqI}B=osX`7B@LC%cEqXmvxAHt1)SDv zmYOOG-mDTYeSyfgk&)YKVAJZ!-+05(6F3xsc=5sC})U< zuU%tHVRPtjZ))KfeNx5`Q_x@VE=jcQYKX6TUOT{pU0QNjTCsQyeq`8%jsD1QIG4=Id#CcWq3Ap+&`E3;eA=GUUUa&B&a zsY|MZSSMvWBha*26oXhwvyGEcCN_l`^;}*Q=ljd`s#}cbT59#1T^*Z)cA88r{sX?M z9UTW>JOwYR970`u+J;marcuZmFmQ4HhkP-525E5q9Q~O+{u_H%Dz6qa(Sg$~es<$u zI~5rG8aTb*+$&HlSo6OUtk&Gz_82(H3FuFuxQ^*Mcx|-sOS{u?&`T4oWr&{#s!47Rp$n$S<&9Q37|9=43r7xB` zp7U15*$*F+`8$O^ehhUnKBBFT_BEnm854u4DfYXKqOrQeUegj z8O;hS3w)Y!tl#tSeH$YiQ0syv?M|vT!ew>lMZs!pS&qU8^yN$+_yBJ6;t86YN(6O`7dy~?_Wg-|DmLD}%W|U5b^K|$o1KKFCVBR4chbl%qFjq?z z+bTu~wpj=w1061EQSD&V%%lnTAM!DxX?;?~`1KxO>L;XjKI`{XznS?TpSCZd|qhx1%IIo2X6QTUhumE78>~(2@fsOHB{_52yF} zqVOY16G3Ki5IpA6Xugxw_V#C?h|b3}nG}90ilqsIQH8&5a}kW8(r`fn2gjzwLx_(D zUqK{IVjQ{BYSL@+X{xw2<@$(EzES;U#f;jD2H1G>8gri?P4ECGOgXD3&XrE@XIGycxB6> zSGMae-G7J(a~HjZe$(j9y3Q4%xf6m?YRa40ei&JaG*zXQ*p}a%Hn-}#|B4@7Eo2s( zvXc~|Y^}tG+%ixL_h+rq@kT@4f8xx}l@iD9hcXj?_9GrZNjY#=(&{^W=e!0p#w(LG z92AdcA<2@6o$N4SbY1glQaWtY_eEHBYSJa?^de#((f+jvv^cNhr!mqS!yR>eQ0n~G zvL!yP=7RB6DXBD_s9w#^88&jUf!)DSV7$H>Zcy9G$nAzJ<%et-_+q;tygI4C_BAoN zC$q6iZY-TJ@Zr0)K6(thk~25ZLzW7DIm)8K{@~?k)axDmZ?bqizB!8jSwuXwQFKM@ zRucZMrg8aiPGdRCV4rg1Z(!im=?2G|VqZ8VE?E6m{f@&TTRg2M;jYOyu$FxzhmuxK zC@GP>hCP9DGp3gTP56FP7`XQla=X^yl#-{h64L4F|4X}!D7LsTjMmpg`{?A`!UJhB zJ#II^bcHvFq*eG*_aX z6(e4SAC-adb2@14oAfpwc`}e-XLX9kjB*e+<8jla8|!bfz4J3XwWycY=alro8T1Sl{W@eI>$VNw_uxXJa`^JLTK@-)5vf}EA8@ejcr znJIR6WoPxbbf9CxD5aqNjZA5E2{|D8k!c41ciH!-=4*T3%KM?uLvkI|)%ia-X1X{2U!R>5ZQ{3*vlH6sC;2WI=2QHhnL$p| zcLR|D)TanjbtdI`j(_H-Q~0#LyXH8Rp|fH1A!&7MUVp_;a*qP|rdYpA7I-KeV~TyW zPyY|C31uZ63@8>W#ZvE`S}ZE8tjAA^uFPy}gh`FOv31Zw_NSPa={&^2n%+3};KlvN z4oRJ39&i1xrj#y*Et?P9f^O-V$8(r3?5mCldJuH1( z6)yosGqlCA%ezlIx+w`kyuSo%nvqU`RxWa}E-4Hnhv0`6YJDUlfvlNJsW-V^l~=egb+W3&NEdO@QN-tZa4oQ@jj|59>-EhT97mOB(NDSp-Fr7w!>-l=kN)BT+^) zNjuH0bMmL6Z+nv_#B_GK#Rrc+x5oENywa{E?9iH1l2cLbMEeqm2d$6gom+nxa@EU? zk0_kR2{z3_T6 zmW``n(Ineuyzk=84m>Iu1s8(Z4mS28r#5RGm2ofTIDyKvi#R-NaE zE72FC6@ffxF%r(`RBAZ0H(8pu?Ne*+k&Vc^Cx!xiv(GQN>GAFDzF+#{U)a%0TEKS2 zNlp^IRzYd5){=scLLPwQ2W#l_k;N-#I?`2wQxn^Xy-O#;NYR5_93dtdm9B!Ob|p>& zk{!xNkc3ApALa|`DA8Eb#9(hC&jFGG&NsggTygaWKb)=DdJ0{rSZHTstE?irfr`hr zwj#58A`%j>D}xsg8_<=9tm{_Xh>9l00yE-#VS?CjD!!+^+g^XI82kkJkNT#?8m(c6 z;xV!-v<);Jx{>XihTr6;Vl$}Ozlr+xHnHJZ(7Qr>&4?i_ib3ILEwbBWr7p>S>R}l5 ztKSFsR9C3A{%TyR(-B!N8&BdHADgi1oi1V3JW=T|WhdvjyZjty1)w>9&0=Xgwb@ZQ zZIdtvegC3Kv8oGpzQ0T-p6c*q3{byD(ko8pN~1cUY4Y~NXiobt@18&g=M6rCePp3z zKfL6mVMg<*apm%>W0L6fzV>QTYZG*n;zs75#DJ5qLaV3<$uNbqP?qCRNSPXHDwrh| zlQVJO&ofbErg=kkV>0pUk&KlG0A}7>4V_}BFLaitYk#643KuCcqK1-YLWjPMK^KTx zIaJO8HTF>zVqBKR-U`5Y4rVfk=a1~b~{I6n}hIO#^V zxoc#+_9GxA$%aPdeIDzERXuXG%a7CUcO~X5Su6F%A$A>T77FmE{xBrXY0%^lqYn$? zDy_1@D~C>Bhs&1ocV8P7Wkx_JUO53%H#r5keeXA0>h((1-7n7TrNCj-P5R zx`Kbcy&kB(dfoewEbf#9b<7)9D2|;3|GQHIkCdvI{2hHVuCDB$@v+`YU;G&%J6%m_ z&H*>ko4)h3I}YbOnD=~9=BF%P4{pq1?fF@4SxGa;_37J~Gji^7SyMRhng`TZly`EZ z)j-q^66>z*R2vXTDfu&~pPH!{Co?cR&&!Tief<6lNRG3Pi4*v2*6vLx! z)y}Ard3IqBOhf(goWY|g*(T9TPv6b~)z`m~d6(ySso--sdP%qp4QT6iZSW2(r!uN#9c@$~H1pP*Pf#$QB9JEaDvar-O`rNDb>2o5O9N{X7 zUPQ@GEH}W^ty__NxM|qIvdc>Wd*AF4zut*%!Nxn$76CSCtb@hbWNCtCjB)Nr*D%3a z!o5n)(m&S&fe@FBjGMQO{idT}8810@jFVPr4nyfg))uyc4M(Y2(_$Z=}i z(^;>04~}pt!U)w+5?8sSOI@FK#Fehj2?1^0l6Hg{kDDPOm}Sd>uhb^dR%RycMpLen zAIeuv5ujEXDL&Ry8k!&$215#li4-Fca9JNs#GxAGY$D6CRa@~cl%|?Hj^KA$ibdM( z$N}cx)3gw9r|D$NQj8TvDgKgei|A?6qd!!%I(pudqdcJXQv7B6>2_^~pfo z!H$+?qJmb0oSc@ol5tz($yTeE^0$4<7BRY^g0ZQX2mL0zVyfKq-IlSRy+ay@N zX#)ww9tHtKTzWqwTzc42N@O)~HFf>{0t4ftbiRyYg$Nam#Et^VWak+bRTt{Zzkhm~ z|N5TG3woNqt)_iq%81MpWi^(Zp_iFjkYDHCzJyJ3m)E}ygEan`Mp4#GzA2IB^UiEN zQ%$}qi+1GWI2o_kcF0VtXs5cGetpOi!#$+Y^upcka6wr-^rNys$5cn&gIT7)+HEoK zXTI>ypGkQ6aE!(FiQ;t96GHp(w!c$L)*Yy(z)vcYi!TBihIwT^dDx=+N%@SN_3e%M zM9N6V^K3`Fu2nq!mjKRTYprrXA`Q9Vwl|QOhWT$0asvtmW(~kFER(S$_Dnl^;EpCo zKL8y&MVIN*m*&uF?o7{4Iw5o$hhc;foESy(WjhC~ryn;BWV|T$7fAJC`DGLs*BuXz=qLwTzNGB)N7#QJOT&lEyY7L#u>z1lZ#=pF z>Y@Q^(mx}<(3vyQkW1@z85>D>D2@P!u#~?gbfv2*-WwpOyDAF$ysZ4u$v5d=_gqRi z*ap}Au4pJQ%yiA|71P&*@=mX+*@V!ju?RZgaCean}{m3eO>Z_=lSlMTn<)O%wYXgYZ>c&T{DPX}+q4 z8+lK;iELGZ^LfGHZrr*E)76?WgjWK)FeUPbn|G@ z9hT1-Xf@p6qJ|94V=ZeSO<9ZOr zf+JRV5c);!pjOC^^vI+R)rd!uWp{tbDav7?wubep(c956dcjIZt&lI zo<5JpfiJh)+b0?J$9XwDujjXrvN4X~g-4T}#)R7%iZ9Cl^XKW|Uu*#=Xf-&K04<19 znul|GYuIu|>T*)<<7-gf(HatVDEf4%IX6m3C;? zgKc5%r8GojR8MH9uCAu3(?e*9>($3yWQLot+tUXuR=|g7dQ)Ay7Z&D%s2s*L`D`trcfiOiD(M$V+t%8g$}LKcgm?vy`|)ySwm9-asbF`)vLVlR zFRYr#swmWgZxeb_=5hGFOLM9!lsx(}p?1jJS*vtBQy#RRFU_69Z;x``Qn5l2jdS1d zpxEuvN}^m^q$sSmBTJ$pD<0Ovi~%XX8oXdbb2v(Df3|4P$-;nOiDyJlE?uisDLk{fDy+@q*PFo%70CACO z!`z(79hz9C(zxV2Hi>E{@Lnnxv&QF@bY>?KP?6CefdO+muQao6W~92pE_l|<)t_2o zlH@u#MC}`i!w_`NUSde17K1AW(>yYVd~>$#up$1fv7BCN@FP4JaiY6cX5nBDufw+9 zq8bI&F|Xi>yHF`=dGu;LFlRrR4xA; zOOXT``6x=S67a2HAoQ7tVgPu^EymQmmm;Mt;RU3 z%HQxDybDL=IY6D zmTGZ9mE)U@0!VL(cR^8wcqS#9uF3TJ@I^yqTl3{HG(M*81n_&P!2$AZHtKK|-z%ZG z5BT`UGd2=PRfJBOju7&Or$c1V`#YK(BiUWgJ1zEguV0zUKLzq{wij$wN9 zJ-JXaGHhYZ`Cj_+n+-M#j}!U3dvnpjpNNyqRFc>t!Ni7keVVWe`wYwZyx$IDN+^N0um2mzfjn9<{ zgto@IO4MfkIS$RV;bo{sYJ5xxmgUJF`BOHB&!-iIU+>%tTj(fwIMwd4f#ZofEK8?B zYPUy|>wz(mxlP)L{1ye%L>-zLhlUJq+}|hZx&-ikur%F6rQYUF43S2Xl4vKbOBo^7 zc|>e}LHJ~A_^KPP(PJ;QJ8Xff-jMz_Puo*`eT#T3wPnX7%I@fs2PP(c$-U{RZ206I z0m%w_9(ll)oPq;LsAU4Nkp9y{>dM2$5*@I zk`X+19P-7U@*FD(?M9A^66HAKF`%w2LrjzF(Wc}3!+6%e^F0s;h^U64EQIUR+>~@5 zm=|B9MZ;{9wDic*8cIN;!ea(BX^~3$XM*IuCjz%H(2leOIv{4`c&xk;bCGqGF*UoC{96qX z#kGYibYeh(tFX$D?^I0^2BUH52exRuRz#6zE$Y-+#8L`oCC?BJ+Zgu|JH~- zKQ|Yhw)~n_v=CiOQJ}e`jFy_YdS#ILZJ1arR!J*dqRl$cd26W9Rd>8BHlej8%m80htQk5ZwK3HXMkhhF zNiEY}IH1&=Szw?TcAfd6MHP%Fc-&LyN_nW($+E&RY3s2gdNddJr*14{tP8^0B{cXXwF8k2`Ri|(m+`wSrYuuWqu~$b^nL~<(futt0n9Oz z%GkQz6PeBFWbiI$5Ei%d`r0uN_M>_A1zL?C~Yk=}6&Jf41(~ zAm+DXSt+k9WWKl$U~TG%Qt=bbjnJu9QGF50O8v@eoKKjVMOpO z9et-3ko|KU`K>hc15NLta_@|Sg~?`pCmwjq-y9`>3Ho5M-+z(S+yYITgFQXLX`v zPr5x{XS`mjm1j{$x|W7_Np?KCP}zEkl>8i(_F!RtEuH#lPs95xlS~%=;$Q)GLRY)7 zh@$6gF8Oi^?Ft+wDL0h8c>kwm&EIE_<}meBtLW3tWmOT4rPD1u=Skiw?M{T*}^o6=8p2L4Oi@ItuzL76zdT8xctBk*3CxL&dAeT7?Yo z^THhXQn}QrpoL$twE1$+H|$CiFzCVT|Lq7aSR;R{?9DHuXPpKxu0ILHUN_tK^x?zj z>&!AiUR*@&7wUL|?Jvlp^CQ65&+0TbKVIccD8T_F@~XR3;#b2#O`H0)9vqulm$l%H zOLY?nv;MSG8C@GJMyK)=XtTR4DY)arMldVi6pz&=bwV6etLZfx2m=!pDLZ! zw1K|9#^L#2N_ybk@p1kA{l*9Xw2#Lg@CbV}_APj6T)p?mn54R`-so912kGL?b$dXD zmU??>i!2ruf$)w|DkKk46bC-Qp$molH_Ck1kcjYdjyHBx!Omw*=o$EMZKoqon}lc%bbF=O|qQ>Dcl$MKUpm-Nz;PA*djSvb*`4&J`ITCkOP>_I4WY@lAcByE`EG z0_DuOrqB}5&a;#L#kn2+DANjg^X4DcC2#-7fkG^AR(x7D0W+u;LV3Yci-Y6r5QB#Y zayx|JM&>U7L4d;-E!$}%hrgZAJEnT|;qyq&5_4K2i!V-7sZ7X8=t7!^tZ$tfmpcYb z{in=XPx3f#=rR~=25AV@K&A2dpC9_e)+?>bM~NSDux{u2m-Y8fxFF zdCyO==zc7|Uo6^rc<4Qp0|j`$0}V}^k};ZkeEs6m?~Yb{-CVK1h$Mn6D%?(_0$iTb zKv7s&4QCv#r_n86hHgV%9<8oh1D{`ehJMzi`p@>)Sbiiyb5lF{P-sykaJ~^=)Zn^cp)Pe^!VY^(Q6cK zvfQ155|+bou>dmEh&cM}`t@~E+Vm{It`6ahb%5`KV5yC?H7+(BvUDhFSgyR-Sbwe@ ztOsnVb%i#%Im-=zqwnUE$mX#S+Y659D>7MLFsuw06sWFHV^W$pX{sR5On z^}F_F=3;ZciV09#jmu}gID77Z2c2rZycW)-t>Jx)k)M#6Vr4@~6-T~y6Z-F{MGlwC zd*dSv?Qk>S*k??9m(2Wg0F#Vq^}Fdv`6M;N12tE}G7 z-oUmF8X&ataL+x&=X)O>~Bz?lD{P0e4{pOsOCQMxA}SHYAGLy z%p{vu;Y``5A%&m7?p@%IjW?-826i^y#txk)7zGHnFCYB1#?FekSEldBmD)Kof4w6A zr<)EZu8fA4%lMBv(}|Z;LQ{b-AD~fIl4jT@II-IZJM{zZ?! zm}C0LH!?`~Em)qF{)OstN1UFdjRdzw;xX5v2Wc+fJ37#`rG~G4*zPF4y53GRfM++p z8bYs$1dLcU3~Ii-YhOnKOaP;Tlw=*bQofQ=3#6_}-2W6we_gdhGI(lD5)T&HzVmja z4rbdYGNuvNZ!aw0!s(Z-*~@AvdTLQ;1sW33bf6a;7}ZF@%w9hTg*#c9_D3Pfi+spz zb#s-unjdopUc68)Mn#o!<*;@t-EJ`Jf1jlVWSYUzd5`eaeG<-a{t4&i`1&k3p>X-8G~NJ0bb+fok#gEf;XpFtcjlLk&*Pn^;<4j&viy*}ma> zrF`?0?WUsaZfomuR?z=2o&m^gxrgv?oiphu$DBr;V*nPb95}Vm)tbT zm0_eWbpfXCS;dqe;Ezd~mq-u!-}2q|ba+tsAG0iwfC6A?JqWaZ1e@`WP{viUJGQhP z8k8TDA|;0x#H*V52J84@Ko_xQFw_=sE>+FaTO0NQ5=F)4PwbZ;GK0N%ZRMrr@5&WS zvEd-CzrTw1<0!@Vy2siX6V1iiWVM`)_aHYjOis!tV*LdfQsO~|u{_!09XpVn6?}Q~ zGINLY{H;IB&DX6VCf>VX1TKiGPo|t)3bMrT&2aM~w}gDGg~!?_Li}zl$PYV?KviF`OR0zC!_3gA@stpWL#B9$&`D%G`jTlAOD6A`&TeH9RH)!(TSS- z7DcV2G}++yPT#2I9gaS8)Iuu)qbUXC*L+?E7IVI@lx-OYTX${-s&!5g^Ln;F5>eblph>?ZNLC&4k!_ARI3 zNaUB?0o?BmlC0GM#I`bX!~W^Nr3N&Ls1k-)yOoN^79+L)1UxWO^;6tjzJ?e^w+a?J zgg!CZrPL}*jIMD~{h)k84m60yF*Q9^JAQ5EVx#3MTr$gEUmbLSqDI9+0W6;opg1wH zB%SO7&*P~>rwR6?9$cL_ruDK64SlmF%0D;QWPV~gC?ms;4dg=q3G5IqJbgolebn=F zFucFv$EMA+7C?De5}CH~^}RFjkk=xii^5qs%`~PkTlxhtPZHE6gzGJ z3jJTBrIu$h?kpov_ONY9yg@1(ko6-yXqk zgZXgr))w${uu9;WzN8fveH)6%tv2BqQI>4u$MxqxEqB&=E&9;aT3GpZH<}e+pqTjYsG+E*H30{aXK=5!Oplp+RWd5pa6t$M5ykAwo65_$tuC&do^DL<6`tW0nXlk#F(|2&*gZNUbWjTVd zS2z&tDSX_A2h8egoY-7aM4B1`lnt$DoZYRPndcmLKNn_2Q{Hl@i)TVNCx)loYHG{@ z=HgvPKJsTz;zKVHjbO`9iK7EPPgX=Y708?_~{(4KfCnCvJr76*sX_Y673C8nRTm7W9Z{ zo)%wfU&m8}wq)9fwn}};yUwMqgI;TP;YPuyZ1QS}X)+Jyuc{imlPL?-b z#9<+RVs=VNp8o<#gl^vdy7fP^eA`m%dLP&X;*&^$>j#t(AKd&!h~&{z0B@Sr5!`!kP;pvIJ8-CA1q@{-BqxRWW-(?Da(3}r>@b`0 z3LAN&D{3-WSX$YT0-POciYkA$QmRW>1o3}QdwhCnRe0i%$OBLW-(N}v`o26sw@MzA z(S&~`hW2XT*mH;wyDW(CQgJ5t$@NUX{{D{UNsUU1WkV!OirH@|Nh|%Sf#I}AStb0Y z_BLUPee4fSz=_WrnWAu>J(9qZakhQKOTb#Q-;HsL#eP#`6*8BKetG{tbgn3ysStg8 zQpryqjz%uI^OZ7H)anJOEAbFCX#L>9^!~zdE!IZ&{P+GTjtygjcTL9x3G?h=(VoZ4 z%k$-+2=sCmCd1BGst7VovU$-F2iD6~DZ%+J*1P-38PKz!|U^VIEdxBdHC<(2P+f6Yh{tmfF6#ZfESCy&q z`skB$C7G{xhluz*+i_;;Dak;CnL#v4TQ9fQ)MpG#y#LP<&|~cz_*N`ng-{g#3tah9c*xEX%Akiuv40UC0#du3@9e+rNxNKC92<(a2#l~V zo;;RJ2k}|dFEP7JMOAs5-!R7V94`(GxPH_kd^8#lIZC$B4tRpQ%~#x@^GKOy)MB*Lw7#lOB^-X^Pjk&uX`Lup$^9KN z!{Z$oD!K{VpjQ0!lVOGpLfT^FwZhurLbS#o@0uld*H1CNLeSxYw#FannkC(;RtV&h8%Lfx{ofVCu)BXWhAhsb40t~00?9ln*AK`xFMQ{neXUA_3QA7(YBuB&QkVl zvG^nKv^74*wGhEIM&UknN|h28_}R?#OEDY@jBa%LZ}yVp%$X!>`EI6zHl!bO>%CG0 ziE#=qrR0IBTO_GG!=!C!wlcXj*6p1E9cbqaCdW4iOQTjjmffD%D+%G4Qx~u|`FqQ{ zG99OumNpX+1bzfGV^`$(lWU<)R?fTGD((UJGg_>UD{YbuQ`7 z9~c6QTNkS?&@mpX`cRNFu-=jw6EOqcV+b4%ni z7~n%I|D`Y8r^bdB4Z(M(tku7=bX(jG8Gcn0cPho7WfhJY4ZN|G`f)A)_A&FK)bZvu zOhuIt5*6$a_s9A7$>a4~kyF4=nv=pc}R^q0UZMkqFfn`ft4&&+D=%op@-jxyN=~rJoiiRsfXzB-L)^Q>+7Rz$1 zPzcwD#c(mq-{sM-Zt!l#0u9K{fbp@9hKLQuUt$EGyMhoDAk^8PTB<@9ldhBSH}nD& zp^;7$_~hCxBN>IH`Wd0^As$}d@8E-JHtvW%wc)4gl}JA{;|}>4v~zXy3AmO>gGQ|S zC<6%B_)^*k8N67F!PWM^o15XIg*D{UroY6bWGxvHoqSPRT)RS3)Qhm#;gJ-6%fTs{;O9hWl zg2Inl1AsC+OpoEd&NvaQ74=m;9EsdEr#5eATklmb!rjLpH~7WK10h4mB(l`}8@)dl z3Vhl%lGN?nIr@Rhb4Wii(ygeo^oDGWokNSO)XE&{xw9Hiy@Cs6dq*XyEp=?xJMBTT ztM`u5i<3}hi4W+rpTWz(9 zY9Z||DxnGMGB@0Nifpc6iP=fF$t|0Y*_dOL?AL}bk$SsI2e$O4P=JW@ z^23w}Mq0a{q)913=c3kRp~5wLxX76Vox)8h-a%spr6mrj=ood%eHI^{dNzbG24!YG zh)0{OiG>E+`gXKX!=}l>875*t{0Mew`)HJU+<7Z{rg_d*nK7w!I0-k%U;HFqWG}CSvs7sdTym%KZ<69>MSmFITHMbOkz;wE1`BrM9 zG!_l*+~I|GOgu$KEY22Zo&iDfNouSxyt|G>oXN2mQ&A{~sWnHb39+Y|l~pzEL#(2b z3uYhtkQnC4QOFg)em70D22w+2F=gu<(r4+x+`nPX3_kPPI%HN_g-$d0ZBaj-3S%b7 zcyDltZIa;#&LX$$(dOZ8JCJeZJHWu1jWvck*i^OWx@zTFexik(!vyQ4oU8)lDQ3bG z>LOi8o1=|yIqYp3f$_eCh(T_~Q*W;&?R5L<=FycfytTy$6{aWAQW(zFfRz{T1w(M> z0Jd6Lz!*GL@-YbOly{8NaxYiVpt z-6s>2WePqfSkT$Zq9CTF+i<{)7a z`Mt`Wa0vDjr39c$MDY0%#bC`q>p!Z)jn&)Z^?mp49^^>nrT^jP$(OQr9Ryl@idi@7 z4tP1hRrabWwloW;fc0oMcXI<9BprRY?y&KWMfR*yBe_m7HVp4jCr76Kun3NV5v=*= zI14k&pLBMZu+x@<@mM+{5`_d?emLqp>3C{bs=`u(?Xdhv-&5-D!v1CCqw{wd8ssxF zsolC0=@`NRvLP|>wZoY@dj2p`yP`<*IR44`CV98`V|kCbNI=NN!{ORsf%li!%We7q zzvRvzVZ*sUS}khK%_vDI*Yg(^miHSq0-!xcyOl zH6%5)Y;^+6EEQ?_2OTH^^Pu!0HJKehq}l+<gck%~;Y!L=(lO6ZJ#r^0YBKl9==AADilmeI{5&{OH??n@AzoQDl{{H{d|Qzl zffVUFH366s%+@nRt=0$l)|53cXC#aP zNX2K@AIWp5WkAQDiY@U&igUjjO)WaWMal%G8s`K0Mi#lOKS|qQW4GKO1B!i#{USL5Bn&Hf_15r}a?FO|DM6DmTXLku&X?siz(vpl(P=5${ z9>cu}3%cIkzHE@+j^gqi3k!#V3$p_^uY|LtoSI3Sy!pdl7qejb)-Y5C90GlE@vVUH-N_T79WGJy zS9K9~Us2!n(DZqbI85F#xV<|w;_;(nk?uLrku4ylcL=-SoW#i`p1!%)i($E)o93$>#X0tKpF)Q@K7HjnOm%x9>7X*E>t~{vJNS zt~d9lx4pILrJJLdD+4zP(;okOCL^UjBs>Njs24JTO@$<5fIG9}Xjs5-i;?^0fVbtg z?#<^nCRhs~_{4mMM36Id&@ghm`9x&-misD*po{Ok?7K$)YXCug|HCO>z=xuM>nDP= z{X7XXKz2^|?9@gN=&{T9((Y{RV5KN+xzb>7|1OVW>!9}+f#_|DsYQ^m$g<2Z^1|7A z*W0yvh(C~oW22`_kh>?yzdD%ze_+{pkvz9Ysuef+G-IW8m?DIX5f&XrAU{04Jl;1q zob9;l=)*UB?>`HYGiEFv-}E(NM{dzO-?t+dTlRU`*=lvH2Gti>QDGOBP89AA;;8qK zvh=@)wB$XcN4xdU1r{J5=qP0IS zN}>M@ieZJ-GK5)lbuKUpt+OZIDEmSy^yoJRtX;4zHBi+yl-+Tb9Z)yE85+DMk0TU} z5_+%UI5BI2t7wecgCx{qg{r$2lM(5f#~7=s39|3*SmVBK^_PxUT?67EISbZ1!x#pu zapdg)5gXiB2<|o^2%lt>K9Oy3E%yjY=ogsX@z**o1$>rNn@i>o)~@Xq60A(r{x4$8%T>X|3$RUJ3*gF!YyJa0qf+^7du@| zJV-AXjai`IE6ZMyV7ZCZ1^ViVa73KU3Tg5Er&eypzTi_aHMR{C{tv384=u05EW!s|a< zvQ9G#PYTU=;;tA?His8Mzk4!yUc1+46BTp0|LPL+bi_E2%QTjz4;}aQcsyXX{|Mzj zZ()6(`RcA_du4n)vEL(1n|vCb2rVgoNA$^V(c_*_Cr9d@e-q_>nFt$6?7_>n<$9}D z_@Z=hg1#6|6C=OPSfo{Ie}@{JJbh;L*2x^GuOQex`tw3;k}^EE#(-J5(Ds0|lTi%b z9-`4E@%Vh7qSQeOEp~IE$8rEx5y1H4CZkKLB>yu~3+1Kdw3qkK*JN$!RL zk=)on*tFrLK7M@uT>g7WcQ$I z79N6iED1M^2du}b5JcyUrmP>)Aav!UlMwc?=cSYh$0XaFIm}h&>osjU;&Lc~QbbbZUSH3W5gegJa~d<)4P z(F}8xV(dxm^}T>)Y2fC*`CZrNrJ#zL{J zfZqD0*)iZ!=TdV#dRGD#+pRVJI_GO~6~`eN;viCA<7m)-6@*m1qNAjWN9%KWvmxw4 zGSaM9anreQAogG8gZ@Flk`Uhu@g!=sIuO*hZX2j&r&IABM>;4cP|n@2dLL=_#M!j8 zr#=3&I869f zAuh0NUDplWvk7s07eU|9Frk*=ScdOFXd4)!aW%;Y!M;dbwtY7TIx5hM*uG`0_Xf`# zTnnR})APa2oBl6`p_#S%+e;cPx1*LC@)=GGE8d0x>9CCxU>bHq9stSP-HWDh=#C=B zu(1yiMUL)z!18t5qKKHf?-PKLmZ_-~*D- z)m5kyfGo?fP2jmYG+f;=49l`H)F45YV<4pYCM2#+OspHgb~Mv~RNvsFJRk|(Z>*XQ zYIS2(v~MZs5fnWA0Fu6`-y1s6GR&6F@&af>CRi~CYurTT;LB9n=0}p}c)G3`rh}jX zd~Ex^X;bJztXrA~ZHo}i_bhADhq!t4i?!1Q$An`~R4H51s^bNILq!eUGP3QWjWAAW z-6j=plZqQ874Q7@um8a5U;nzZBe`Ygf0ff%`7r4XQv5iNYCiIv|J_wr{rlevs4bzS@f08IY` zrUrk4Iy5ZP1Uj;Q0?>q}{*waM?zzFgoMkxu39Q}M^x*y=|8Np~peYODXji#KJ2*+I zKV@>@jz^{6Onmk#k3@Et5(aLH(|g5_Q{^hnsbCkjGmJ-cSDCZqHr}} zw>|-ilBeOA{3!t0yr3YvPv~w*-p*}Fi`{d2NT1!Q5A$!~{=dZ`*J?K*0G9552#|)* z^#0co+V20y`1e#%Rpl(9(TDR>g(Z{(en1owM}9EKQxW*sd8+)EM@4!kZ+uCq;?gj_ z+ldnz-6qk|2oLD)j-m)$mjcJVk`1X+G*Czw&?r*^-f%}zQkujp$l~;VR~ZaR+6&^k zd?=t)3Dp#@l3~6fGdw6I*MG4gMuxfT5)B)siwJZKth+j)1~Dz)1q1=d*KDAf27=V} zG-!H0!j@;+u8s`XA-e5qpfLqW9)?O1hXJ|YQN&;8;*VYB$Ulv<^OQ0^pdEqjW02C< zIZnN{vwjz(bie@@&-)m6!zr(DHo#V&=v&wWJ*h)My_|0idf0&w85XuoOl)M?E}*)J zd=GgTAZlZZiKaW)*NBg>fh>pUE^!>+fWF;`hE`LZr16NWb8Tn3gj+n(73PNXT()10 zYhspBPw&BUdTq@mlzPa-re?bcLeDf@liI-3v8H(ddc;Pq4XLRC&#gx^qZZ*3R&Db!Gv$nHa!Y!WN3UkBRE!(fgwOCjf!0)0|~%W*t{9mgOJ@O0`LmTCAzfY@*y3+RTWAzdTbrYh)Y}(>OLSy2M*Bzw1MtnXb|Gth+4oxnD{;hu89eT z9&vpOVH3c)>^swa)2ZGWgt3dm@f^`i!I2W*(liY`Dl9Z9z6@t&zfp zIV)OEVBzg(lm#gjZ4{6CK@^CEQz`^?$ben$?;RiRDn1Sw-Pz%$S{jETO)I=K!fr^5 z4O@QO+fj-yyj@|uO;a&$s&K2RC%*rH!@yHwVVN=or<}kfjPFM@%APA8rlUAwG*jYK zVHwV-pNEX{!$BHeTQ(ZRiF`YKM9gNhjToR1;!#`WlC7p}xEIObe&FCzOF?xyYKuiTkqXdH} zPWjde82_%MpKqNrO=Xk285&o{^5x&Ji$hV$=s{P#t4a?JkL?C{f0 zs^b%4^0=66HJ1F7pDz^2#erAK!h+>SBOG~uVb3ZNT%L8D8-;^ur)VU0)GP{|4%iZ4 z{nzNbbZsnb)wa%LKAa?Ft0w+a50eL(rWtx*UU%*UYt&y_l zc?wqE#A)ywpUzM@k3D5C&tgV!NYg3B04gl|=hxR+5C*@AnLMW{p;5+pnm4q^?M~<@PVbjC zm80I55{xU!0il?XIFGW0N?6fsPd1yoMNo(hdIk=dJ%_G%GdsW8AM(X z4Hiy(>S9t&_o3i0#n?#EV=^|GYt_{HqB7E>~FY{)3W?m5e+~gJi`ZB4O?o%Zc6iw%RSz zJ5;G~);nxp)$Jd9u%9A<6l#u)^Swy>_`!9Tt7eqW06dlBO(H%}bW$*lm1M@9j#vpHU zm!=WTDC-4r--`(oH{@7f*6L6_oM9CwNm(SLUt3kRTvbu>gHbh!JvE5@I33Bhe3TzJ zX<{MDv7VkC9DY6BJ2~7fOhP}Pp?5+3^6%o4bDRx##Xjgou}AqV?Cg}QTIzq&WpsiQ z0WYD;Kq~)69pOYRR717cZ!=Bh$5k^`*%yLJNzx!rgX~@*A!bt9_5$ChDQD@7i(|pu zu5{8cGNfM46~q#5pM#x>E|jMVyJs04seCLdNrNmPI4m{JFpTe5x#zh?feT?d#wuvt zss60c;=3EZxT=Sv0ZrqasbfMGVW;2uf(Dr~jG0hCIooIa04zT!t(K2N8WlYz zNkAdqo-F8T9u(K&dOH=NV)p9brJV<_UaKsFu>9 z%?g)`tY|~)$BsO#`^7;m$Szb@PITcIM?Ib;321M|6#>(bU8;#;Z&TwL5m z$_*7-9XCv;aPY6Bw&2l>rlTN|Lx@w4rak2i4QpzNLdF}Qw=+rPf|1nxE2Qy&<^e4m z*D@-{xaQJ&p2jYni2|u=69FW(mJ(L#A{D*0&%@xBMwBs?b7~-dV;N4fJW&(gJ?lSP z7V~!{0}85+3sg!nhi=|xJ{CnOX{fnE567X8a02a))MY2*9}^C2X;pmVUwz}J9zT)q z0yY#NWV;>csW3IxTs2~7iW>P&r}1tS{gS@nfceD32Q z%u{+bOey08^KZt!b`J-gc)i+Y^O?Q+`a!t8!oFqqHtaq*Z5!tI`N)4XhQE|<h#} z&XW1e&gw`v%<2X1Eu*(#^!lW2n9b**-UO3RGczhaf66t=fGH!2Bc^cE9y0|iBm6xW z;*Dd1ogJyM;)xjTq$)1f7H7)c zFd)+5=?8pk#I;W*mGhsOQbVg0&)k(BHRUc1vW!N(vOB3KE>jazD%>}O*1lA667;#P z8phaDxf!3Qgt9(YA#Y*-X=Na&@EJEa3MzzusuCDSk;hG2stn`1<^vhW!b-2Ow9qVt17Oe#S%<}~T;S0YL!-<5Mg zl|hOL_46>ie0JLSd!%qKH_}vrktb-kU>0VN+qxlMa7Q zrjXk;6ONmbEEokLPD_{m&zvQHF43%{dRIiCgJ|X~n+^UH5Oa>SG3*JxDPthw^a)0s z%rYGN7jZ@ekvufmbAB8N*Ly~Kz238$a2BBqenO07!V8WRSfY7eb4-e0NgRduhU$rw3+XA%eLwgv(U)hNT)KcwOvGdY+#HnEDO3cq) zb9-Q%XA^nKfM#Pk8AKUPIV)XX9E)#-R2_#UYNM9~?+WZwL#o`GV~Hrzoy1V5Y$X}9 zn-HI3)H2LFq)II=A-?HNuI{%n>Ti6-ihOnI6~;hq8LAT@h^o|5=`pQY2tmX$iajOv zYyI%n-xASzd#ykWXn# z|NTEZwO$u0cSV~f+TFP6dg@()XR&%$W~Ve)@5(8d5T{jM&r(@hfUc|G6=)X8(z2Ha z*YB#yU8dkw;nuiJ%f?Zam7|OT&kOHxO6&9aD)>&l6aI~OOP$ToDR?{fCA4f)%9t$0 z)DLdz-`vlCgBuGQHZw{ivY1ejp43FpJyk9wa#l}b5oIwP(V&j7N=$kp7OGf+ zr%$I&#$n8|@u^rpVZ=A%O)5!$6Ekr?KoB(^8RH*LjY1K7qXEkft!$QTn*+?IX zxT)UfQdniBHqiTPZM!P|62;F-Ebaj;*8F9=5f7JynRUNSvLabs}ah0&T3fG<4mVA?iKxK`-KqjVhVqQr;x9oPXFaSpHAwC$0t^ zRvT+-yo*%4*+r@a3ufYqyPOk~ke+|oe_s6h=KQ&m+>+-C9VOZQL6AN#&bsI0-S%9Z zQ(X7q>>)$swLn60TeqmhQ;X%j*F@ZH=3}W%{l_2-h1MfXrs%#ZNRSrxxU}Rrp3~}1 zU4{Rna2aH=Jf~#9KMwN|EseFwSZq1L^_25({r}|Te2x9D*^qvf;D7)2yl7gaf%BF> zt3MZ~C#(15=Go*fk)NM%ie!g^IC-f-d8!mCiM5q0oN|F*M>`G>3vlX*{24Wl!osmp zCfv>lN><&P){HbjvPkC?aFWJx95s?AK_6zxJD)~Wb?@k zSUF?f95A7Ms9#=PetSNVvr(a-=^Xz-F|JvBd{2ufixnC&Dp3xCTN)`$j!F({7Cw)J z>y~=TUutAL6RaswM|l`NSE6_VlTb%RI*JGj^1U;RD^JC|(a1jQIHVb+)>*yCPPxPK z>S{`JaS=kH-vcH%l!Q1KJs&T6k&aS*&o|zLbyAD;l#TW|4$=92oTsWlS)<{)aOIIW z`bSyvQ8+KYO(6Kzt6c}i3d>zpCig_FWXsAX@Wvaq^o@(W;#5{_5_cS{t;3g6Ww|TN zhk`7*xzaengCe1PLM-lyI|e6lz2r$LAhRjfJsGe2N7S0HWW9G5uyV+vJCAuBISsGJHWUE{bK+OBdzvG*|zGJ3{U*YWVLhE%~) zIL3ZOV>t?b@K81mB`lm97W_tc6~}R22NiPZREUKUBRP@_S$Xf_!@iOyain}3a%C)! z_~PO){8k7q-f;T%@qT5Ol!s5r8GJE@IOY0Ec1LNX;IN*?zEhj!Hj`YSrX_b8@m$*dCSDM4JD&|w1N#c94t7ONMqDBOzE`#5w{PLyf{ezsbZ;DUF zLs-h7xFuiA$8#Z}2#(6La~!G*ev|ueB+x0vXo@8m^H@=)LwTw|$!UKG*0{xK7!O!S z-nhkSpM!6?T3OzbXVo|fWn46_5&0BX|=4_PwfD2r#?w@aQA8+fYd9=I85N@#b z(>&VpMRUHWs!;7e4vc2!|H{>c+=29NF!>f^brUx6<{ukI7!J>h1Acm=dfSI^S>!YZGn zwWNwKR4roV#UvM3XQfLlPD@9~27Cb8%~E%)<*k&7z??DockgVY`}V@el0ktBv>J9DWDFO(k7& zawR?#C=*JAmuC%ML@8UO&q4mh2QU#wsl3Cx)kjL{>5>i#9f8_c(hEPjSIa6J3;3!G zTQy;=vTYeHUBzD$QKs4K$eIgnOonvAa}F6VlYp0BoEF0xSD^U=^Y25m@7xtHLhGxS zyQtjLY^`PE)eBwp-f)$tv2Is*k%02X0;)=e6mvAH`(Q{^(w21*#PtX4*q8((=c(@X8+$_<|l>81R=MgQn^Ape?(agZU!iCTQ7iX^{c z)=xQKNDn-pa1uu>OK~8|lD0a;WI?PT8mRPEhT;2|v0xC1G9ldV?LUpg!wB;7)w3P` z*X6`jtQy}j1^XhK|Gq|(Ecn>ETv8L#%HC8Qc`A;wKrKIcwp0E#hsZ2W;xHcEUnYD@ z?ypH{dACwrsg(CB%MMf~dQiuc!4-u?-LtBA+X#QZyrFly%6|q?Mh7(gyI_wJ@EzZ) z|H-m6hz9bTyCIFPBZjkp`Jz_U)b}DJK3=x}l#=@IQ>Ab+F$q~57B^1V2G&gA6zem_ zE9Ri;WU3k@*U$ID05e)8z7$#;jj}Y5pY~}+`ZAx5&sLIfv43=4CPK0c0wAS8MX8izs`8{v zX(RFIN%`5`-Cb|u^PLH&Sb4R#3|ld!FUx(i1qGgZJJoIA-5uqr@{uYz%W)XqD=8)M zXhb7V(6p%9UI#xo8Z;NXV;(k46c@o4q^CmT`R^`)O8GlEDI?|T@mtJVL2J{&QF3U;LF=9gTh{1#f8gp z)WGscj#bX0ABSOlCraKvRYEQtNROEkQ7+SQdM^u!7S&Frd69TMFucMR1^zV0Z>ZBoA)RM(aHIK@jF^Iq8~5;~q&ub{=L zQh!0LdSRnzSig(2{G~bBZt-o=qQkN6DFX){jj{mC4633KVd>Z5on1~`Ko`4C#m_1n zT#+q&P-Tr<>DP|)L7BT;>WY<{MXB136P0d)Fuc4AGBT_Mi|BVz<=HEWRI;x}=eK&5 zs5b9gbLuv4DHZupYUSC=8Jw!xw_pw@7hai$n$D#N!&N2FPBUe`Dkok|L|160V z7I>84v{rX-?9~z$!Gt@ju*CSNA| zB;x<|I0?nKQ7mlKiM}`PN^S2Q9hKsVww9nN=jybAP;3 zqegU-Gh_U?+-w1?G>@X$nHbBgVEib@952qK#KY13lG3$x{FU4DA;d)e6}~Rgq6Yt< zLStg?YMmAj%n1EY!RbIySl#*J7F)nsuk<&m!Yd+6f_s5TUB~rQu`n*~&}Xrdq_UHV z#V8RGQKVK5OuSQ5xo1=r=aqa>l_-vCQec{Z+BZ*%blQIJmhm3zDU)^8r7&|8LH-bD z)w*)!fuH|F8cmX%6)!g{f&%*xMG|~J$*p*R-VX{1$%_Rsd0OiWIR>e zrBqVuGom6AgRg=gz-(#LQz|; zFO~f-)0Qe4o2p7mb4{tjJy%WYs1=Q0)b64aO}#e#7#dM+hUe)+V>P9AgG@5m^~EtC z^>KU?h%Y#EOeR}gRkz9o?+mKzV^RYspeAt_qX^^jc2IR`yijsDK>x2j-e9i1UJShU zx&UamFRDkWYx^RNbItH^;q~r`52x)-6^WcvT^857Sk1XZ@5w>yW|x3!i5`UWlreQJ`qlFu{jcL^QqN;={77mqOTtEd004lg>*6N>VEQN0Oyei0L&Gvnpd;%i zfHX@-KPlkBNB`4LKjqx~{|T(!*Yx22ApidP&;DO`#5qtEQV?cI5&Lw*oF-`y$qF39 z@q4*REbCrLRw(kNib_M=-Y?&M9Y3Brsgd+{{@VZ7zjprl&njo=iEPjtCisb>{)->M z{M*1+dLN|LP^y#46?H<4+V9Lx1kg)4*hjWy}!NF}1`6s}# zeh$_sht%nZ`$^v26`dgHF|AD?s$)jKV~jq6D8M{C2V-27N1G>2-H_g~^m_m(SSLx= z+YZ?I6~^}N&eH$F4GJq~j0ylqxSIxwQWks^mI|5H1b~tj*#bo>BY_$)0CEmx8-SvW z1YpDfpgavcnat)%SDlublcUQFH&^VqoQvx0XQ4Q=B!iiFZFJGm}y8Qr6wHSkip%71hjr{RD9-c0ukdg|=|Fbr$&^`>Xf{@=_YL@-WnyOrd>Hw%!ouQOf76p?25tW$xj5N|Wq_NaH9J1w zVoW78ykxFrh<{|(QfK{(TM;d}z@GI#7!F37{6FYVCQs}CF&?u1ugFT)Lcxi}z=KwC zzY@v@tP5Do7TYqWq0Xh4cu;CXS$QdpmIyq<6`q4<#pRrn7eYuVUaG=PQM#lmFp*yr zppY<7sfq5VPY0rO?;9EiNIGwm<0qBE+0m;egg`}u>;Ob>*Hs`DI5I5XVZ3nTC43#Z zqC=^q^ilAn10y`(ydeWj!8zd254;?Yq8L8C$&N-soiUPACwWX9@T^iUlf<$=AnW|M zccdWpnwWjWBy)_$ z6=tTOCJKRp*@RNdd~*-m3a>ysiKUH*UlL>C92H)f$Nvr2p&gdsjq*{yMF5qGxcthF z5zQ(jEV*$hMKrM84?&j4>5c{PkW_f7JyTf8XT9` zeQg-4DFx5xH3KhA7ywG-wl!xWxr@o5HhH8DxLd?0UPRIY zI{Z58I7Jhk5}kplPiHATb-BBf(5f*VQyFofnY2d^lQb?7G_Sf*k+u}VP{0ccjg-EfHVO`@lHJ})d!wPCY38PQK=$}X!tt0<& zukyBMfP3Y?k#7I#Po}dc`R_3vV%(PP|L5$cLZ$T|*n~JXRjN(@MHa)fg7 z0vrM^h<&~7e!X>olZUiZKKcMuI+y0ozGE3vo24d6t5p#9Vx-AEr4cM>XqpUFnD0LV zLTUa(9Qr7Aq;`yC(%*#EvQ+4wHxAs1mXS5VyhVw_)O!6%`V z?8ZGdg%SeK5vxt|LRBXj=a0+~NR569Qi^e~xXkO`9+8`{+ks*jyoaH$nN5+amr3kj zOQwX%&Pru1M!P-bX$_1!Q--aUJBba3nXsOe%pCVKa>#pjjn3eIZgvS`VxRQlq;cQ& zw}&LX0ZCW3AGQ@mJyEWPH)`kZvpX=?;s3(n@$>k9jK-6p&i@C)C;tB^58?mU$crN% zOKg%8FqZbXAQ#5aXSw)tEl8e~aE-)-&{Z(RyyUZiqIXa%(BqA|`RZ-fA-ZqKq;iX43Xh1ezwLZ~!je4l* zm&zNU#;evxjn~+N+P9k^^b7yYHB4kwO!i;yyeMyNeP97v_`6p-jc+~G0ln;_PJ)n} zdS1MVa;@ybbf{w@)B>R2Ol8R&bhIN@yB;qWEKvb4?@}y4>}ybQ>Z)k3D0iRcq`2G; zsBTdyTG^%o#(vDFBSTO2EU0#Lvj>?trTJUJI-Nt$HZMzs$wkVVW!dbjU0zuFTwqxw z(wt>snhF+ZXr7vk%Fqm}+P-AnBu;Y}TCpmN@Tyu;>ioaIMWB}axAi{f{jb5WKhy7j z&H7LGKOW^N-T$~Og8i}FG9+0++uI;y-!mTuC0lRr0T4eixcuo%Hm}N=&&xJSTw3go zhv+wOC>%rxI^;WL!{kMW9p#W}a(ZL^+~b+lu5^Zkk?ZOwLppKwa$TgUV$vo67!?G2ae21Hygef7OO_DX3nvhvA&8s*>Uy$P{ zL0okiwRkqwau~I>(AeLz#I4IPNuC+}nf$>`-F5>f1BfN^`wic>LF5O~@@W*CHIv36 zVu4^_5`3S=o1}vB2RtZ@ylxsFiEJoyz-@LJylchUL6F=7RJD&>$iqnMW(o9|_vaM~ z5zLT#!CxEPYR$yuxE5s$bRAkHnLnPMSZDvI+If2kV9);FpY-+f-~PBidfNXV<6-+h z0@sF&h-?$LZ`IsxW7v!Z&!&KXA3jaJ<=-Umw+$+9V9YLsSrkby_L8Ajwe0`h)R%he zpRnG~<^MYz_e=8sWb(BBALS|8e|WN_mi8WDNUm}K=0Vu&`v3CC?~(-z}v&eZi0R(toE;)93*R-3D9CMv2o_53`LJU{ul zbf!$!eUq}v+w+=F$$ieA6?0K{_S`cWOU|AGhtK5eDWP6!vdYzy*OOg6HIn{*uAZU? zPoAD_o(B6rq^ehQF<_tkKhw{DhQq<=>HhblJd*q`>(`C-0M&V+Y`arSxGZCKwcenZ z2#opz-~{LA6NmYwf+lViB>wmp7lQ-4F|ga z-+0=8TK|vnw21$3&8EXcM}SgXa#)dPTOq2mr6sWNJyRdf=tK{ z6+xm3@B{LqFEj{*61(6&ks#hgFHwj-Vx$q zVi;^=ya!RrI)c?e?;bG_1KXf48ZP(h_zk6HXA84n2=riGc2AKPic#AZN6t4~J}G#X z<}3^)s<%+E+4VYggMt}`ux_D#YICcQvrzp-O_}S^FDAuf`Br;0LyptW9%a( z^|HFYE|6@EG51!=z$9Smx&qe<{=288%>p5|Bz{CFYCENo+#IA*+!isMR z|4;HM?~naox~F6C0d`Hok0t%34j(Jgr~}lm?OMds zvWy}FT|I=dqcXdGbBlK3Fon%r2RM1UK@M<8Qt?ZeuN>fX@oSQ4$?-N>9Gxvl%sTwc{;fpM{|EE=cNCCnyOqJm(ppp^|&2J z3Zo-8Q^&&F)j*Q0;dSODxi_SIAUMkKm~QdzIe4~;vs{iH#h{aX+SW6^L#k1b$}Y_o z-0w)Ulg(Dz7eNmP~0K??44kF{X?`}dZE{;W@H`JYJ~bq)mf z`Txvjy8qvJ+JBP&ALS9}e~O5pC$47afI*a@wDKUZN+QO~oTWSz-w#NZ>l5H821EY! z9Dj6El*Cz($LS7y`gBrJFo#R<>61fYUT(sW2IJ7Ik!qbp6e9-ha+Y-^!#exP+@|{n zDB7MJNZSL;$z8qa@It!rnb)Q!B=L(VO|)=VG8ZX@89!!ezU9xfwqlIAQ=-2JleKe6 z&QDm1^BrlbN2@R5R2nm5K6S@-P-(h3V5AAJ!$^7i96Z|+LYDh}Yv}M+?xfi?M0WX; z0}e@=g`k+~c%N0%P&Skr2x>_h=dl-uC*bDn@&KmGOr9rp(6}TyyrNNz&0XpOr`six z0siw|s5-1AD*zT&>1B}0Hol&t+z2TNXObzGDk(o=y@pwx^E6l!BcA+;`rS&twyt3u zg9V7w3S^f-UZ`<(%Y6$oG#%G1eJy;3izzAeI(jI;Rk#z-OXE22xmmXA1^&Abx>3@U4)BTS}c?ADw=Ip~1 zEl`RgFNl_48RUg<)6tYb5JY(_9iULNd4tm(v&H=}c8JEZ9^D8Hfjk>Xixh@%IB5Yv zRopaqbsSif%}a4kV3Pfhv5!u`a5BZ4K#taIZ|j0vv=j0wHE$*+5%$Td_eXo`^M4+0 zuc7g;PW zF!E`HirzekdfAHn-Sx;nS%^>qf@l#$LB89M^aC4dKI7Ad|BG(cybQ93|MzE;68|6c zpYDG=%475Yk|X&(rt?=3)YtC%RSFescKi}u_$*#urfu#s`+OC&sr2}2B#hTz|2z^j zk^fk{)rXP)#$)~d7yj|I{vYEJ@}Gz*PDi()%~u2#m%?Y;7qBS|xz%KQMj-wOllJ$t zy1YTfX4}YO%i9&G@8CK-0Uzm!4pH2>1h~rc3r9qA*yl5d6tZ7%ln#L+by-VOjqlJmr6SoTtqH@2mgITR~a>7o6Cj|MPEq^nbNj z9sOUeaZmlffl@E+bALpoUQCIHQtD-Te14^VkJpVrrnb)w-L71`Gr#De+$&h3A{96# z#}?ihUW`F1xr^9gs*WS&Pbq@_n<(6!fIO8$-L>@0so{%LIlg}!`^TUCX|w-}VSX6< z&tNvv&BP;bj!s3Z~cjWY(LjkKW(S~>=*u8Yp-qieeIUmlYYe_>BI?&XfD;(saOjTz$~DM#@+`h zT5e!^ugtG95JQ6pwIq&h5^-6>fC>HdT@bQJ*MC-X_tT?2&Gp*m%0pA3m2w|bA)M1e2AYK?%>jN11q$V`nF2bCY+MgG}{=)^q znawJH%r7y04vn9+{fG*`=xt+tKf7mOAKusOp@aE6?KNN4(~|!`Wc-H_7WVb{50fYT z|52XO{m=Uz{~EYtar(|ejtvPQl9I43F zo3}Tw-VKxzgW1p>Ox?cQ?+u2IIngyGre#umpw4&~G;4kK?)-8)RxzW^-rW&#i$$>= zn&@H~axo-kf|xLv7S*5e?<}u=ww=Z?HIIF=+7 z?9a@p*}Lr7i^vY$?2&~URAOp))3f}D&L8T!?JQB<>eD8nQyB_;n0EZXpz zb^IN0*)Z6m2xZx28qY~X%8R-#58XYjd^U%Qmh#_2#{cL~2YUX$@!%=`@8dk5A^wN1 zJ9a-;cF<=syQ%Bh{mkas{nO>eyVJKfKb+8r>e{wahvn8|w;#cLI!2NAWw<#tTmQmR z-N*vCcl}Sx_kW-Ke;((t+5dj#BmE#2K*lnv`G#~1Vz%xTINj5}CroxF_ec#B#n#vP z3>H4A&$aJ#J?QwiUjGd&K>O@J)6qm*|C7PwDgM`^JYxSZ7T0|(K*rTm*nq@mlNCsO z++zpQ%GI$1X;qrof+o`=%^F1C+}j>hC?(ggE>EvcZ{A!f7K8tEo=iq%lhGg2X7so7 z*RQXCKEFBpK^bA<252>(jEVU~wHtjFTgtemEoE%BrIb7Q?$!Tu_WJG1S1&JK-TeIK z>TlQY&M$u&m!?x0zDE0he>+r7+D$du)uzh+$^1t#&!F6sB#`&Z{-4QE^O>F+@*hh8 z(EQ#%fA;x*%u4d#a58+-{~qP3%>N3t?5{B7PWV5<l_yERo7n?BT`9b#E zpu75=h96n&6cDyH_E(iC3NpvYO zN-f~mMcF(F!666NQH+?j4W!=w(S-l=+(S(rz^nQHpg%6%{~r#APx1dAm+`?}z9;Oesfj z%(&4ToZsmc_`20RN;JSUOEd*kYExknxJ4xiHGy76^o3%1cn-*f{6Az)mdfhHD`Dr{ zZssVBP>wP$^&QYraVo5PHPI2M+_&LE4pU_^Z5Y?K5!8oeZ5)wx!@*eB8;5n(5UlS( zeS7;>!Z&EHOmmIX8iv1v->#Jxf|c&0mwCpPVF_B`QK?!)6%A&l#yX|`>gtTaC&9=D zi#m)EQYDCqP8JnN-h00|1*oLnIC%=uBDfWOE@qP(#Jx1$@E=+_ci@iQ7Fwus2D&-ExhD39km3R?V-gOo~#TXd@Oc1k(_&gv1+_@sTl-s*>M| zq-?-RnYona2|pPjG$#=yjT2v<>w+(6-*N35k`C(buHb~1DOv;{910wNHi0c+2EZJ8 zwgJ9)M_*qhGRngA&C#I7GjhOFCUg zOOVfzEgQ4=m&zt}A{4z5297vYgafTrbFl&%R=%j-WSnyPIg?qb;?2o)ic`^cigFl4 z4NrBXF0%SuSy`cQ?PjYUKlkq@#KFut0k;Sxra;^GS4XO($d<9r_iB%g6(s0+D9e6~ zeIzo95s_Z>T6~w)!7Bv)pVJ^mZz2yl#C2X0u@vVDKqAo~NqNcgI3@0dl3tYs|56$_ zK0f|FaC8N+L?{M|GA0Kc0%}8*c!pCf+hrKfVd#Kovb{o@GSu0on3TnD1y!k->7Lkw zd5SdI|GA+2u;+jM*PJ&oTOj8;ic6g+mQn6YOb2>%;=yWQ5OW2IGNB}Y! z?rT=nSh>C_@;y=eUbR7%M2tHTTkKGwubZTC9(!@94n+qzKiu40UJHY1wY`*+ohB^F zGH-=2omP3CWF`yae$k|rq4Y3LsiexMn{yU!vK*!7mre&9(r`8WV~6ddG-tLbSRM|K zf1>5ZPi0@#3f`$&Tl!Ew#4xsYe(CHf z`8tOFw=jf}htg`i^l2+qaC3HfV6p%gC5p})kkyY-j1ZJIiVB5vV4%+-5zQ1< zdlCD@x{Nm`YGt826hSUxA3GheQMisbPZoJUoZxA zNjTKW3u;v@zMJ`)tMIjM6=T!9u0>o1wPDJ>?4H<`$lrZ%7@|mp)sfjAx%_;{jWQQ8 zW!uD3#u3Ei`%H(buUmp3GnNiB$PD;tRs*fz5s`Xmm)6o z%<64P%9~+m-*nYdE3J~$;t0l(FZn(eBz*x6>Fz@db*R^$6=s!+D#s8ZTc`O}j4~J| zkKl6s@>Ljf<&Hrid&W)<=<;2~@hyfJ#_{bY0nT>d07qQnb>w!PqJ~rSOLFkW9aBBK zwRt8=%Cez&`NCLECuErcv0fAIAVHQF!;7jqyb*rYpiCcm%^WfoP%cJq^2$9@AS`>bJggjV9U@{j;2)GmdSu+ZNzYhQPEIhZp75grOAG&%CF)p zMc`hEVBkU0wO<;u>5JWlnf`gw(4UmO$xy=4b{z)#n>F- zbTU}R5KYB2u-$I=pm{(53Q+T3YI06na@$JdFl6Sc6h{7On5^K%W(_8?a}7sAGe9f0 zXW?y6X{)&AsMa&>8}}He#8bX)(y(;H;iT95dVBKqmipsy6lkLq{4+Kzd&B!wt3oy8 z|1g;MJe20WcliI;O(Or&XP^J?U^vj_|JmRv|No;rCix$wxe~mWd%K8>Ew!Cp#MZ2a zLqTc&Lmc`_q)W+<$5vSNk1-{mVXiR7yF!jq$kvGFHOp@gS&J8Ui8{tp;Ckq(xV39l z@l#T_titrAyGSujrvNP?9d}euqh{1~2!gZ|MQ=*iuR2D*D(3!D(%JB|gj*Pd^oBWB z9#|ILBBdS2?C;Un+211vINffS?6i%8Pd`&Ge0A^cK>4nid=S)Vi=w^(s&7snW?~D< z!_4*AZek_`Ih*$WhIW(?A3+{p=V=fvi}=#YCW9f~qFoilG}yu%)dhL?7}05;p3nU> z-v672|JfV=cTlqb4W9Dq1Km5^n zwB+zwV=ps!{T^c0x!z>?ON5fMIN3>7vtn1{{<9Pd4C_roq<>|D`y1L(ZwY=jz89mS zG2t97_w-$oq6|fO;r-v0RYv}U(o^S?%E8EiIt-M#gIlx%u`&$RgqQY&FOHPJk+8$l zOzi!p&8VR0K1$I|t2wEp&F+h%RZG$|Sju9Ff*=CHhqK~qR!O&F#+y9!#Y@$%UD&^s zcEF)<$<@i{N@SD7kj~z9BlmKV#%mExnuv9kJ=@cxXAC7WIocy$C^^-%5zQ&>>pu21 z>&h170m5PIQ){Iy7C|X)_W%z)*jCPr#~I)@qb67 z;Zy$qM|nt&l{0!zOTOSiBX|SorLh$3(VF-{niucm^frv4?`8>N7r1MgU$s-5;Dd18 zjB=DNpog+ECV`TcNK`9a@%AWlw*%LU0@sVY1=gi`%yrV_KjR<*&U4_jfNim()}=wi z?*9&Kvf27qqFvQy0DJxahW(QN-{2|#+oL=*$5I%^@4??TbHr?9EaOW|?Vvu2T_WnlPgK>y1ae9QYApzy+uv%1(FXVOp-KC(f|uDh24+1+v(A38}&*K z>sEA%UXOJc%L$^Tiy2Z7_qGE^wQpx=y+!F+yiQ2`z5g1xgJZ{FjoV96R}JOBFqoqp zDoq+yP0H|B$h#H9$a31=t{FLsV4q#>thZj5lqh+fY6`Mj2kFKXI`v7yZ2vUl|Ll%N zLkr+O{@*YA{|!e^{(q11$nqb%uiQ-Z<7XUr@$vX4WVTeK@Fd?^XiV#|iQy)Y%x2s( z48%Q663*YrDNmx^c-~5}JIhsUp*6~I)-Zxg5I*(l zLjqZjRdSUhUeNF@c+jovNoFjPs{oCEbRm0D=(kiPSC5~xs7Z=XhXK?Ja47CJ8$NTj zfqqhaIXc#RBZXE%wg)Shr|EKo3>?mPWQbp0T;sAqv?K`{JMO{x0;F^Ypg>p-&y39m@-ASxfaeHo zGK^;iAVHpCTRmk8Cn0ItM3sI;hV&kE2)<*9ARcJ0mB5wfTd9aP=Xme-&pS0Uo?g$| zo`QBnU2^o<+7Osx-k1Do#n`h;a*Al6-3DWrn9GzJP%9O2*@@S>3Zw4rGNB^UHAt(~ zTZw?JL}`j+e#m4;JiW;@XKRL*BGTC&=E&q+%~l|FRN^@7??N(7Q4$jW`u}i%^Ui6` zUwE%{w$4P>Q_qVxQI1&x<{;HQ$&@-5+Uk|ewrW9_1_e__kI&VTk)Y&4*s(#4)S!~3 zsVf2`iTe~a0a*kM^PZGXo#!;TeVTe)^0A}9=5v6Z-iNTN}<)dTe znBTmQk}%$_#Zjzg3VK=ke5ZyHvIB-_9Y-0mz$IU=QDd-K4s*2Fgaoh&@--`9g59mS zR+|F|wlEBQptpJWb=Glg7@4@Tb%Vy^>d-m)AHZ?R|Hb_m2P}T`qkUW6Z+=v)(t-=P zmn;#(@h>PQG`;w@`~9B5}0N0 zt1`ksoCDYLGyv)z%uO0rcnhYK_6r z+pA@`X}11(NXUn@{|<+9I`+LDf$TQ;^}!bFUxT3#VFYqMjaD>b4kB&DxP)TFO#5mJ&Z z!vemImJ;CFWDMcFOvO^OI`|42N|k}bk8o5nhH!4AVo}pLNsXUX>KcnQr8KNFb?q(H zBYjcdJdw@#RJB`oOrT|cs~GJWAbqy$Uu?tjdFH+me$#QNyAq6zRWcRBDo~nbw5Cyv z3Z7CV0VwE95?0V;B8wjf7qOQI9fM%eN#4wk&@U^8v1A(>?hwIB1u5@(1(`%!YNct z8N>D|C94s@47WXt{Zh_UA#-_@@>vaRv)U|)7{4p*r2d?imZc!J8hnP6!q8?VlcKO{ z?GzQz>#?YOosd{-dXttesQU@2U4?@YXF^l!PN6j>gx@mmBIty55|qRy{nMijeT}V& zg4rvH8DX{`MU$AFwSt!OkBez#KHHb_==R^j9Yz$_k2rbiO4 zWI`;}62(^^ZNImDTPBLz3I!PA$by7=SdJd__SM_4&|&VIK_3arfKfM{YTPfBAOb(%{8R!_SZ# zkHMfnv*PB(>v<4SR}N~LC{l`+z=wh=X?az%gGnW%jAnKxVdP7Dv;BvdLvWMFYnTTf48t91guQSvsdN4`V1zgzHiuVy-k+KYwKsi`>bF6T?E&GXZ_BbewoHe zRoj;Dym8CtqIGkD3K2}XsRn)D(&HB`0O&zcYeDdF2P_@0iG&KmhJ_%xt^3M+cu~7v zgZ8w(s*|9yMPnDm`b>i@j}cA-qG-HM=b$<(Wa$*7xFF>mUNmy5$eCFrxO5w-h|m2t^6f%6t8S%KH{B!n6w&{iG6c_O(6ENo#EP za>HWB5D;xli7^F7XOZQ=yww7wyw+@@WWfg&Ig-6rIE#j*0)uli9SC`^@&=s;DqD5w z&+?PSoSN{l-iAkEkWOR1eCJQYFfr6`!eS|xt+ZM_FZ@BZ>V-8?#L`(a`9^5Fc_8?}6gkB57yZc?wtn2?LPQrWd zu%ww3Q_S7Lb+tR-9{=CbXr{-1o{XnY@jo8rsm%YLuaK4j9=}<~n@Hv{;GglFrhyMK zkZz)bIaycIlN@Q(=_LhbBbFBBB(ZE;TV%vmQdHs$>qm^WnrEym z;*qY|&MLdQyhn=*m6!cg8F1xwtwZ`oQGFSd(xoR!d(^tb6j+M8{aVAPPX}EV-dH2? z0RX`oF4_HW)^ivpL4?lndpAW%oCSHD?!c!{Cze7v6j_CpAz=~tH_>VKHbdzN=#v+P zLHdMB<>W04!}$Fr|MV*JAe}jK8CgK!X*01v!v6-K3r=6ZJ^&y^8A;zPGV>C{3P)ai zl}!XSlMUl(3nQO4*#%B-9z?xt zQIEIqpTJwKV;_HC{>OXu8~FGU&_2;J3mEWZcH1OkQDUEyTc^8tg9kps{k-_@dOHTE zXRovWO*%*n5=}hI5)`3#m)RV(1 zt(vHQprm6WpR>(e{m5Pv07@kc*guS{^zZnzkpI}NV3gLq2U0En4f=!eP?P`0{o(XU z{(Fq)j^0VS!Ezl8A|M8rUpewY5a~BtrHe^+ISzw6wL#pvV+VE-(lQjHz*p zT1MnO(ND}Yacc_GQnK3J-BrjY`*cMGN0=@dtHysl1a=RHo9?$@7bqJDYo%7gV1c}y z$L$y5=lvn)SelEdva?26h9{KRoTQIG7T-=J(l!S!O-2KFX&#$Q8z|bIC_DD$_vbI! zd?VIGWeHShTgoyjzMgsh;VXe*`L zlqD|~mRl!Qo`f9CGXq%~woU%}E{)gqFu)}XHSJCgPR=q;{SED|(4weDR=;>()Ri*z z6g^U4P!(G5BYSu%99vzCy0NN!Xu>LbJe8e>xcq(};&R!hh%0sXBd)z;!}^i4yn^8! zm8zS3?R*eBLs{!4ZkRHl2pSE_dlm~O;at*aM_Gcr zV6h_&_9zIf9inI(q;a&y6yXkIrc9CIhnaVyXlqcXZt=3BnFbW~MYv2nyVX93Mfhx6 zQkc}!I+aYS0V+kmZGsf}z%g|%qXC`B@mRb7YnWub27pp%DSjkq@XL_&FKGzrfIKS~ zmylnR^s=;@T@8IbeF96-?5Imbq0|eGqZuM!$|kUwS!tjp(Lk&lzFemJRvUdQrIw}* z*cV_KqMo$4^n&HqKQvIYqeC;ud(V``XCS7sdsJapEK4@%8f3eYuKhsKmhT$nlNk0< zHO&IX$|ZK(1>#k~i4{Iv)G@MOd9DB>$M0JBz1qrNKCez3BUvnQmoWPE`dd@?QW_^7 z4}1_x;hhVukNGsYECP*LekPo;93;AcA{)&LU~C4PENW6KHc`3?=`@}rGuFZ-toO|U zpn($TxyVhrK^Ldj;QH+J^((;RdH8_1wnmGXb`qB?+nX^DH~@-=K=F~EP&g!JAMueZ zImLbyM+l^->`74o5)Ns_D~svdY$t!#-a!6jX#1l)E$n|u>^F-5v*-MG+Aqg{nvS00 zzdp)C?SBV1D-s@qn)8A@h@%SopLZi`TZ{kXqv(~L1G zE4?@Yzx?9?o07W^0RPpz5$R8QsCvz>wnQvVRH0MopKF+7mnrnnB}xOrE8@r}m825i zmkLrfl zvo-J$Y@*;d@DXHjnv*PA9nCsYoL=!%i55_*ZBo*l3lORc4k)|f6pgXqpk<&X{ah!^ z3jpa2I{kwL-J~M3nV*EuPKvDQ>sQbk7 zE2ZcV7h^;9wy^m&g_e6l_&%yBBUEu9Vb}WDg}jQbo|IH}`BGsDgT{enaShlzTD#ly z@PeieKp$}JUW!F+>OjvA)}$NWcl_3x=!eu<(u-%}&Y?~q)v-!CjJqq&TIG9!hb1qc z;-h3qRwM1d*`(B=KLdVDR;cJHNgC&|7l+DQ;`M=klfF7X+}vC`#I>XR{@V26=8Tl5CnN0b z3Aj1CES=yKUoqlkgvz%u?Ld`n`GGR7x8eWfwB+IPe~+d!-T!kmnmpxye3Xase=?$g zW*Q9Q2!!!6@al1Wc6280+azhQhUt#yMPz!o&g@I-3H#u(>LSOj43l5tc8ccMO<%c1 zc>|K_F?)bonC%;7WhsPNR-j9Z6}TPJ13LDVT90e>$l+npH9R^U<05`WsC%Gke=FCQ=)lVCj}|KJu3B?)Yy7k0Na{i#lqxbiGnq_^S1D_f-rLtx zK+$hmf;^K8#8BB|HHX;3lSrEa%D{I^-V6mwb~2 zj&Ev3ONnKHNH+g!bQL27C@JkecxtY;lO`*^Zq;Ue5#E?x3>TmZz zwJ}$HW53&lQ^i0%olZQ=(|Z4JU;x^)|Boj#-T!YinM|Jc|HpWU z{b&FFU&|IG&XqO$HD`$OPHz_ggho}owwStQE?KZ`eP@^9&<$P+0>zc>t#`qLlB*qh$PYFpOJQ-CC%`$hq+^htt6Ru|f1%gG zI?zw`jE#uGrgq3rUiL)muEC-?E>kj2%j<7mnDpiuD5+$XofZdx^f#TK1^bsE8?D5Y zG_)4|`(j^RRq`y)8@9Ln82h50^y;J>C1D>xOl6@4kRK<~bTs(sOzom^<-*iLP4b_# zwS>#)#l=veY8xb54khJ&}gxcQ|dXAtl816JD7pBt4H9c4`c{!Ob z0~<5Tmr$Uox<<(uB83G9*oCzF9L|4+t)r}#gQ z@)+Vj^1F-~fLMa}JNJ| znHNW)OUz90b|xgTZTIV~1KcY_F7UgAnL7-G1Nb?q&EJD)JrX~XNEJKEy2z1k8?RzQmGukVEo}_3S#2e}-700)m z1UTD)100Hg*1s%)UeQSc$l)yInLodTS;kJt`O7qpbM-at4i`Kn42pwu2I&Pj1XRb8 zin+MHK%vX0h66g_BbZOeKJuj4;6?j&fZ@Vb5cNjMKGFL195A5_iahoDxV>XVYo?mY7Q9JAMhkJ=`dfI?>wUdF`Fi_* zzTS3OD<`8-e@aa5`T}GBzRgfdFS#?M)wOD=^%CZA4l@M!_?LRQNy8}4vSwKR?<@<~ zv5#J`Fo}54e;zej|m;(<( zCEQkby~AT^K!SdF1Oymx6AJ9pXGDUE$Zrz(+Xfxn8KdSiNMbxM1w%TNSOkSASk!(n zSByyrP!iXu3(Vc5A#lj7#2^|?$QEtjng1B=;FW7=r^cdf*_fqc58j{`uagkvNNwwP zWckg|$BR-${d2J^2``g6_lG=*YNh}2O6O6K*Ej~+cmHEJ)%`yv{r=Pak4Je7`XATt zlGx99Dmp$%fS3q7u!36zAn;KLcgP2rjy2W1(p}@mT3!LckG+#Md%5cm)_zF)fz3~QMO?bC93<{bVi`e>KZ5iC#Pu^+^^I!p6RvD$YlksS%XpPn4 zL$&T`tlQdXSQmG@`S5q>%U)ArB~N@9Lt-6>Hd~@bbn{esID*x%r%5V~)U%dWH50Hz z1|^nS15gdkYWncBYpJer?O|H8nb`20_>4{33~isMS+lwAi({dU`(?4ieb%M^?`V;G z+^3cPmm)u?tNhit|3BzYb^UKJc=G>#l;_LR|H#C;kLpJN7_~kM`u9@!NbC34`3f+5 z)INWHPL!6DBH5_ZcQj&<{|kotV9Fr@TcyCM1@e3#4hd`6}Y5HP1 znjI@!v_$4T8?zX&hm-i(Qg|3)zY@Zy>D z;0@Wt+y;$330ePcPfhu6lLuked&i<<293f$?T!CG9hTz%4W8mZJ^9j7PY zJd$41Zl08)x3I{F^s@>{g)7}Qd5?nSDn9`Og->haxPqyFuW`fxKJPfv7H}1Q zHKqPA%29%EP|B~?bpJ?WSuuL|7&tLzc(FUcp{wPyjG&|Dt3tm4esPVoDPIVy$2D9D zpmb4)Uvnb!r3qA8LxF0DqiEuQN$hj__we6Q9yA}1B=$9a=*8E>U8=jgYlXawiXBOxAM`=##W?CAKxIIGQo0y+5su?U7 zCCEGg`rk0SRSCiq#5CN;9&R-%yV~!w8jEf3@m6E=4Yq4ubq}}ZN-1b-Ex7wHH^X9U zxzuVeG_A?MXE|CG}vd>2X92+R_6^8q!|)aDs-kr1!}gkFEbT)BlOLW+UDI z|5qpe|6ru&{~OMRPx}93JoWT{nK$Gs1dC`pkAbL5|ZO@@Hl zZ<DI}&SSy_;|TaD3F93Nw45>ZLslnQ*R0Yh}Hq3wTk*)VMTmM-er{tDXBL=W%{SQZD{r=x@JbQ}&{3uUz`A^<~ujzaM zBt5ZdH{}zCB-ALjP$_bfSqzi|krl!qsN5;FwnU?H0+=#1y~X`C3~h=$uOH4Z z8e@@z_o zBZ3o16reHvh&smb>B^oef1IuOcX^ua|9KK_S(ecT62LzBf7&m_f9{W;o$|4!pD#Q)}SS+(%RykX^U;IhK}dlkod)fzWKlZAA0M5xTfyOEdP2h||9pCNaendr3AieH1$>kvFGoH&yt@Ok z^_ay0p#eWS&p|>&8{9TyjRB40o~LoN40j+!7=6r?e2~WgZsWi&Q!xVpIetrHe?xOI zqG%hWakNHJ?jHO{5G`V`%JU>U>Gk~B%iMX8M{pguUcBxVS^ayf_cv6aRmV=PPgt^BkoS zv98kb2JcrW0`pA}`j{&v(7PpP5C>lYa#M_De$GI)LSYE7ZbyASf@t|1q$q@Wutg-O zxbz-I{=ruuLM(^VVUnUn@B#TWu+jhOxPWAeiX&1JqXZI^f-s1Xd*Hsjes`V6DLVKH zoRJ9%emc7bevoDd?lQ=GVWVn}qCr*}*q% z_C7iI#+}34gKyk?jsK3*V0rM(|9kKi_z9-uKGgZkSJ{D^r13wImmj!+k6@1$Pvd_c zxZBK&eboCSFi`9IKl|bI;`>*x-+b?`{d=}iz5XY|*`Tkl|Nc|{pT~K=0%t22Em0UR z|7)K9_2A&(zaTl$f5D`!?vZ=!4#&=4|EmZ8dhpd(Ux8ng5C1si(#SH%SDQJJL-KTk z*mQzPLgrKgQ`D1dj$GGOAa%guus!DKgcT~~ep{>8e*8Lr5{T&+nTX&3A@+^W6j1(lPEv3hxAw32a z^cdLaQLhmbJ^C6w1~NTH?dJTbVV_4;eeT=(+;7|G!LioozTD?wyFL$&n)P{bWbgCf z*wW|0aqB)GseK+C8~e;AG83mj7OxTTg9W*Gl#|#wV3US_$;hhbk(&ACcx!i#Y~86x zGp##0%JS~W9l0~DOGk2-2DV`=#*Gaq8NPl)Hr=ma(}S6rCovUuV;K zx?^fQ1Q{ZCgb+wk6mLl|g*3*pB_==-IW4? z=%_3zDeoo3CMCqy@fHCXhCmpjfVg%^)X|%>vnz`2xZ&IzehX--B;Jit;pAE>X%}VNDpp3|WU@ zT5my%PEDtzQ)Xb}h7)&uTm`I|Tsa<(Du4}}ar^ObRt2mfW4|Id2mW2d%_IvA8uAVIYf$hBfqnGwVU9ViO<-tprFx6-|*C$U*rwMk)IvVQWG-p4bpCvvZ_plJ%CV;k*KXFA(^pqvfehta9Jx8;2&?a%V z7C5yHy%0AC-BG`02U~GjO9ySjS!>x$6U`=42ZzVH*@LD?CMj(J#F8{zBjV4SA}>X_ z>+u43D9yVWyY>)AoG6qO^$ZpTDTa1Z*hIM2b}!BBHI_-Cs}>2&y%m=xxB?gk(Jiv7 ze>S64dz+Pt??}eiYOzq~=IE#%wfKOHj>Z)x3Y&$ZwceoFCyX6r1Hu@(?tTWAcotHJ z6XXLgPE+LN;g0pbnWQ~Bs*<#A+iTn2YZj@2+bt-*dDbV z+aq;skJPapl(=pdW5FYSPjw#Z{S!n>5JVtD={E4N78F+4o{lVochq+9X6oP_se?Dr z2d}`MW(XGOvRf*6n_xZ3TsC|S8Pm+lm}ZvYo3$OjnL2#4>fvK7hfdpdkmc|e5myqC zJR7WFP}P|m?wZ>PqIF)%?;mYq*%j*UJjzy z1m%kcG$(k*$kK3SPpvC^YLTa=ZRM${Do;&Sc}kxeLByn{B#q~YrfVV;$b&VCH#G74 zdjxM$3bI|6qjhHMhgle!wiSk^sxUNFgdzL!khc3w8ty(5>+UnPNKezY($iFxo~DZQ zG?>=x;JBGMI~rTX*{MZ(nzogmrYeV?D$>)SrnO=;YG$n%ji&Yvnz`__Ef=1uTzIN* z;i7{o7Y=vCnUbB|(&HPNjou4kuoj-RWECb`?=Otyj2iAnBkOK7wQ%BTTTVPtmGG&; zi6uHn?3U{*{CF#bJDb`vv8dFOwkq{RRjDV6NMM-#W@@zF%xgeUG)re#Tl#zRk!MlP~c6sSERY>t!OxP#2_^i=-j#4=TWg5r12uN@1gLxyLwB5)j z>P9|MHuAbhZo^qKNo6>*N-7h}Mm}k~kx$f(e4=dR{j#KTO*P{k`2OuVKiv-F9af#6 zD>5|`wdG8hlo&_Nn8NU=f+?6c{Yl$Rf1+;s6J^sk5CgM3==&rh77PIl1DIuq?)$`q zfWRuwa^epw(}vQa*`_c&vf6DYmQ8=scGDm0bm$xDz*lY%<>b}^vzwsHpU&v;<6pZU zE>*(FgvfUZ${0Bsa=#<1EI781W89V;Bh8m-yoVmAzR!oBnH@;vFqi=dUdPb?7KSkL zPzp{lU0C;`!PI4!?i&~-1fXI(&ZkGXB-B{T0 zqbyFSi8P4FmOx3+Oe`8st%~c&<`p$+?G-iByrM?3S5&_{v})(-I z{9uW)98+jI8_gEuDWyik6Ud?JQ=vG~k$Yl?a#4Tc(ZMiO-lKL3~Wf=&087Y0d&KmyYo44(t&!-Sko zUYR#0+WTFjuyRD8pIJfl*nO@7Mn24P;MO! zv%rr(v>uItHX1{DH1xCRvpCrSHDrieItR^T;H`qtr#ZhYcI1)GcWTtqcZ$^17v8|! z8773IQX_bx|S&~tlugEb<2A07VMf50X(C`>#U_V9~*}SMmExo94 z&0~!`eVIHnZLI&VO_qZsjkkf10K08XJMXR5u@4q7pvP%&lg9~4*8$C=Kq)b4rqK*0 zR*hz4ao`%Yb>JGgngDw&lc8*{#+uz0rkJO&X+brbJVkIF1`z`O9Bk4s18`||=^j}; zqDE~!qBLjxk>nA@dSOPxCPlUuA~hLuW+bLqa@=Gf?Pi-aap(9t57-fOcetoBO2ZD-kxU&r{{sX(ke`K+Yj@nvAN3JHb$s(Km-j23!Hng7) z?5WvC9yP#u)96%F&C4BHOMP#u(^Iw*ED%!4v)J17I4 z8vQzG3@p?bw57&CrN%&|hRqj!V4=pKEj9Y?V5H*FuY*V5rq}gb>veriuj@;CUH_Om z_*zggua|ynrKYbbHGN5`*@KFCc>1kH?!GE=_a%|L8WXd~+ixfGGP}e;m0bFT+>3EJ zvf^SET>EVW*S;#a_6xxkqcOFjVHRBbZ3Wl9D!BFw!L=F5& z+sZ+GRSxPGau7ztrcLxMa!|jW93%xEOR_XzlL^p~6*7#!|U-U0C@2l0Z1u(Ec^#0h4tg_@Zv)Xa3D zrqm-`KSVhq(GSVh#!a-zkS}^i?Dt~Dp$N`H1e6ksIK}j^_0S|N&Dsh}GgUyDX>wAj zd#q1!Xz?wVZf>$}uyVc3OM}F0AD>y|ompFXXQs+KGfmzx3>rPC*d~$gxnslEBpA)w z3Pv+kFq&zC5y97thRFg(-nT_#tfDcgA{*m9FpA=wTo-yBWI3JTP)y26 z5LI55rYG@~n9ck#j;T8aY3+QSr16$`IFY{)@FO~~c!{uR)5K*s+eJD25U|l}iG zZlcrdB92I~>O7WsknZl9^NW?lb6FdhW(vlnLcy@fdaXpgsXG|!BO{A?ec`MjPtz-u z<>|)DY0wKY*@GycuH2G?Y(c7GD*FN7^_t!1I<{TsqCGIsgnnpA6xC~jf-;gtY*BHV ztaEx_LZ)WRDGszjoHcin4>H& zT$cjs@q64X^2o6*@CZZD+UxcMeyn%eGT>^2fK9?~lEaXg7ZiUkACXJQBnAxh@(m2b z9iAk}rzB}67?JyaZR5XMGSu=v4knYq^eO)DV?1AhbLO^B z@_8S8w~44`}Etd}R?*T23PxPz(N@AiKs zMPEwX?BL)dxGK^^d?XoY!AI~DO0jebJ|2ARO3z2-AN&`AcrLDIk$w;|9UPFb>p=z} z_yL7$@S2f@-c~H~R^0q>ehtokIK8?7=hxuk%?wra&X1RON1=k3XZvOIfa2wblcMiJX ztU&2yka=;p20%6iBZOH}a5oP;+>}^OC9t(>avvHK}0wM zOXt9tB4L?iO5+|7oAP{D>`S-;K_-udr)vfyRNUGpmb-Wvcyw3bl=%q$hA?-(*(I2} zbL!#0s8v_y^<^gCRrY{`kCI+=R@enTGCLsn2!6f$^egxXt`p=1iyeT`&ZtUdV1-h0 zxeRMk_+z>QL5|j$3tmBQW!As4RlEs(s#OPhMhp?RXy?*xrU+Ev!3fN$W!?o0Ypl^o zcw$yQM|d;;NH`-mc90P$GKS!p0YhBB8%LRoi{c%J!l!!rCPh9Vd5h?5AP5zWx?b#4 zCY1H4ywRPN|J7h!*j4v4`g1 z7d+Mc*kd~%AGu zpA$N#3?YmN4O^9@$U{EK&RhqzYkJyNM(x#yAS2g=*m)cqc>G4Ezzx?K0Q!)S1DJs5 z8gmk)HNz8`FL(rg4g7a$27j&KOl}ZisVb|n7GVTfVabZAGbLLy>|(K@87$h$t%x9Q z%^P_ir?)}0d>N!Fk$aB3GhvvlB=Ccjom{gu87C-0KD$FAHB2;%44l)PedIn3ofR-i zXl1_Fv-P}=H&LFz6%$bP0Mpb}m}ddASVvfjGHnt05m3^=fkQ zB#qZO48jMPDgu-=RfKR6#!D(>W~+e2n76VX<~X(H-1oF*$?u2X!%nw)duU|7y`CyL4D!RzPrqX0u@{3TNuA&WE`{0mWM08TbKv&bRQFm1d5px*tH4{)B#Ufr;hJ2fo3pJ_RoHB8F=bY2k5EI}-sxmf z%0u7BQY)PRbF{#7B2P)lJf^MFl?C&aOD1PwOV!pOUTrLbLI6i=CxdqR#^uX6&>)!mYCY z;-;>de0oUM3dxAjg&mp{l!ZZHLBBwd0TjiXfn#UhA;d}mk%FG*tTtSI8eQAV;$ z?02Ks zN4>9jTU{9WT^Qv-m%m|5I!uBHos+3(nO(F<<>V@WxXC6AFXJ%qGCx;lE;5=lcMHAL2Cl7p@y( ztp}X4iVRMnSyoOG*>Yo_C>pSKlSS4@%`--CropU{fY)f))R=J&4c$JUL-XNaG=%e` zF`P~3v*TmmgU81c@3`-e(R?zSP8NgFa5@|Jj~27z$z(j3BX2tEFBZe0=b_P24Yc?~ z!onKXSt{oeD|DE3_ROflFUv9q&bSy_#4(qwBt)Xco2ZNDon+nSC7Ccwx7PWt5PBsW z`7PRs!)LY|{e^<~3&Y7(ab@z8TX_1K?DeP8SFH2-l0}k7WH*BKVGa%Oidv)qaf6I< z%}~!A0(}d{dzHfs6t2iw9b{Qx{W7|*>4!Z%&(k;zQM!ke6{U^h7STtgaEuagCMXxd zDtkQkPKNTH579b~GL-8r+O2EM1C#ZRm)GlC$z(2Ar&mQvgEk#X5%H_VC}C0IBlvZI z+ql?}V5{*0_$Ujo@|VPZR<67avLKFr2r|q7Uk7Vq>}G&Q#K=tHUz1A^v@}@J;vl5u zHJCB+d3Z}4#@qy^c|cjb#P*^f>d zsx4MXoGP=5v`>`#Gnl}65C(aGv?c67-*--a`Nwm|PvZptMHcm0aac-D%JFv~*~`~K}YUe@Z#I!1?j4XVuHmwza`q!d(@lrwFWZy8=}m|-Nd72G&tDR2TF zT8^Y2#_Bw#{oCtrh5w?o>yo2p`-V$DOZ%)G{*`nt%4jz<5@U6eN+KC0H5*Cieeq=H8PZM5;lANC^HD6Y^}cJUIuv#oU?F~^2i*M633z*R2EOfp%hT)YpI@GUzuesc_lkvACq90kKK%up6$QwH zqV0ESyk@@ua9utYSbbxeWf;$4=q@&4h!=+t%PY1E6y-sR zh&MGB)3GMcw@(Hw$QTnUPa3&cod#h9VqSzZCz=IQ9OyCB31mE_NpxgXR$t#{NcqlW zO_uu!MR^*~w>^}5JzO#aU9g5pg3&s^#HCY|v8wnx;WhW4!_fD;tod#p6Uzz8y)MC^ z`##850aZytg5+* zMmnLOrVeXSMpP_W$6LW5>ds*ncn(>=L_mob6gyUdoj>L&M2p~7{&IVi5f+st&_jH! z!%ZHqVIFwIo92uNG#Qa-gw96|$;5L&f<`VRB?*dr3Yq$blSYeHGU0O|YSNG3Qusq| z_yt~7T;uo^ljSf&3EoRlM?nN*7jKByNt`hWWX;<}k>A~9%vPdMn(&fe`u`w*sB$rx ztX=d0u9FbCVeG+>2*`NpbC#!@4cPomU?v>=%*~M_P5y_;8RU|j^*jjp@|n~n*(gXm z=VX@qSnP@79AFmB{p|nx0u0>2xZAJO5ci+4@jiZbxLY*h{WO9G7uen|T2}6f4%oAD9!A zy1Y*aQVgYZ8{I6h__K%XrG}_a_Rg>w{D_4DQkzOwv>fN!^mr|ZXga{`IbJ{bAC!Bp z>vmjlPUNr@VPw`+A%_tdZ~)IGp@ZNYN8zscOlraO7Wn{j$MKy3{X8sBiDDnVd3`N* zUqOOz<9x+j`7U@$Xe!oW2E*bh@GCN$`6x|S>dtbReLH_cWmnxXgS@tqR z?%RE{LOKK@oiKO19Hr|Zq7yVueU$F^1`mS;@^+r?i}C5#l5ka&ck@zG?m z4OX$Ekk8%cz=ph9@2spB4ZM;9Yh1uTqM^zR{~imK#ft0 zeRR$9C|isU%yXe~;@5B}k-@Y($K@^*UKkJqrf~@<%`{j6tX`J_uh({|y*-Oz?v3DN zIv;w2;|Uzk#~zw^)7fI)_lEuB#ptL%nofoTH1|h?slOP)nLj<6kB5`_u{S=NkNWkn z;!8rY!R}iS{~vot*W9*^eD|;5Fb{2JM2V7ROV+fVN!&KgOwwv%r+w;#5CK}aP$Z9_ zlvC6E_Zuue2!4S2u;Ti1(L-X1;O+ug0K1F*FdN_Rc--^yRr|OanB~2rjan6qRj0M- zmd9+Mk6C>tIyg;jpk+M5b&Tk$O*niRfgR@qN@SojWI0J3^`ZmyV|%6SC~ao?`TY0m zsav&VG;F-G4hb(RY9nk*4C51$|z=NEkOnAAHW-SQe7NOzXD0}}0 zh&L72LFp|km4T|L(61QLgTZ&4w0CLru2_90=p0-jIsq>BZjlA_>CiKO+sLrPm zLtq`c6U+Gmr4?IF5C%uM7OqswoknJ-8g8Hthv9Ky-HL_LziOOtb#?WEYA<9YCMJz^ zF$~q2ocw!DSfP7ltchY*-zr6q+LTm@OEjn^`q8joMqvHqjNk=52X7O!qM?ZFWHe1= z!4~DJRCz(yfeCsQUlsi_$y-c3atcjIEL{;%8-~P;2w)J>QZ4LczPV1o$7uwSm&*BRrK6QP zp?*2Lr`ahnP|ZVVwH0l>70Q}2zH#`K<0!{mc-*UPZ#M;>dvgV*@#G}$!x)0gEL>qg z`yv>^?9T(vL|*{lP_2H|g1y9S{4VkF_Asyq-4cqedmxkA$}2yUG`JDOWV088=q*Xi ztfb@^LY}C)#CD2o@hF&VjtE2P#L%?(|AP@It(3MeIM=nTH+c;1Ty4P6C|<+-2C9pJ zosO1;qO8BQbpj+Dv`RD*MvA$SF1=+f)+8T&5oqk>nZb#YPHtHFN%|P7qj08P4u?b^tC+^XAzhsO_%^rt4N?pSpaPEsE4}Uz1gu zZ{3pLkW;L(h&kWBdG^{{pzuAx!hE@91z9~cwP=_-X(~}5m#A>~Tk?`1#VuACNhhO! z5#`C>W|!muf*bl55i~vrT7*!{0w*E}lK$TDDS+rq8PvE<*IQd7IBNKQO10YBC zN{(ogzJjdm;Xy~wIqX(sm8BwcgB-Uu+-)2Xn?q}XF&))x)FQ9#c6kTaXIa&Z`V*@LR`4JGxs+rYw((~6)M7|+jF7X zf%zW%@RpHWem4`IL%TBWrs@Hth;tNmYVPN{11ckJ*IjI*sl1VBO9qD*VNS5{m8rk? zaQ;Ch(oRPSqdIzruS5;laqbcZs&-e2I+g>xCCXQKqisXgjCmi9`@=HkeS+}SViYdI z#pQ4u`Qd2nUxj0TIQ7RE4KKnlnvTfCpNvo#MaW-Vq7V&nxQHerbm%1p0u)Mx*%2|XU?D2rqc8Fu_G6Vy@vx$EF*|0(PyFYdrUVZA&hxkiK6fqg~MT`6K!znzU=P66-Os>e!0D!%Qw}Py^39heTzRI@PBS}4BS)0DObJA*?e(0GpRTSch7X!S`o|0U8vZwYzcvucC(Vmz^t7CRD9<76I?aF82Qn|U>hUi8<-oc>~%4zvi0&Q@oLbexg zvPuV9pgbsFDx@doN^_)6#*B)9QDWjp^_x0=ZlaKJi0`e=hMY#IK-D1i%T-~@fe+-V}FRl>1Z(>lFM@+ zUrfk!dcGK6`6%?miwTLwy9iQpWWGRFzEy@0M+WS^Nn;V;Vtjv26Rg5*IjnwIKI_(Q zoBF1SrVXCNbq}yz)XHa_`th@-YP~1)dw?zB9pMFh$kah@J`0I&;8_=OY%Pn#wxpfH z*wK&W)oGKEzC)8RUaJ5@v`9BZmB&`wF$zO{VVDz4yF@X{x`T1x{RdRFbHdVf9yao| zK7SZ4C2UMzjo(rP(?b`;Ba`LnGxO31^_d z*ms^22SLaqm?aA+*kR=P;U^PG!hD+*!Y(II)}E~Hy^gU10fpd(u%V2~NOhEK7b)Hf zN94iYYnX4$2yB`}X}%JhTVtRF&|^n=Srl21~QvnR-}qSFC!c#xEqcj9Sh-)xcg zw`yP#k@~I^#(@#n0Cz{YwKdvW5@CzB7My4ewYGO5Ez%H(H{@ZihKcMA9I9&5SCs+H z%|765gP!>RhW~MUJr7{IgSS7 z@fa$>w^SER{!-hM^d2g=enW?>-3eD!6uFaR}8D906!u}!H!j<;P1I`m_6=QA41xUpxf4=G{aYl)GxlT5B zNtvsT&7`~Qw|sM5$j$X>ud>(n91X8m?zsjT&y*zJse87F{nhu6PI#+Vy&bg7MQHUK zqXgN+_g z1PhT|f+P+Ah% z;w;k-`**KgKT0#iZFy4zuKmcf{$~`&3lzS;O<$#V?6>5nJWuoBVFxCSrF78DYoNtd zsDxm)yl*)KfC!}zN~rQ$wMerxPVcri8CMyvbtQ%-d8%xK?Tuqk0LArs@KzC*3hGS*c zJ|ALqH5`sECTMbr!s%!-UHD{tIg0QIBY#Auh@kL%e1)R(FdCtY(c~%|FT$&<=wcX6 zcT*Q?Ei<4wf?sNP~>#8?T3uHpwE2o7UVz0 z0KVrW{@!K9HYRLINZ~qzAE3Z?SqYqfee&dqa}%P3Zz}7!U}tA%XMa1trp{~1D!V;D zOx6ijd6xNxIrDaX{sxR?W;KQJM^cD;U-MBbHUIRyef@m>eEod=-1qa}00030|8iKH I-~he|01OtAPyhe` literal 0 HcmV?d00001 diff --git a/stable/wikijs/4.0.14/helm-values.md b/stable/wikijs/4.0.15/helm-values.md similarity index 89% rename from stable/wikijs/4.0.14/helm-values.md rename to stable/wikijs/4.0.15/helm-values.md index b4b50e34dca..85dcd3c06b5 100644 --- a/stable/wikijs/4.0.14/helm-values.md +++ b/stable/wikijs/4.0.15/helm-values.md @@ -13,10 +13,6 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | env | object | See below | environment variables. See [image docs](https://docs.linuxserver.io/images/docker-wikijs#environment-variables-e) for more details. | | env.PUID | int | `568` | Set the container timezone | -| envTpl.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | -| envTpl.DB_PORT | string | `"5432"` | | -| envTpl.DB_TYPE | string | `"postgres"` | | -| envTpl.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | | envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.DB_PASS.secretKeyRef.key | string | `"postgresql-password"` | | diff --git a/stable/wikijs/4.0.14/ix_values.yaml b/stable/wikijs/4.0.15/ix_values.yaml similarity index 99% rename from stable/wikijs/4.0.14/ix_values.yaml rename to stable/wikijs/4.0.15/ix_values.yaml index b193daaf753..e0eefd5bf30 100644 --- a/stable/wikijs/4.0.14/ix_values.yaml +++ b/stable/wikijs/4.0.15/ix_values.yaml @@ -20,8 +20,6 @@ env: # -- Set the container timezone PUID: 568 TZ: UTC - -envTpl: DB_TYPE: "postgres" DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" diff --git a/stable/wikijs/4.0.14/questions.yaml b/stable/wikijs/4.0.15/questions.yaml similarity index 99% rename from stable/wikijs/4.0.14/questions.yaml rename to stable/wikijs/4.0.15/questions.yaml index bac9092bdf9..a54628019a1 100644 --- a/stable/wikijs/4.0.14/questions.yaml +++ b/stable/wikijs/4.0.15/questions.yaml @@ -350,7 +350,6 @@ questions: schema: type: int default: 10045 - editable: true required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/wikijs/4.0.14/security.md b/stable/wikijs/4.0.15/security.md similarity index 100% rename from stable/wikijs/4.0.14/security.md rename to stable/wikijs/4.0.15/security.md diff --git a/stable/xteve/4.0.24/templates/common.yaml b/stable/wikijs/4.0.15/templates/common.yaml similarity index 100% rename from stable/xteve/4.0.24/templates/common.yaml rename to stable/wikijs/4.0.15/templates/common.yaml diff --git a/stable/wikijs/4.0.15/values.yaml b/stable/wikijs/4.0.15/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/wireshark/0.0.5/Chart.lock b/stable/wireshark/0.0.5/Chart.lock deleted file mode 100644 index 936c574bf7b..00000000000 --- a/stable/wireshark/0.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.24 -digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c -generated: "2021-12-19T18:52:46.437279039Z" diff --git a/stable/wireshark/0.0.5/CHANGELOG.md b/stable/wireshark/0.0.6/CHANGELOG.md similarity index 86% rename from stable/wireshark/0.0.5/CHANGELOG.md rename to stable/wireshark/0.0.6/CHANGELOG.md index 425775be826..505856926cd 100644 --- a/stable/wireshark/0.0.5/CHANGELOG.md +++ b/stable/wireshark/0.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [wireshark-0.0.6](https://github.com/truecharts/apps/compare/wireshark-0.0.5...wireshark-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [wireshark-0.0.5](https://github.com/truecharts/apps/compare/wireshark-0.0.4...wireshark-0.0.5) (2021-12-19) diff --git a/stable/wireshark/0.0.6/CONFIG.md b/stable/wireshark/0.0.6/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/wireshark/0.0.6/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/wireshark/0.0.6/Chart.lock b/stable/wireshark/0.0.6/Chart.lock new file mode 100644 index 00000000000..9ce81da97de --- /dev/null +++ b/stable/wireshark/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:39:42.540992478Z" diff --git a/stable/wireshark/0.0.5/Chart.yaml b/stable/wireshark/0.0.6/Chart.yaml similarity index 98% rename from stable/wireshark/0.0.5/Chart.yaml rename to stable/wireshark/0.0.6/Chart.yaml index d6c94e16601..d12ffb74ca2 100644 --- a/stable/wireshark/0.0.5/Chart.yaml +++ b/stable/wireshark/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: wireshark -version: 0.0.5 +version: 0.0.6 appVersion: "2.4.5" description: Wireshark is the world’s foremost and widely-used network protocol analyzer. type: application diff --git a/stable/wireshark/0.0.5/README.md b/stable/wireshark/0.0.6/README.md similarity index 100% rename from stable/wireshark/0.0.5/README.md rename to stable/wireshark/0.0.6/README.md diff --git a/stable/wireshark/0.0.5/app-readme.md b/stable/wireshark/0.0.6/app-readme.md similarity index 100% rename from stable/wireshark/0.0.5/app-readme.md rename to stable/wireshark/0.0.6/app-readme.md diff --git a/stable/wireshark/0.0.6/charts/common-8.9.24.tgz b/stable/wireshark/0.0.6/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [xbackbone-0.0.14](https://github.com/truecharts/apps/compare/xbackbone-0.0.13...xbackbone-0.0.14) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [xbackbone-0.0.13](https://github.com/truecharts/apps/compare/xbackbone-0.0.12...xbackbone-0.0.13) (2021-12-19) @@ -88,12 +97,3 @@ ### [xbackbone-0.0.5](https://github.com/truecharts/apps/compare/xbackbone-0.0.4...xbackbone-0.0.5) (2021-12-04) -#### Chore - -* bump apps to generate security page - - - - -### [xbackbone-0.0.4](https://github.com/truecharts/apps/compare/xbackbone-0.0.3...xbackbone-0.0.4) (2021-12-04) - diff --git a/stable/xbackbone/0.0.14/CONFIG.md b/stable/xbackbone/0.0.14/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/xbackbone/0.0.14/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/xbackbone/0.0.14/Chart.lock b/stable/xbackbone/0.0.14/Chart.lock new file mode 100644 index 00000000000..0e13516a2f3 --- /dev/null +++ b/stable/xbackbone/0.0.14/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.37 +digest: sha256:8d6dd08c8cfd71d1c1779de6b03957ab6fe8be6632a44561d36792342b00a213 +generated: "2021-12-19T23:39:55.716159185Z" diff --git a/stable/xbackbone/0.0.13/Chart.yaml b/stable/xbackbone/0.0.14/Chart.yaml similarity index 98% rename from stable/xbackbone/0.0.13/Chart.yaml rename to stable/xbackbone/0.0.14/Chart.yaml index a7f8631aa0b..c7c2344ffb7 100644 --- a/stable/xbackbone/0.0.13/Chart.yaml +++ b/stable/xbackbone/0.0.14/Chart.yaml @@ -23,7 +23,7 @@ name: xbackbone sources: - https://github.com/SergiX44/XBackBone - https://hub.docker.com/r/pe46dro/xbackbone-docker -version: 0.0.13 +version: 0.0.14 annotations: truecharts.org/catagories: | - files diff --git a/stable/xbackbone/0.0.13/README.md b/stable/xbackbone/0.0.14/README.md similarity index 100% rename from stable/xbackbone/0.0.13/README.md rename to stable/xbackbone/0.0.14/README.md diff --git a/stable/xbackbone/0.0.13/app-readme.md b/stable/xbackbone/0.0.14/app-readme.md similarity index 100% rename from stable/xbackbone/0.0.13/app-readme.md rename to stable/xbackbone/0.0.14/app-readme.md diff --git a/stable/xbackbone/0.0.14/charts/common-8.9.24.tgz b/stable/xbackbone/0.0.14/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [xteve-4.0.25](https://github.com/truecharts/apps/compare/xteve-4.0.24...xteve-4.0.25) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [xteve-4.0.24](https://github.com/truecharts/apps/compare/xteve-4.0.23...xteve-4.0.24) (2021-12-19) @@ -87,13 +97,3 @@ ### [xteve-4.0.16](https://github.com/truecharts/apps/compare/xteve-4.0.15...xteve-4.0.16) (2021-12-04) - -#### Chore - -* bump apps to generate security page - - - - -### [xteve-4.0.15](https://github.com/truecharts/apps/compare/xteve-4.0.14...xteve-4.0.15) (2021-12-04) - diff --git a/stable/xteve/4.0.25/CONFIG.md b/stable/xteve/4.0.25/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/xteve/4.0.25/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/xteve/4.0.25/Chart.lock b/stable/xteve/4.0.25/Chart.lock new file mode 100644 index 00000000000..57bd5dca60f --- /dev/null +++ b/stable/xteve/4.0.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:39:58.130151957Z" diff --git a/stable/xteve/4.0.24/Chart.yaml b/stable/xteve/4.0.25/Chart.yaml similarity index 97% rename from stable/xteve/4.0.24/Chart.yaml rename to stable/xteve/4.0.25/Chart.yaml index a51cad6c2cb..502e64b8e6f 100644 --- a/stable/xteve/4.0.24/Chart.yaml +++ b/stable/xteve/4.0.25/Chart.yaml @@ -21,7 +21,7 @@ name: xteve sources: - https://github.com/xteve-project/xTeVe - https://github.com/k8s-at-home/container-images -version: 4.0.24 +version: 4.0.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/xteve/4.0.24/README.md b/stable/xteve/4.0.25/README.md similarity index 100% rename from stable/xteve/4.0.24/README.md rename to stable/xteve/4.0.25/README.md diff --git a/stable/xteve/4.0.24/app-readme.md b/stable/xteve/4.0.25/app-readme.md similarity index 100% rename from stable/xteve/4.0.24/app-readme.md rename to stable/xteve/4.0.25/app-readme.md diff --git a/stable/xteve/4.0.25/charts/common-8.9.24.tgz b/stable/xteve/4.0.25/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [zigbee2mqtt-1.0.26](https://github.com/truecharts/apps/compare/zigbee2mqtt-1.0.25...zigbee2mqtt-1.0.26) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) + + + ### [zigbee2mqtt-1.0.25](https://github.com/truecharts/apps/compare/zigbee2mqtt-1.0.24...zigbee2mqtt-1.0.25) (2021-12-19) @@ -87,13 +97,3 @@ #### Chore * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) - - - - -### [zigbee2mqtt-1.0.17](https://github.com/truecharts/apps/compare/zigbee2mqtt-1.0.16...zigbee2mqtt-1.0.17) (2021-12-04) - -#### Chore - -* bump apps to generate security page - diff --git a/stable/zigbee2mqtt/1.0.26/CONFIG.md b/stable/zigbee2mqtt/1.0.26/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/zigbee2mqtt/1.0.26/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/zigbee2mqtt/1.0.26/Chart.lock b/stable/zigbee2mqtt/1.0.26/Chart.lock new file mode 100644 index 00000000000..0cd6c4d0165 --- /dev/null +++ b/stable/zigbee2mqtt/1.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:40:12.916964346Z" diff --git a/stable/zigbee2mqtt/1.0.25/Chart.yaml b/stable/zigbee2mqtt/1.0.26/Chart.yaml similarity index 97% rename from stable/zigbee2mqtt/1.0.25/Chart.yaml rename to stable/zigbee2mqtt/1.0.26/Chart.yaml index 8e3c0441ef4..e406bed94be 100644 --- a/stable/zigbee2mqtt/1.0.25/Chart.yaml +++ b/stable/zigbee2mqtt/1.0.26/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: zigbee2mqtt sources: - https://github.com/Koenkk/zigbee2mqtt -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/zigbee2mqtt/1.0.25/README.md b/stable/zigbee2mqtt/1.0.26/README.md similarity index 100% rename from stable/zigbee2mqtt/1.0.25/README.md rename to stable/zigbee2mqtt/1.0.26/README.md diff --git a/stable/zigbee2mqtt/1.0.26/SKIPINSTALL b/stable/zigbee2mqtt/1.0.26/SKIPINSTALL new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/zigbee2mqtt/1.0.25/app-readme.md b/stable/zigbee2mqtt/1.0.26/app-readme.md similarity index 100% rename from stable/zigbee2mqtt/1.0.25/app-readme.md rename to stable/zigbee2mqtt/1.0.26/app-readme.md diff --git a/stable/zigbee2mqtt/1.0.26/charts/common-8.9.24.tgz b/stable/zigbee2mqtt/1.0.26/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [znc-0.0.6](https://github.com/truecharts/apps/compare/znc-0.0.5...znc-0.0.6) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off + + + ### [znc-0.0.5](https://github.com/truecharts/apps/compare/znc-0.0.4...znc-0.0.5) (2021-12-19) diff --git a/stable/znc/0.0.6/CONFIG.md b/stable/znc/0.0.6/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/znc/0.0.6/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/znc/0.0.6/Chart.lock b/stable/znc/0.0.6/Chart.lock new file mode 100644 index 00000000000..e359810983d --- /dev/null +++ b/stable/znc/0.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:40:18.557666304Z" diff --git a/stable/znc/0.0.5/Chart.yaml b/stable/znc/0.0.6/Chart.yaml similarity index 98% rename from stable/znc/0.0.5/Chart.yaml rename to stable/znc/0.0.6/Chart.yaml index a0737177779..48ed10712c9 100644 --- a/stable/znc/0.0.5/Chart.yaml +++ b/stable/znc/0.0.6/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: znc -version: 0.0.5 +version: 0.0.6 appVersion: "1.8.2" description: Znc is an IRC network bouncer or BNC. It can detach the client from the actual IRC server, and also from selected channels. type: application diff --git a/stable/znc/0.0.5/README.md b/stable/znc/0.0.6/README.md similarity index 100% rename from stable/znc/0.0.5/README.md rename to stable/znc/0.0.6/README.md diff --git a/stable/znc/0.0.5/app-readme.md b/stable/znc/0.0.6/app-readme.md similarity index 100% rename from stable/znc/0.0.5/app-readme.md rename to stable/znc/0.0.6/app-readme.md diff --git a/stable/znc/0.0.6/charts/common-8.9.24.tgz b/stable/znc/0.0.6/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG# + +### [zwavejs2mqtt-9.0.31](https://github.com/truecharts/apps/compare/zwavejs2mqtt-9.0.30...zwavejs2mqtt-9.0.31) (2021-12-19) + +#### Chore + +* Last patch bump before RC2 branch-off +* remove `editable: true` as this is the default ([#1576](https://github.com/truecharts/apps/issues/1576)) +* remove `Enable the port` button from `questions.yaml` as it was already hidden and defined in `values.yaml` ([#1575](https://github.com/truecharts/apps/issues/1575)) + + + ### [zwavejs2mqtt-9.0.30](https://github.com/truecharts/apps/compare/zwavejs2mqtt-9.0.29...zwavejs2mqtt-9.0.30) (2021-12-19) @@ -86,14 +97,3 @@ * update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) * update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) * update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) -* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) -* update major docker tags (major) ([#1426](https://github.com/truecharts/apps/issues/1426)) - -#### Fix - -* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) - - - - diff --git a/stable/zwavejs2mqtt/9.0.31/CONFIG.md b/stable/zwavejs2mqtt/9.0.31/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/zwavejs2mqtt/9.0.31/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/zwavejs2mqtt/9.0.31/Chart.lock b/stable/zwavejs2mqtt/9.0.31/Chart.lock new file mode 100644 index 00000000000..3d1293b4443 --- /dev/null +++ b/stable/zwavejs2mqtt/9.0.31/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.24 +digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c +generated: "2021-12-19T23:40:33.210331923Z" diff --git a/stable/zwavejs2mqtt/9.0.30/Chart.yaml b/stable/zwavejs2mqtt/9.0.31/Chart.yaml similarity index 98% rename from stable/zwavejs2mqtt/9.0.30/Chart.yaml rename to stable/zwavejs2mqtt/9.0.31/Chart.yaml index 9bc4386ebcc..e31fc0137e8 100644 --- a/stable/zwavejs2mqtt/9.0.30/Chart.yaml +++ b/stable/zwavejs2mqtt/9.0.31/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/zwave-js/zwavejs2mqtt - https://hub.docker.com/r/zwavejs/zwavejs2mqtt type: application -version: 9.0.30 +version: 9.0.31 annotations: truecharts.org/catagories: | - tools diff --git a/stable/zwavejs2mqtt/9.0.30/README.md b/stable/zwavejs2mqtt/9.0.31/README.md similarity index 100% rename from stable/zwavejs2mqtt/9.0.30/README.md rename to stable/zwavejs2mqtt/9.0.31/README.md diff --git a/stable/zwavejs2mqtt/9.0.30/app-readme.md b/stable/zwavejs2mqtt/9.0.31/app-readme.md similarity index 100% rename from stable/zwavejs2mqtt/9.0.30/app-readme.md rename to stable/zwavejs2mqtt/9.0.31/app-readme.md diff --git a/stable/zwavejs2mqtt/9.0.31/charts/common-8.9.24.tgz b/stable/zwavejs2mqtt/9.0.31/charts/common-8.9.24.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c1714c2761489ad58864bd7efb3843543cae92bd GIT binary patch literal 38123 zcmV)qK$^cFiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)v}!EZuYsZleRgVI6k(M{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdO`bC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZgVFHdV1NHFz5ZaoH~I_c-2*PAXGwFI{iS#7 zw%pGBP9B)zk0_&B2On-8@66yMQ!DSy#Rnq}akCYe<2B zE11KKb_A#;MOjFa93?r2y6hf|hP~dw{(kEct*=NH(Q&H{ipE-Pg=w3=XtjZC=5jef zx~t#*?Pb5yA9Z@|-nXp<#7Pcuf-(*aEg+7^04G!OUj^U}$!0A863F^%3;+PjEH2P@ zDv06|gM6K$u|lu4Qn)S&JPG&U{%A4?`!Dw4a54>_hP#Dytg;nAN0{A+Ut*^ z=>Q%?qvw<1V1M!=96q1y^%`T4F5?)aB*x*o1^BNM{$mW@Opi%^k|D}E)Z);7#u@r? z3A1S1QNO|&nz4%2<6gjSIOG~;18C+zulk){XV4q;doTJ!HQsyu2)^j|2m1%`Um@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU7@~iTeG6gUP`Ng_F@V+&dWc`+Jjc*pK#x5ghFG z!eMU!htK!-8?;?Lx`*)$O1 zrqjV74AI{6X6xMQLB2G4+YeQBP^h8g5!?surpBOI_$mJ-+M8HlL&s<5AS<8X&v6 ztrjqAy~Q*igMa)}z?ZrrB?}}6{s{npD_-I)|I@_f_85%8^_Pm?#c+b+ZNQ2Ox9!sn zn>9Ofyj)CB#t1n=6lW*`DT%09{xJ?A9fN)i0WH&61|tM$p1~Z=*1YHsBm=KBGV~ei z1CB&b1Z|z7Fhej$U`KMST>z5^oRT=k$?QWK!CcZMgLNi*bB4UY-Y2h6jB->4QGge~ zUh$z|U;v&aBx6elQ}#{a&z4qZf?zLh-0?&crD}iHel#7n+X8? zFQ=+8wNBj>X1QW0p!lV^#i^K41|&l(OfgBo98<>OL5vqT=d&(8{3PDLWv|CzuhqiV z)*+Z`u|wF~gMe?=TZy!*?!mSX(&f0A3o$b#{cFcd4jSKB{`#MR`7XI?j2f?Y+YMa^!i9} zFeW795Wz4c%OtN9!ep^SQOuFSFrwgUj`BIm08|ix1PSPzEaM1F5D-k0>Ga|+EgMK^ z2Bmsq>71R|jX-*dS-?BuA2beJkl7S2@*m%hX@vRFz`$;G0tomD@Ic$Au@T033N|5M@`lf60HRSFbr8gHBH7({5GMd7E1Z#pONA?#VNNR@a4y-Sq7c@@vvrcg z&q`ezx1NB*U2y(CWANephz-E5XzkS)e0zNjI;SW`kfP2pW4B+veA{{gj&u<&0{}*V zs~@&S;_3|Yayda+f^tMVm~M}``o2-Vl)_pe@G93Q@W zJ(eor6r(sgMN{=#zBz&Ue9YHDCm|7HqtI%pSyl3%Fd4mrDX%YTtAkYbrM-Y@TZ)El zx!y`e#cN%x4URaY0%?XxhVwNDV@QRt9pUK|WsIbA#*R60PlS<%hI14xnSiM39kFW1 zyb16G&^67`qRsl!4l|tN5XMU4jAL>|)tYA#1(eLPfXZ=g>7N=byt-tQ+m2u|Lm64p zc7aG0bo7}`D9*v0P%eNnvd`HDs9q?o<>xs{q>#ft9SbfG7Vr`=bq)z$#ZACB(OUy==#|0$1G9Pn@YHG>Q&Ew#x1gdWUo9rZby^xxK6++# zrKqJ+2YGdTrpARn)5b|9?!rq^ zE>p^J5j!;_ea-zCVJgjrx6%^)ODZ-&KairOFlbY0a-j%j;T)OUj@Ycba--&GOVO1f zO{RVx%?Vvf8I-Z-fBYju(|`VRr-o^SBneTP)2^!5mI47zX6$3an2EthXj>NSJ`wv4 zPG;?Vj@0Yjme?N7#Lu@lxuiD19KnR?5KD@ud@%|?`wRE{x>B4c<9DT_foldS{UycV`j zgr0e3W5-Q1%jA%LpeP%I{n2yv;>V0EQ}t$Q|D?+_jS-tK81oNm_GP)FIb#Egz~3jQ zgyioqUBEn?Z-@1Q?cs$zftImPGrYnvnwctYhG6tQiPx;%A8?EW)6<4q$XL;ds`r{H z%TPEEX#i{ljtNIxR|}mPvF5~>6<-HqJVoI;j8Rq3bOF;EA&u`aSp%Hl{799iTxbT6 zf(UbGCz!1P&e4K)z-t)J?b1ruox>FZn6Zni1Y9C6)iK4?fx$irX(2*6$`&{gT_9P6 zvJUtO#fDe{!eRk*S~ijuJu&PnVdD<@D%JI?4$A_T7uS=FOi<|*sNHVDfP~bd>Izvz z<7>Q+@d_n~(l(=1%>SY}%<^U0PFeG`yIXhWKM@4Tv3e^(fz*RHE8~X(fWpBrg}yG1 zK4J@OOUSbJ`G;k|7Fxw8_URMb_1KPlh3TAgMLGLxvds7-Dc~m>w%~ci0+g^R%Bed3 zpCGP9fh#5qFm*!+1X@NZ5ViXpoFAP8{Jl6;IX^ln8hA4W5d3t0ej;1IRPb`83G(I2 zzIWMw&h&<~E4rM*e6H&Fn(hYDY|Mm6^-EiX*tiHOQxP>a6)@MVYK>Y)f_gKR!VgnJ zQ3O7zk>oS+OrR;+n3Fi73ZgtFQyY;Nb`|9Sj`>&$1RN5KU!fST&rnE`h>k(OC%>jB z!+h6q-sgCM$THU-_T~F2#PKpi=kp9vhA{h5*xDnAZ$#^QnfZxbf4&!L*U%ryeH(JO zhwYB(-4Fb0Blt71Cu~jbaxd`{J2ipcF{w+~kA%Jrp__wt$7JpUeHTRT67xX5f5Ie6 zOu+)dgaW48Lkb{Rz|VNGTrjNmzuW7*?CX~HahK_;F@aH=sqxD!M6}C9$W_1lL@NmG{w`BEBo^F0r5VPXBx0&9 z0&{ZJyd%X~n6e5-RsJiVm^$@|8$CY#0ONQ9!^?B>mdxn;F4C<6yHvUSo zNr01r(uB1iBnSz*Q)7X^EQ2AMF5`IpK-hEKd8;R-{le8B4c$kvsjZGssIp$j6KkJ- zx&iQ^2L-89!6*_2e}*RK+lC6qR7r{#IEI-r>3_>e@>>OFBi3Vn0*#Z>URFN*ku^M9 zT2c2Myi{i(eD}c%hNe1>-Qjx#PQ<1`pRw(To8I%V)9LIQ%$Xl$upMF{9A01o`U=c5 z!!XGYOGpy0i_g3k%q~&H^j(R904;x%u(n(-gr#&jo#M{|yxQBu)M083gzW(50jYN( zd5|S`0(Gh-PYxYlCDjwQ@yf67rQHym;YAvwowo!=6BxrJMA_~$zD?teaFUS~>vV+^ir4@aaLouiL%%F>CRm~OWZ&a( zc0;soB$WYU8uX5U6YW|mET)ErfD@V{7y&Xh z+F_+XrMw9~8yz;o^30x%P$ZY0I`OAs>deiDD}Mdp2#!#g=!roQF}?{t~hnaR&ta! zTZ=epPawsiG1SJI{6mcT!XztoV)}K8_G&A!w+^-FxEIbCBr}|Rt|*$vv<*Y7gmEFWxJacipBG3m0EINl zJ{9^$f!PVn=N-@tC7>9WftyObu?JodX5=T2#}{V`^ZeocN{lF4rO;_b1Y42KJs7qAbT# zZXMQ42JpKiM<~m!vmcxMpD0T65wR<7ri@l-&PKRK5dI+DrR3cPwgVMxh4ldm?;^I% z3G5l11z9FJ+hjkSeGekUMfclD)dsd@$y&5fDOfk_>3t#RwC=@Fd!;sz`;D?U75oK= zZvo-=0IDT_QEmbG@nonS4>w5v8bP1@uWO4N7tS>uyQ+0t6KuNTW7qXb3LJng1|pb4 zpaMWS{8;;%vwEzcC2mX!8G{MT>L~5jRMv0~r59C&15$yHK4O!Ovn5=uGi!d(Mmx1f z*Nq9nY>9QciZ1R{$mEyuY+^b2cqB>w4`?UWosRXwa{5~(;*}@KI4mfgD~=f@rZGDC zc=SyE`P0cWkgmdK04>sd{R(H#qj`Veif>B!l zxFLrke!KEh`_nTJtrNJwA(P0&g={vMn5q$rJk_}L(f*$w&OSY}d^R))lzHq2vR`F* zY)$8Le)%D$NPwK-6-odVy%L=&*Iy>wbc-UeW1z9iNmGDMmT~+HB*cQm#Zm5#!jA>n z+L;q=sqpniv}wW+YE;`Kb?KdQ1;y3X3@!OZ2!K9g$|*FAAznNyCSAIt=9&L`N)kIpDX~MI>vQi2HwGbSvYyfYB{5Yzqvjx-8LVSWsaahq`NH zaEf5`bB1&Do{6qS_s{1DK*1czRO6_6!8RU5i=%|fv7z|iXbfJwc=03Fz=ctPa3w}i zBxADT-owWuuuMq;KFyghwoKUM!Z`jU85b+)-abCkdWqV66lJi82-xZZT2AKtl@RD0E194wJD0VXl z@Ud!45KIp(Qo>^v%dx4QX;%7%)0{8TuW*9p?Edj4 z_u-a)woJxVig1IapDmL|x@b-pIvRz%Y)_^D78>b72FAGE)H85Q#H^osR;nGL)rQGe zxS2{T)BU+bEG-JGOj+UU=tB`nE)iN8f~`7U-NHzKb(`RL}9U`cWGXwy<|Z>URahkG_HpA_bwT)GberUoz8ugw0OnOERd)$?`AttU*42!$G!Y|fs z6=kD>uGFzr6Vg&;)oJM_`m#=$%HENN39Udw7~vU(6w}1(ix0=LTSWw#-!c8(H~D&J zTpq1&o^Bbrr`cSK!kZ^rw%%}-U8s*UT*aWGfNNa=1+Xz%GsjN5*{A74q;3UE; z94%qYX690u9gv6^LUWjesM8W7%#G(NN*a}suK1ZX4_akvj_fUeX&Qk8%L*Lu@4|A+ zRi`IU!21mFV*?Olnj2wMnew$vORX5MwHZF2qcidM7VQsy#NwBA#u3gDOxyBZn>+c* zQ9ovMAuRB0z(bPIJcF2rCEaQh69KVsGHauiIEL>+O7Se=VM3VR+kKMo#0cW@)ozRZ zIt5-+ChuYyzm%?X8*^Fhc-EN`69JD4*Llh029mydyN z#EAyUl4n@F?V>#F3V${>T4~DI{+ko!2q_AwkZpGostZO@TO!cT z38z7nhi#5Sn{hn;XB!I4ySpu;A9`MKItD@i#h}w4J@528{a#OS0gb8PWNi>Am$r~B z0`>0d>Z)VCZ&^k$b+uO=TT##z;l61_fTvDN-v%DHz!UH@0!zAtal8f@3dv%Dl8E~r z7-1EPNEouFaJ(iUMsOvsIq>`SjO0U1mXtvb=L8#`LTnG|h+FwErUc-G?FIaX$DA>I zDtw73$d(CHp^ac{GOlBc^E^fjv_|9^pv!R18h?iq%%-=a4uvD4&xKV#jB3k7^i_=F zl*BQ);vsLJfS9q1X8=b3TGCuN(nAUo#CST))*_IojCLy2i!5G)Nyc5z;WS4X__i41 zZ#z815t|XQ?}q7e42Hd4Zy}9~3!a4I`Hz^#hY_=A6zw|&_j~WKB!Y7pJDu$YA~viz zfu(?=70O`DmPVT?!K^6Nj<`DhQ^e2nrO!jHuN90U8I5m4%i6>1 z!_j@Bvv{>vY2r5w86jU=0IX8;YLF=_vwreS8@?!UliM2wVP$06Z}r5>c`$OeE!82B73sScKJ%IO1i; zPpKAh3ZLjTEVMOI`Uf0qhyL=JruPuzMpj_!AY+v#?Ef8xg8Z5guA^FQ-?=Gudt++J zoXW;4XnFPqmHM{4JD4fR1Xt#ApYSRY?zvyzu3;eEWX~v)%asFQWy>Tfk3_+J%!5h1}N%w5-^=_(czd51nHAk9Q0)?_F^ArDe3I>z(VX!A_F4VRj~v_V1=gA2F_ z7+(VEPTTFQC~MJlnKVTgspbHV{v76dUYYQ~_WwCbY?O1ExfvAsLAcwfaIu7Gssgr( zWuY!&GPaY#xz4DDGnyMTW!U35Y>C$^oQa@jrcfkY#^bdJo~t+p1V7^3$Wp`@JCi!N zV{O7FCc`V3BXD;16XP2j#itq0Ez#)|Uh%pLj)DQC=R4QVwZOxxd=Dua4cjPTBN(~0 zJ0h6)gz$j%YMn8mk-Nuo-A=Z7iI|pti72C^kcn_AT!_)SXwAjpwQ_Woc0suy*&Bav zL?m7z)1%KRPtJjr**6u5^fV7f;1iB6G73K_UTmRsCQ~FRq0hO5XR^a0a7E!q?QRgA zjXSa(u!l1ogW9!|u@l@y38`jyl```#3XMU3us7%%Z+#d6D`tm^2`I5GVo@0F7zLg@ zxtFLE9B_uFMO5h2NKr;mMPhj3!Hqqc;&um*2f%LYZiiVKC(;+$2{)T_TjCgo$hz zQ3guJ_AgQx>jLYoGd_FMDymyYTKbA6VTK|aD4GxLR3SWu5KI7qbS;@Zr>lhINM6bO zaQgO4rUo>21U3b)zGuX{%wprf?G#0rZr`npRcqEGUi4u*wP17|O}6irtk|q$vhYK7 z?Jtkd7LV8`x;mLh_o7IOdP1TiC2A*6;~Tco>-Bo0;gJ8^>-F4!2YaLazx0Rw{e#i) z;9!6MFTFu;FdF^^^zOK?-e<|w|G)HZ-Im+A-^p`*-Tkh`_W>P9fvY9*>~j(?QJUdI zMBtbg`EpYt;$8{jkp5CK(h$@4Ro>Skd8#dubXwnazkF$3Uu&PCKoscAQy75u7q$hn zuXqYNABEIl$nE@t98!{}F#V8+99 zFl1F#w0YjtIq#iJzXyPYb(+%dsxQy47`E5f75y*VpqO$dM*#o>ci%*bkp;hMONBYs z9DtP;xdMt&#sJlq0L&c9RRD@I27o;Y0Oc7D&0+QvU42?+H5_eexH*-_be=2R(cL?+*vP$Nm379=`v}T)ug>PKny<%UiZEpmXJ) z>%AG`3P00Mx#}N_16iFGZUUKbuM+W#qwGjo04leC7{})J-~A5!C^NB313pY5Q(=*D zt-tG2;o`VPdMae)o%zdz{jIqQFa z@8IBZ{XfLR*Z(PB$xbLZy%jDB218OwU{_>@zOLxB$ae$2THZy)wDV&|SYQhJo zXiy%2xb1c_j-s*(~bmbDP|C zhR|h<{M5;ulK?!emCFpV?03jI{}4}^|Lf>>55@lngOMx$?GO8-NB;j1Pp$ojF*Vx) z#LcaoK+g2_Igiyxo)&Fm_R(Y)c#SL4Od(7Z8Uw!xrIGpO7Pb{tfqN1g8M4Ht1WEX^Cuqy7p3)F{$XS9ZK;)*)#I+BEQ}#?!!38J9970^9wBX-=}W4B%m? z@J4&SvI4M9hsBZLY0TdmQ&TrN9aZ!7!HB>-&L|M!Lm`|kcf+Uq^;{}1upWdGL$a<>A22HQje(1jmGfIol;kok^pteW!Z zMx*hR<{8YYT35^Ki38WGtYaZ|H7NG_hM6XQ1l~Dix#&iZd-zR~vIzM1h~PoLdhQ^S8z9oQ|)>11s5^E2=? zkBupChcGX*csvCiolML8DEnm{p^RUG9iRlUZ&vMZRsjg|Sad2vpMgEjCED3^EaPjl z)Ff}U4&p|P9J!}7gT)y7h@lSi%|}2e%YPzqgtEYB$2)8;A)qYph+BEa*^jqNbwZf` ze5fUPRldxUQb0F18Lf=$wt-I-%dcQPPbKeoqq!8*FxbG{fIYRh<4?uZl#mc>+;&@3 zYrM4LIj{^-rWB1|f*@#ud$~;qd(QOckp3O5i;967!rh{GYBHSONrYZH{Ay!Q)XAx= zZ#iyin3rfxJze-!-pefmw*mZFUBt@rpS<{ULSh`Q??ejRn3olJ$i7YyV8Yxgs#urUoQgX7{KvDX3k-``f3=vgE~`j)fs5xVO?b>; zTa@;qw@Q;{c)1Y`wiq^5wfUf_8qH91FO_eBnyT6yHC1B+YTqw$92NeV3z(Xy`0T&R zdC}b3dY}Sm;qPAWG`H zurvxldY3W*VpD^bQ&&xUMY-EFXT;?WKz)l=(b_gGFxAI=E;8a|uL9Lw*X+Rwr$oOc ztg{IWtLU;+m|vu9SXNSB1`0c@A(gd z(p9+e07#t}oP0bo&8ueS^RkVSmDaoC4*CV`Xa^CF4*xFLFn_Ttk8*f5Grh5U?(x)U z*EmCB$hF-QA`Y=szVU63a!an6UmP9y4}G?=_8Tn)o_3p_{fLpZ7^rLDt+DO@*2~~e z`;_@VlQHgg1K4!`V}Ic4|HHlEBmaMpXRG)hFpiD=;bW1?=1v_!g^=qp5p&9PEW@T1 zn16@MoQEmlo=t`|SeTGyFwIjEqp!$ulp}7tj8=FyHF6lOYGG@C&l0yT!{m8p*k}HS zGIduQI3++Pk>76mzQ;*~liA}eZr4mkVk85>z!d+Ok!4yl@+}n<##}dBABijlb6{<@ zCA>4s+QE_B0MxdR9GlZ9>e3X3();ri#RyW=IaaSdZngfwRk#*qJmWg3lw^K?dSZG1 z7rOXeN&p-7|K5JjJ^vjZ4E7)Q|A%C;QxBfY!eK`N$!LV04|LYw*uKx#lO7Ea`^! z9&Jdja{yLB*qi$Qs>tt#1xUSe{Oc6)R`}P+&xY+r!MRDi4^_7!+DG9dY&F~5M_6^H zsgJPTyL*Zcq9@pHuBn-*sJ^Y|XUp*XROiyvBGyerS?BF}rbu#=vu6!0y3U>(h_U4C zsd2a`Urz(|Qj>MAo~oYd>gf#WZ|CZ%d+_M#d6TDd|A#`+x(hL2ll*^BI{z6BN00Zv zALKFQe^bBSS`VoF!cjg)LQ zURzJ2i`RFofOyt_;Tds9I>3hYKinJi-Syw=4IbD3Lp(Q#|8OP=Q3v=AdC^xI1j344aGOXF?~_+3M)w#A z!dyxXLP0Efb7xxwglHDsVN=A2P71Re^DHqEwm05`E>$^$^+2y5Fc5>>ppUm)?)C8- zO3SV)%z`J-L*=r2jJ#0H+NwBmK35V;!LuBnp;efhTDq^UNqMY%A~zH1T;u5TtI!k| zJ+*uVi~(qu2*%9&paAIsG{+0bd^hh%gsjwiZB}xKU9_9asc!d0~ zME{(qsQ%9N9FnwD*nhQzy8tKhS|}>4_!Z&*c|PUMvHwf=bUa=_)i;2Yt*`qXI80N< z58PC%MGiq}!iQ0WMe^k%^+|{OxRz1EWerbWAQ#_`E-iMiX+{=&i?lAj7%(mSrnUzg zJuM>_@J8F_Ae8`?46EJmz#ECXIMlF`87r$RTBP~f>b*Q6ZPIlIW|3j3u!cLg01EhJ zr%_)Ij5(F{#Fnn+Qv9-~PnOuK1H!NEOvlrzm_-S?ehN)TWqJMP60P-Nilp2C1bMbZ z0SI_f@e`QO0}!;?Yo2K-2$wV`ivR>G12>7mZrzYY!+%*)5OBtc0ls1;Z10g-y5<%a2!o| zQn$Ex2A<9d&CS?R5<1VPU3td0BQy$Lxg)X#_jV2Hl+-HvqQ@g(cm%pLyA=m%P1nN4 z@J@AW!3geji?vYo_irr+{aK%e^1qZXZgwEB$^YlzVC2gG{lTOB{~(V(|Fc8{H*vK* z2gC_QS?xh!okYx*xlDPezqfdn>oEu{gQ5ERhJEa0C?yobFb>BWY1c`0F>cT)?c+pU4#FYu;2>RG*T}m@{ua^`PpY(sy&f zJ0_}*9LmdQ;OUAFWV!E`o(`|fPWnwle3u`$6eNQRK|$(lpS9CaZYecz)Y6RPBqZ?| zoFAREU^b&Bom7KnCHdi%h+^#TQX2&AHkS<8pSMCakS$dLkYSZx;mox0bpz{0NJ%&| zOu0fydB^k`X?4ysyx>MW^ONwqHGFM5o_WMmK(ZQSXE-m^xTfX4hZK#5O-r9?pW%We zwO%I<1(XUm2HlL1yxXC4-o?>HMxn5SFDK%&e0N=Q$EJ*pHr4Xm9H!lNOSfeqbv4@m zZ+RtP!~WmzAMCmLzlZ(D{GSi<=>7kFijt2f#~{oQBO453D$OiZ@BSj>+ZMZj$tcu* zfR%jH%Lv*5qV5c^Z7%k^yO&U_^V@?_x~?GD$c8=3hT-ljQW}VE3{ejK#x3|!<@?H> zM*LrF)c42#_gww2H{5%?|M4J?=Ks>1y_2CS%1{#GWCmt9FNB+2M+pQt$%%1*BFyGn zobLE7?hmm;Y%S}FjnEUwa|>xvz|amSH-KO(ZVtRA4lLH@WjQBE$^IRQ&=?H%M{E>9SoZ)=+$03l4_1jjhX%3%sdk@AvigX7od7l*Ij zy*X}eVIMTYU;ZAggPMBo$~I_@$NgId83Ds25)mr86P$GEod4Yp`9Cy9C(zs&HP_?>c*ErHt_%6!G78PGkCoJ@gPr?|Cbrb_aU9XilDyLu3x24!G6at z-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY&duG5-65JX-$KQN_i4 zZ)x+@fyIsR+0_f!7lypjWP8LRzJuw_?`gGFgO<&9D~qjaSEIg$i+Buv6(>4eaaR)H zJkQgMn0x(Qr2I7TMelh}ew<}#Xnz!6xU6g52btm+iB5L&McUQhdBgtOWA5n2mas_;u#de-l_o_yi!4%1*U%FvY-QJ8AcOCvkCKq~^I?mOG9OgK*;j=ozVa&PU z5R(wbb3$|d*1h%uSYy6+*mH4_!hC*lA$1M*gDVUbR|x)OCX7b>|9#^CTR~a>*PPg+|Eq5s^nbfp6aC+=aZCMw3#H!J=YEe$y(WpfQtHj|xPPU7 zgV&8lrm@eB*seNkXMWj5c~~$>ODYITjxDM)s+fdSau=zFX*-UTKV=9;?~`~v26<+N zy1SugP6J<@+WGzc*gyX4&*uGKPwIWyfBFY|2k!pA_Za{0VV)}ckC|lZA?-g!zNszL zN5B2Y)M)SC{^JvK?%DoRjLp_J{s~y zWa?F|TQG@uP3XB@#5k$2KTq-I!v)Qm{VG3EmzeHDiu!k)iztx+w|315T_x{y~x39N2HD;st`#dma^mA8d#c~wx|CqSqkb$*-iR1X} z3g_Y6ZtaIRr>}oLeEZgHEqH$%7)4Ise>i`A(YH$U4+fq7sMG88y8S`mPjoE?vw|o- z3unAzk+q&)yg6A7ZOlZo*VkO!l2L32zHzCTay=#f0r6olDylzK-(_BXx*Ca;G`fWM zBz{BRs$stbV8;j;_MhLZ0&lqv*me7OCxbuo4F1R&{r*ixznV%(26lYtDYm<$DC5h0 zx4v8oDZL_DBt`}$s~v>>JLiyKOW=%KFo6u@jqPMv3+0JL7$rJrm1K5(<;yIk0-|$hab*=8jFbP z&bHEo5M~T(`9Vc~?(i1Ja*;Rv`UxgB{2z*TfR!RN2NBv_E?8ScAlyTib&QrR41O z$>HhY`TJALV(_2AqsgdjGWuQGjQ;-S?c1}T-<%))WX&*l1FSTk47vHlwj14xEoIoy zmNN9)Qp%mYc>Vt$z5Vd&^{eC8=Rdzc{rlO)o0E^j5;>LOJ7fRHw?j1?yOA??jYnlO zG5=o7Gbj%YndEBL`!gA8?&&GXe=^+vUEKRu&nEwm16Tg*AM}Qg`rm^*wfSG6ll>LO z$_f7+Oz$-Jt4cEAgb$D`ce;#Yl^TmJ&uP~a()TIPSLWf-gnH`z8e{8Y^=m9eE+h)*T6HF*G+>s zIE`_zcavFH;q9i=tzyR;^64sYcbG(13`VI1_PQvWr!m-3;C3w|X4MALZ2zd{|0>ha z?H$1D`G3DRbnpN7NBjGa@&6v=*_!{qk%^=3gZt|gLwCXZC9o|yznK^7)_mVhvh@{k zeREXGJm37p$09uvtDXVWiVqy>B8eFJv6C5G%<0fu!{@_+n>(=ooaR7@f(E?DZO^Zpe z7Of=I9C{himzL$>8Q=u@Uz{dOW!=FmVHaF3Cn!r$j%b)g0ob*1Dy(}A(b1^fw&6k! zvt=@88W&YF=uXSRJ0puNCu7lU9u{>|u(-wOSGQj|@LM!j9&?A&dZvGuy#8#zp9C)(Eb2%`D3l;6I#sAZ=HC0&DL^IlCdf00 zrub6#xuB*FCf$rIbDq{K&(A(M@&!y9!WbPPl|BuCQho!6y_x@W1lJ&sMT%3# zumk)#L_CM8ud%0{Q^b#_I;Uub*@E?QT|5Py0-Z_}`4AZ8^kDcIt7k^_k8BwiR%1B> zE6?zY87o@nxoJI3yV`EN^7_TXeut{C%Fos94?=Mg2ngm2Qi<_peuR{NZ% zgSx&hIN?c#rucIpfV0m&uqDg@n85H7CDGV=xfuzdax}XY%?(Nobg3@jDV@tz0Z5jM z3CcwEA~|BIAC_d}V065>eOeIK#-`jMt6GBFSfvp6d{@ofYPWBh%II&kk+B6we-Jpmv z-gY<@c?Lxp=cO&s`YO}|6`pur(Bf0osQBSD8Inqlf;6#Hn?T;2Z0ki=>UO%E#F);H zNzT-W^Z>)n^&qUq`99{@>)9Uk%rJvnJEMg%du8Ur;x=Z>n%OZ;nj%Y* zZSL$8FO41Isdvu$KouJss&ImyO84k12OtWx{4T$9!Qs8wszoS|yDOSks6 zUJR?U*>BiSD}~6{NhHpx?^=v34GmpRC{h<~pk_S!jv!9GJEGcp4PLV)x2fYdqG=z` zDVWLgo_Taq0M0-$zrBY12b_Pxvz6b&v(f%@Ayl;6Sb;X(|Jf_~e;*u-9`AoY$iwYF zrzl@$iA=V^RZh+dgw03B@V4zfjcqxuhHscJBm+9(9BTYhSXGPfe!kYR_*%P;u{mDX zIxd6VuwY-+p4b(Uzk6UOMu`n;*JOMA^7D=|${Z8Hwz;KDA;^YTnW6qS_=f&(@P7jB zj=*-BYKPSfQO1&mljEi_vpejJne8;qY6NPscD48=Xu=s#iNi}dgxd@t6QWdo%K)cg zUZOR15dRfSaYplM-)RHjo!G|z3{RQ=tGjBn%UM6XMdB~{Y~cUHgZ+`q|NFhi^Zy5V zd>mX~{1x*b6ee%uHoo`<%GdNI(HP?8^&Q_2sWU%6+$D)?b)81o{v-6cbctw(b20a= z`n`)=`0Htc}X$Mw7qmOX;K zarJ|1)1P#fxn7`(2-xfMG&VH_rX%nkz63jkmm(|lw9?y>m-oYPzPYNUQ`#QV3P&)7 ze98B*7}A$uN9;bL(5~?MtAtsnqM9*8_}1ya6=O|?&m*{8zkC(OUwPM~kUf>zM7??a-MnY08HB8eOHOnUx&fRT@{-mNz82h-V0?F&W^Nn3 zENms3*3p!0+wvK(DjV?}V$?L0`Wx{zbKOKw{kiDPN5%3u;5#_1d$FBf3nbgofII0k6T_N=|_#n@V|Ikxr8`KCO^#o$@r zmRVf7;V|xYzgdmHSqXnUg@R~QfPX5dWn*}sdR3?-|HpXJ4N;bNFW7(2ZWsAiJe&M~ z`-8qK{||Y-#N5qPJ!{916XB3bX%BzM=n{1R!X) z+kB_pI{5Tc>%v$2`Wlq)ikSyNTWwLoH^BDI$z!Uwpgg9XQ0^xFf#7G;;os3(48*S> zCuezvlUWg8+S+6o#7nfUgP7qJ%u!R2*AEe$_VKyzXT$z~7vX<4#{cb??0=)j{C^Mh zsPmr;qZI;-opz^Cs=SN<@DztIM*ve9`E8k@sQU27;n9Y}YlFSahvO_fpo z5aa3cN$X&wWlw`(?%)!w0kNi`e&CHg;j0@;5E$4oGShp%Z!;=Jbkj(QO>6t1GB&%f zZme!NG+QiXy+i>{0RDVbe5JMHR#3dpLtnqN{o1wt+iC~wXqQ}f_&Ub08Dhxp#&u)% za+;Bajwa2;y4s#?=+RS&5+{zEBVH&u^<$%(v)Xrk>>JiKU8GAG>s6^}j#uxPBU$EY zvXERvZ0*%Bw@2adYkvIl-yAXl&@iLjr~glHG$_UY9StAz|3ApXbF3VRds^lN4-vr| zz%V05u*b^84+f=Nk?b-iFzV10$qU?#%&*QV4*slNHSJN*}d#~QbBL_2mU2Z_N1<yi~EZ?}E~<*kEk=?k6uC}H0GspJ3hM#ilzfSdS#uWbL@-+%P~dyvPJ z|Kxq;?LOn7|o|+7p>nOq~Ut6+y|$Z1zmuoVvxxmWHA2#cxB>)FMB#r!G!t4wDes zJu}_R9=You^{M0kf^_aZ{>$*-z?J_;!@;Bf$AdhaPrd$}LYZTgU*#ZE5x#|yK_z=K z8H?d6AmSe#n_d*|EfvGn{|JYo)j8iVOFj@RIqC5-VDvyCE6 z`Gj;@KO+I1m(N)nY;q`=pb#!80+cKeSKtI!7t=V!D2~LHqZlu6jv|pR7gMk^S@S7= zb$rIk;$+4XH12jAs1s*&8gmPraL<`o?EZ7Jqztbxa7Fhx+O5nyl?o^>baMf zU@s}wzU{@;QvU9I>8%ERHWm-iPYfw~cwi1C{i3W)?ekf%}M&6vv<(d(t zxOBFGIZ8R#u@x8{H8_s^yO2yXl*Zh@{yzc`Tm;+m7u745txJ*hFbv5u$r(#v9HhP{ z)T(prtX{)xYZvT@pkUVQDOxQV2}&-6yH!vVJE&xdbaj9veV?Ksph|;@bwieS7-c*F%q9ZSrO(%?$B<&=qm$*N-+YA9n5-B2DAq9ry()daw!;Wj z1BPfp5{fF|@~>xTYp^tjIhrnG4%i3zOcwCLZr5C^%>e`}7~=@IZSH(ScY`X7d|bJ5 zgJ$y@2%7v45Onx|_5GIsOn-@zO#W%@$ zDfq5iI3hT7uI^WMfYH?9GAA>Xpp31&l+b*ZA^J-UQb_3)$s)?{k0TVJs1A07Qj|m} z2{FH+qQG=;@-J>pscSVu5vI3lkV9zH)&gc2Mw45$CSkbkH8R}Pt$!5&@_y~VgTX=H zJ^vq#`j7EH9^~QD&8?QVf8Se`Vz3%Qq6B4WG7@5upeB;8ceS;a6lI<&J7j_LLgN!P z-2mtd*6XOKy;#zmj|9_>t}>h>7b~+l3zYT=?0}%STA{G9TJlLAEe@yq9pD8)N}|KU zncyv^xd_N*zZXMaT$ePzy~1IxL#h;|?5y{mW(NRnC9HPw4;)s8CSV>?dSvizIu)poy1CPW*X

=J;?@bmbdnxLR&ba5R_83NJg*Ol1hCwobY#1L=@+%*qf@D0~r;)5i1M}SWEcQz? zQ-#UpQKqOGR8h5G67hbw*hzDmHkPFxY&-aj8VXOFwM190hd%_HYl^BWg3kLfBw2R=7yNuRuz6s{1U%QTJA z0wp<&f6T}-r64DOpEu1#G!}KY(%v?BR&`ln{1Px05B5jT4O}@v%vWm3q0ZVU$x+6p#^`};4kz9oRLo9FqBCcLJfq_8*vp$jaVYLEP1zfs+>Ui> zrl-OKWIN(33i?K0O&u8Yz@Qv=|K|AdTh2e8eAu)!R59Q5OXP+_(C-~o;uey{1Si6k zLzr`699Iyw+NVuYrpvS-w~!(<$wYt%qi-UC&%{ zfTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@&jg9bD)*hCbA+fv1#iV`d-#Yx~J zK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz=yPcDvMpI?0c=J?gc+3VAf zZ;oD<_v#~<9!8O8w+)vxCyUC@ocC3Jjn)ZV;IQ($YWh`1(z>=QzN^M7J{PU~3)F~U z)=f1SMHM}Mc>@4$P}D{cBG!S5jyFWY22q8D9`dU0TlDaj1SrC{*kw#mJEe=F zFG0UI7&30Dd88ML6{J=5`lXQfE4YZ%E^PGETEykoo8z3`7~759u-Gv)#44sFnL^;Q z$Z}xbdV$hhYgM9T!3QllQogo0i-V;FLvb?~2!C($2A2m~TXpH>Mg`L1C?H_#Ehykr z>{qfWyBk}!1fwX>P|7;1ZyA^D%Zl^lZbnS>3sC;4c#+2Ffy%C1jx4WL{_y5!9-rWl(SEdC)b=GjPtvlcb z|KGj611J9TV9@J5#{YPbr#An4K1WUlc=l#NmWjz@z`w{uq=Cm2WXq&AK~s{cdouiT zaU65&c}>@b+^;gqG&@kCBBU_k6qRBQ0 zx)Ypq={!)s+oApwg>wSFJ+##GkYpJOb2j59Z|!ux{m<*`av}y8MeOq`Rmqutz%kNv z$CJO3T;zlBRFM~ZFy+Mq!1L6Gb8?k{_9@sOJs(By<;>Wq#Dta zv1!w~_bHYHD3<&xO$1!INHpeSdv>c#XEvX#oG7bJH#w};s&CX=RyrpBnJy>xNBN=v zP%7cU{%&NYKjO1d{*!lrQFiltAocQJztovxR_Ke$1!k63Yw7O492iIe+XZ`g*cQ$3FS-%_~W7+?r@Dff{YgT1Ex9A5Y(Z zIJvl6kaq#?T1Vg5sWd}o2uAOdczsGp&SWvVra4-0NvyI8({YYT!m5Ch1a>yMIDLKi z>f-(J+yA~eegFR4?nlrM{60uh^14K8bp~N7s3=((={8NtONQlk2P;ow1?H(|Shj4N z|Mf#g7R@kVB?~p}+6+!EGfw>-txwUksK!^neqYozGW8TavS0`m+U=u!R4SaRx(s!1 zRrAn9Rt!}tI|p&|{U*fCvfCnV)!mG^^G;6duZrar4DWfVy3aSxA{3OYxMzS(B!<_Z zWj>LgWPjB!(_zpeC#$%JvKF)6F(j!Q?P(3RW$%KLQAP5L62XCp??`uC?@1-xwwJ+f~S`i-E2GPyXg~Tisryx zBGyQ~R53tzv}v`8w?=Ad(LnVAEJJjY7MEVg-1R zdE~vP*5dOFrnP(2VOK0mIq44MY9-zIfs&QlHOeP3@}q5<1(KB;?6?i|tAZ0-e7LCN zWxpn^058XHSMYngm5qGfCLHguRK#6k=r`+cL*2`2oO?W|NhpPPF0?-B)6|g>X#Das z=Zxhb(FGLKXjTA|6zsF88Ld=_(sf8@WPw`SP{?|I6^Y9qLoQHEv zk{bJ8r`5;+n3Bkh|6+;5+SDdeuyPLLzN@vylwEbpAqs0YJ6}A*PKDXURa7W%dv;XUD3OVUIz%K~ z^L*hHiLw>Sd|xSoSvVJauzu@3&n~ycM??O&y=~KvF)wSp7=wTO^A4LbyAOc+wS6PT zpW;yUOkHhBWSXc#r*JcTG0}4wdRzqRVQCQ>sdt60mo#XeEA(|C_Rj4`BwSsOoZFB>H!LOPksmoF{z_wAv>DHnSA z+Estw9%@cf5|i2bEX@#%jz~iD3}WdfQ~B{O+Ko|G1Vk`?ZVCHQiT@Kk4fOvkzhw;A z4f=ooU|7okxIcW<{~zSxhRqXxolPtJD$jwX@HbHRx#ibL(V;KK#`bMt|7{8<_k{L+ zv{Odd;y@~|^~no)HCsI|Y3=f*!UBef11sYi$akW4d)vbckvafMrV01p6WY??f}`2RmNf5b#c~e-V@v@dHEC{4NI~eY5)B)6At|pM1;#( zbeZyDVeLh-FZ_yt2G#*Px&-)!J~KW65u9Iyi19XWxLQl`hZPWAG~g7LaB;2B(o@om z4(yo^x!HfA+Y zYg@jfjO&~EKR+9}&-~weqk};y|M$UT{>KM-1pnuA3`C|uOcD^284jCqeR*`I@7tsq zUchXv@*+w-+-3G9^+bN?$m%-BtqD_I;tq=DPdTmU0CiLWo0RblosfU zVg+tH;($(m71rZMJqlD!UGE}(%18Hnor=6xoa^Yc403beMULfm$o{sjFNujY z*`Fv>+FhOI%+}QBATZR09w=3mc4kgYmRG54Qrz2jQ$UGtG)1A$1!7?Bv5rG*;Ys9> zfHm>$k~c$v62CXm_IQto`4w4}Ls@d7h^~qI?|qX3Z_Fq=}UKy?(O_RL@dzhoy-K2lOp`Pm?h zU!fSTwHe!(Mz)MQolzf$FJ>SMeN9M2gb)pxnc+Mw zsQ_RKN<~si!zL@r7Z7SdcS_J~^tqg4MRVIpkO?Aa2fM-+;M}rwZdeu$)gl<5g_41_ zb+6LAb=lc)Kw`j9mneXAGZVkIg(5nTkrd9jAzKu5-)?|f#a!Ku{d#lqMJt(M^^xW( zv>f59!<$HIScSQE`?jV=$r!6JFGaYsYWWJ3DTyyEUbI+OC8A;9D+x!n>B{1~Rwdn( zziyhQnu&Tmow%E);r@Rs1JH*3f4F~e;NJi39UMIF{}1tS`_Jb6zmY9SpDR1|YsC=F zoxWNC&>B_oy28|La>;^iyF0rHM{Mv$5GbW=ufk&$q;!*a{L_+TVWavP(;O!=&ggA6 z*ZmG0##eAnL7Jf{$^cA&T^vt!ARUTw9sS)!^JQI=8**-UzXR{{Im)guML?jzlfol# z^6^NR>YZlY9wxqQeAmHrDV7rNwm)RXP7yh$X^k7qUOKi>PkVKBQ3gF=uUo04>sd{R(IH z`ciML@JqI&XM$Rw2ro;P!s0Mbg9}8-z#~1^w?Of~(ObO0?x~))5nb5V4*#jjj-Bp$ zESkgeNRq6)Uc_kX>q5b9RS|K~C$J(WKP8iYp)l7hO<(uZRBROBXL(43_cB>A*V7oO zD>AkkF91}wEN_b$Z=QmZN>_z!P_5)j`fzqq{kgVx zs?@m-jtF>K{F;H<+!Jw*U@;iwG-nnT(#V-OSnzo{`7Q%{Gs~Ay5UJ%ol0`Gi-JKip zZt-~Kf73Czdm+bx?BL$F2@DW+)?Bv`E zg%Y~Vn6{9sl|cavGeRj?rV%G16ycmIxstn$RO$~KGMN`gp)MScV81gH^wEiIZpy#3iKG0_8A*Ib?iNWDzos zHXRXAWf}6^L=c;nY(LCUL`AQnNt&S*CQIQbMabnc1;MHxfIuMN^pB=6EIP>n1&XCS zjV33MQh7qIUS@>k_G{4{C3qSb6bI)L(o3)dgpOqt>#+J7g|;G%0PKQa!DKXyP-w&k zFWPScj1{hf=r+ptk?nA_;8^W71XjXPadhj}b}@u(3GvGc$IAuS@A-$uTgcm61(=Tv zN<#bkcy-5$)_gUsEqIy5axC<5>o4)R+x=!W{$}-G->llQmGRzQZ^TXR?gEqlexN85 zm)s@N_FAo|^$O;20x1G&{!6`FW^qC&-44tDOKH3y5qc@ZBtAISX$*0ak}PM8%t4*= zGLC6AL#u^b1#^3F|B5D|1Bt()zr^B-7awB}4cyHrv9{WaHJeKh65_)HARvMJP>`SQ z5eXq8zfa*WOVqmdM$MOy^n9LZhO}d_2mw*EsLfzbC6myg46e}>SZA5VAmCKVKx{>j zH)w-V{zJ6GR<5U=28;HFja78)&KnHLB8^dw?6!VGmcJePY*E^%-xs?w@bam1zsr-T z2Kt}68Tux{`HhZ&Hr@Xij7t6=dwY-fKOW@q=zmJTOG!jkDmryH7--U1gE?Fw06~Oe zxJD6RUq2&G^E z*pCDSzL>jjrpF{d$q+?J{)geRU+=RO|G%LDaFhLSZ&=FzGUz?t|9Ft+>$3k@8^euF zfX?R7aCdk}L*QN50GpZr(%F3&|BNkkll@O3&=i{dvkt7M@eQWC3Uo`*+{U*6>%;rT zhCw}M-Xc}~ueS_t?5Aq=2Ij#6wy822Z}*3L150bH7a!_%M{nI58x5P{UTr@74f?Xt zlvv9X@5YeW1Y(sf(HV3X!EvB@e!+x;}_H@AItEOhIBRoLO~b*cXmEpiY0G|>Mt6ycjIe+};c_j@DP z{x{rv^#6X4=j+n{IH}!6_2U4%TAu*@TPb|J_1o)w1(*$LUo?5cm6malY&7Tv&S3EW zYKD4e${`0^r@+|-HYizTXg5)-JWbZAOB?hZ4$a)B#f#D2!3%4PHimh_#;hmo?j(M> z6z)dYuLagXyyo>Km>UY!VlcN8f(^8{hTl~5y-gcc0xzSaJ8!5;%-y1~M0froTIV048|kb zwN6pK%n|?rCDR-vBtnNOa%zz`pyi3VZx9lzMLP_D4x@C5)&U59c>g{q;v? zho=Gi@BaicLQ<6!SHlNzZM)mJkpl2?d=YgfIqS$y>>bp#=tjSQBHM~5Gi!cGED|Ub3Wa(@p^y_*X4^ioHIK4+ zl>*T6!!l_~v-}LbO0BQeG|w8Yvv7^uCijFcSK6**m7#}&@w zPg+L_;P+ieHG=G7uBPn2jCPgaYm%F*HT{33wcN3KpRjPnn#s-HLp`-yewP*ORo|;3 ze@Eux8jNXQ2-{C;cosnGqL8`f1pIOcRMn#bwWW??n*_{QZ0J9b|4s!xd_6K2*W_Wu z))`AlDvGrrA4HDdNTz*l98L3BLG2f~JtxQqQQTABW1TD%3WvKuqT)jKkXQatv~3_^ zb%8k@qb8!=MRQ4Yxv9;@0~fqn6TA@HYDjfCvvF}(`R?AjLS9Y9W6PfpeAKwHT- zOvk{fiAPlArj%!zYAunA24qtJ{m)X|RtaJrh&fP?J>G7tXtjUNZY>%*6)=GZ!5eaq$CGv}wWf7P&P#(3B0MJg)!6M#s7TuB@LE1RFBumOgzSW0M z2*f&i8j~z15f&sqLmN&|b>8Yp0s9q2nsPyKe7s{hva)$?Q3?s{T$kX){oC-kTs6~3 z{k_i;RbpGQ$0yX3#N(tdCG?~lWJ z{r}0t|8oBSSw08I|34Q-B;o?6v2?l=i#VBAbC79n)$Mm4pttUQZC48hQjn!6CRxI^ zs?ajm?uYG8K%xS_i>fUi!n5L!>_)YK`Pzl~KYL~O`|R5PT(BJOG<~7~cwqkz!_l~Y z{^JK<>OX&$&*Ao;t%0u;hah;KxJ{cH7J>&gN)>8VPHHy;?LuUwF^G0*%Gy}PLmB^} ze*h%aYf*M3IQz%KB4itpZS2QJimaGM`@-RTO8$;|{a&?6wOFKq`wi;-rT3R!uf@Xz zC|BptUcc!7_xD#dXsA|f%|I)U^y!Db?$8H1K(RukEwSnu|8afvR?w~qSDaV#*s>Z1 z*;Fw@n+IT;(CQ;T+@od8;+@wI=PR5G>!I%7i(1XG_3RrjnYFcQC&UA!*wyvdmb!=L zt&esvHBueB8*<=B)F_SqI23hMd2V|UrzlQfQ9#x719wd0)3-BK{&iIGKjpJa|BEcS z({GA?k_GUP{V$FEn*I+bU+n+S@;ONVOBa-@vWOd^Di!P3`AVnSJ9@|QlAN_!10_Q# zceXSL;Oll%0KVGWU2YCh6NqwpmB$a&WNMLkktOCA6LLqbHAbslo_Z#}ukPX>xA*=7 zCD85K|MxggX}bL62*5+}Uq2kx_kS=AzwH0d@i}1s|E$;n;W^s~wBhpKIZG1xe}R{~ zHh#fLy8Sg??g;;0GA4HI@m6TIkq$?M^%(9)l#?a-@I6gq)a&Pe`Ahtt|M8Kp@Nhgi zQ{|I?es=lx)!QG=&}BI*6ca%rL1Ogu*I$txJ=S$VRKbtq6O@5zBgfXFk*YfGB4_C` z*`l0C^rcXWkzfelF&a0i$PtC(x17Zr^%f&Z?`Y1_HA#hc^q(|cFtidP<7b0G%p&g1 zsYvmfdJ$U>%2)jdD|X)(Y_I{DEpQt5^(cKgO5bW}C-wd@gwmJKXZvXR@2yC(rf|^z z_+vaA|EP{y#@g&`&sr`%tf* zzu-q+mb1T+NE~@ICU~Hl=j?As-W`uvOa}i70#xt+^Ow)w{_x`Uk3V?p_|eDMz5mC< zX;9DqABJDv|M@(hC+K{I(p+oPkSKVdl0|3+I|{Znt|4M)9i|1`kg9zA*T z1ii2P@XJ$UjV!5HZRTKyhOa83qx&(QO{3Z!H7bm$L*elY9@v*RN< zmc&l(*rTuY)lw9zGhcN_H9;v$`)m9+mZPWdp9JH{bT4!$=NrNYvisXxnQ}v%c$qOA1dX1!yWS-y5>9VJl~);-(l-~ z_g&*Ec^348CIvidtLPCNNRMC#Jpva!_8X*)9)67;flZIF8_$Oa&NQ&2?(c)vt?bk#Dsdj}a$uM~I-Dr0fogDdbGrmXZKvtN>9U%F zPF7Q~73=Id>NL^)2whHeyknxasZ{yiLTubXY|ZWn!byUPU=%8@U4lD$eSUtaupJ%9 zdn3tvU+YpO?eK9}all>_> z)=W>^^7QwxJiALY#{^v#XJ>=6rqD}sGw6r@o)hdOWgQcA8E2hsvzlo(wk9~7)x#d@ ziDY=v7GY^g<28YN-kd}^kyB?26p>u?xxV(mQbQC)iv0o>B`Jn(Qn*aG&T+3=*lT2y zqV8H`SVSvhO&A9-q3JDgx__>qRri=x72nXt*BP;>@@9CtAGOSagr}n&AqrQ7qO;#n zi%+ypP%nrU==Jn7w3J+^5>7~rB9`YQ63JH2{xC~BJl$n!yVPsf+1DacfjxU?aHhVz z`|0*_g1&o#F8iTl{OPp5yngEhzb9D8`Mp|a30ad=2V*#0X9-=<2#%~cTI6hvzEkJz zYUwLR^+wx`v#J*}>7(2%;ENyCHPE1yT@1JQJeXo@(=?`R~wpkznv z>C~}!r(G9sT3x);>f#0U#VfH_F9a9p>RT#OP3W0$PcPqrf@$g$OjF15O}j4Nw7PuL z-OHy%j$+$2l z%h{Z$=bC^5g02bMsE6P03BDyc;#)4rn!D!FZVXMj8bgz+F*Kmt_{c42lGeWgWCc%U{4 zo!V&Pki?U&l6YKo!Y36;Y|+6Ix5i&F$6E>By4;qr!=)Z~b*aZymwH@rse@62FCprS zHW`8&G2Rxh6SX7req7b^p98o7btVa zL{X65HHUUZKJKc>$5ll>t|;<-kKBgS!z`8I)M=@V9g2M1RgsUYihNvA0B+p{A>I2qDmN>5MrAVuE}wr^gDIhf+GhxMqSAf)^eFf576UT9Gm6WVF#!j zhB?CMHN)|DIKgQ|a`a5nMNj`Q6L9E`l!mUvrm%BjQ&>xE3hl(EpzrS)FC0z|3y2OU z&VXp>N_Pr7raM8;X>F3H_9XW_a2g(%nmKf*W`?dDr?7L5Q&`J!3hf*xdy*zat#oHl z8Z-5_O8~oD8XIxSS*AjyGzFEQNN|{0G@Ljc*U*&}6?V>w3Ts(Wp`8`w_lHjJT;I1E zSPxkRQd0UR#Vw{w!iA*JWExHvqlu!%fhUl|YEDHZi4N|GJ%z8174Y!DEfwzCQtdW& z*f}>VtmS5fc5c=#QrEUrcpyK8yZEWy$_+m?H_NY0bYxG|uWc(;(oIEfrM9dTb^vQ# zB^FxNFK7=dm5`-K6=whn1qV_n*hQgs8(RL*nGJ?D>Vy_`T5|p`)CHUVizuNPCn&?Y zK*JM+W1PX+gcLyFyURZ!bCCgP5lj!;Z^3j&4pVU8K|!Dn3fdy{YPHm@Qp!>|ln_{u z#U@EO5zf_UH~8fbomV5Mt;Wz^jrv*iIm@=FS~A3IoP!F6q7_YI_2!o&jvTsjr^1f8 zQ_!=%@q+frXxmIGw4%t4*;GouH6|skRkdocB~vC=aE!vylHQS29VG<^9-{>AW0cU9 zMHP0;qLMvlHS+j2d8W0s{$Cp|P?obh8WW^%TdT=Ot2K+!0#kLIhBty`BwthYj)J1Z z_%M$q7&|?h(2>9uc1_?4y_x|#v&qnmS4+?C4(C#)Xtq!ujmQaJCp0A}o}*2kaD(>+wwwtWSlVopC+4|9BWXv6Ie@{) z=>Ud~NNCtK5*m6ni_tb1-Pd;-cOaDcCMSDf#6NIH{6j}%H0&A~4ZWJpW}9s8dpk9~ zd0_lJaHnF0j<{slH7*%eTDI&jG}NqG+g#TcXObM#&AD0oSM8V z8g)Is9~v%&*->8(>x<&=gT~OYD8sIcGORAju(~KCCmQXGGVHo2!|I|8tBc}BqkU0^ zT^A*&Q^Vf}jle;Tper?kDm8*CHC(yqfrA=BS8DiP5LWT<_rb$=`E`D0zs|4ub-v}- z`7@Q^>p-P_zxbV<8o%b$_?A=i04nXv<99Z>{i@0BTPF8zOxjIeznjUc;}SvDa`8*M zSK@N&#HHPE^}8Cbe${aGOT$&7F>#{NZn*kg4OhQvxca5xx*LslbJFi>PWtslne2x~ zyB*|rwS)Ys9psmGkVM1fP52Hw$nRzc6?{6X;u7wMi%X7l7b8_PhWnw>u4(+Pn#Qkc z8o$&uyU}oovQN2!71X)Je;AjkM7fPy)el{;nb!24f@GmmCij?&Z1|QS$l9+5D>xAx zE_bRs+U!1stD9Et{%m%Te>R&r+_R}m?M^$Z-DyqjPU~v7CCjPJMVlRV{ycLXKTloi zeA-!^PiyLYT36?R<9fzD&B=0u^B9rz4&C9Lqa_hYrNOqQjHsbp*mv5#(9^GBZ*Sm6 z9f)*utM2~&bn#Z_3vyLS@SdQUrC$j+FnGEp;ux`wKy0B)SUIQECJCmUjhboIsF~J{ zn#PP||AYtv)eqrn<0jp35*M?B_lLX4qydO}iRP)2e|ot=UP9 z>FGJK#F1NW-Q3jE(Cr31%4yafAD=qxooQElXIiy)rZsz~Wzp0@#a))xGk0A0wi!m# zu7=UHY8Xvxh7sV~jz(Jq48HG*#;A(Mco*5U?7?Zu1Y8$-O}S7U4%biApK2RRX_VzG zB3!aMq)$;Uc|W%AAk3x*RrZ-p9ff_S4x4e>)n=SlZN_QMX52G4I6EvoV5YJIDk0^J zraLc7tCM&|%)|0AW-1*6Mtil+a&`w9PVg^+;#4iH+#W+ z*>CDFwWnQ8ZP~GAI8^M0W`YYyxi!m8Ri@QuUXmOL{lm-iOSGnWu9tRv(B+xg__Tgn zszqzO$r2h#)-jUEl+%W*cr}a8MLw5V(%mYllCNTu_;n_IBPRm)vQ(EE>DVThrl<9- z?te)ZSY5XJS|4re_x2LJmD*o0qcDqNLu#9GX&7)ClSocNt;a#>A+xa~J7ntcai(2; zoN3j^nbv%qCNWp|j({SSmJo)t$_p%3MV%IvsA#>hA6 zGyayPP^?-oO9s``U4^+=37N~ag*nW@81HZ}T(({(Q*Yu0qx#C&rk-CUYuIdhNw~;2 zkx)f1fZ1tERVufYAX}2EWaXF|t#{acu9@pPmzqHfP1Fw^iBip)P@r1LQm81F3pw}V z`ta>3?_<$lF`X`<$RsCzSV523$Z_FNW7$6Qt|=C(t6!OVSoLRoXU$GMM?ttKQ9l=#&->{6 zO{((J5<1Uuz6H&Coo~pw&ggom!4-vTA1GlEppZ(r{1rXRGG#jJzZVQNBSxIAX@YZ8 z`uhZl73IYk_n1RHa!?gHflCH!OjAKpEQgC27idnzJt69aShY`7^hBBpS_z4Ki*U4} zmSi~FVL&ESJ%&8zkcx?J%4ri;{5vc zf5C`X>VD?YQ6F8XCoG~BiEhC#egF3jjc)sLiwLyb(3tR2G?ntmWBGEh#_0wpgZ~XZ zu4Iq@G4y|cJ_A4K|Co`qFPDFCj21NK!aM4tD?(tJ?|-JZ)CKwYsE^J|l%7)_u{&)bIC?o+Syoq|24y(!?S8 z9f?sNT~}FKC#(J|6n(coTK=y{vhHhF_R*EVZuvhQ1>;Fg{)gdc_(lGIj*paKD(_WF zmcDwD=jh1dYsyiU(>2a%vQ>{lNFfXc&KCIp?XxSLA1k-Fcl46olRJ{1pnIZkbE>vD zNwoa89uS66)kq$Cl`63xvuFcVcq9b62LHf(CB=nF)zwdW(-b6we$GJ)MG%>=x8)2V zraa%4dP#NwWCSZRT{%ukd21gccWg-`r46jiNDi0Fq$eeR%(sXNvgRIo zfumKs|HW5qlf=rarh-Et;+AYZrDn=P1rbisTt((Rq_LJBjfJNa<#QsH`A3k9CfETh zP`(%ivrU#C2&#x} z@;*pmt&g$lW!=9idR-o=_ zlE_6;j+9_JAXG4mj=WgYH0Fm9F6w0(ZM9lGRoqSDucOTix-`P4eF94=T$|&^Ol?CY z5vB2~m<^*Js6f^OWAiOsbJr!Cu$00O<-59iDOt`vvZpR%D>=o@>t{E;o+RNVz6S^f z+MbZU!<@9g zyHclZP1Ig|pd79V>GL?f@ba5F1+I`lNpVPcbP4>pLXYz~EVM^h&+i2lr_dSKusDosF*7`+3basmSok>{4(gEJ>iw zjo-*t_H0rj_=>T{rtF|G3Q(oG5INgO#)hv`A|x4#q8n7KVEbOMcu!T*g7-l(y}ayI1{790#80$beUi8~jif1`n3rv$oV3h)t#VUnyk+7vQGWm)^y?L;6 z6Lw1vXA?8fL2OcB_Yj*{(7UloF;bmPY{-wqCdF6>vPseJKsNDU9qV{Y_Q2zzI}!CjUPOy6Glll0_zXFUn4chXB4C=b(Ls2>Y3 z!0{K_VZ^%9DE$Xf$pD6IinHJtQW+7(|CB87)5TlQJsqz&)2!;+3i1+(pI0Qcbl#t(LlFd=o~H>AfM?lnIQMZp5j1b`ba|T_s3NlWG&*ObW%tvA!=l!8fUiy z^ERC1sfv2nrPz5cEqXz5!u4r+Do54xl|x-=`}8U76?hS$kB`-(pt=l#F8YNiM3~q%)%#0hbszZs!mN7Y84XaoVAe(#WC!EmOa5}g_rqc;BE5dRs zffWW_ENDu_wq+MQhljCw*(72qhu5V9$~O?ac>g{pi(ks<_ieEUJ<32r4fm^gx$sKVxw}Wic5%F=O>{8uxK3Xy1IJg>;h9l)M5~ba0nyvXi+= zAYQgfk_(p5sOHYTTD)cALV0Hmnmh!73Gpb_7MSe+dWhr zyn2M(f_n$mP=^0gzdSzjXX9`-!t*&MGk;2Eqj|6xF5)2>#$*zW7DGS4ZY>21b_{(Hgg7F9^Y9__P z{>iZLw^G!_F~aC2%jrL4-$Z&n=$Y=Q;gp``PA0J{Yk4xhC)`bvTLO5@~Jan<&dS7!RQ#p|D0ze=Akwjz?I zB6};?7z^A2uj~a4APq7VwLra22#g&VKj<8CRHh>HeUR0K^_%FvRzEy2bCI(oA^8KO z+|jz#+yZ~pD#vI6*M@Rgta4y#?{FdpF(zx4aw6&@x}$4415?k=w6FJflBvDnKC>#H zH0Uy+oIqZ!L`j+oAJI(#xD!Y0Ajf#Sfnuv{fnvg`bpA3H^JeEe$|*}FT=T@O2k`YFQthggf&TYX?I0d*Igs< zO}->9=p{94z}NT#(mi(p-=z2s(*!u9%Mg|R)q$jOC&+T^f?H)ow8@q^jtMHdN$34} zF*ZMuCNYhTk01@wOY_LmQ!TTPAxKrhQUw97^del5RzN?d&q+cAX?8C`d+0f^s04x3 z>--RDXzZXCYrB|5&oOzY$!(RYEq4gZD_jNRgL8k5Gd!mW6_nJra1Y0E@9h0AC%rgl znfw=Q>htoj6i&(|zgB$-FS22>jgY>capZn@_eyT->dCr9M`aCGg~R(_Dq7MistWDe zROLI3mtJO^+G0fxPV^Hv)RdNk=ZB>`FKPeo>boL;(bBqb)a+Kc>Ss&O+T~wiaw%8S zsF7H@lgbj|iqv`~duQ*}kG-=VRHW>k^nm$#XT6~J+b<_QPH-Nr2rt&f9K50DZ?EL4 z$m#Ht!lpDSSE|0H8V0TL7UhJq0G85TnsY>g&q8gltO{TdwPI-$Vs`u)1 zlVuYXPWE=c}8&AI3yx_~gt+u|4jftH4CRB8G%6|0x3Wm_+)q7)`dNooK3HBE21 z+XNVB^{+0*s?tn4%HWRgmapm@ z$daX@Ix=axukSdi{H|?H{q_?{MNZYX10te}^S03W=Q4TRZdqP#-?ELW(pyL!!O)FE zT-+2xHllTUt)3+byEm~)2v$vB8VedhHqAL0G#o6N!skGAgkPP7_=OP z7dZz-PxT|ZDDojU<^pfkTr>EU%<`0zOzKi{TtP%)$2O34!nn3T)@EFi#{CV~v62d< zL6*Gte}R8g?P6foKKX#xSwg&oMK}QiS#EtJ^6Fs&&A%DuMS@@ZaB!q){?V2Uasg*O zj{?4VCUpUd0>*g-TpmlaCuIUj5pDA9zx@UUUNGwW`wV3AXIyg7=rgWgfmcTq(7L#4 ztmOpd>M-trQQ>mf-lIb6y+_r5lx1vpm;iQLmA7M3W{W`zA*F9eaNF#KYZ0?14(oPV zpbo{#z40$B2^v#=$Ox(gN|hSjETsAK0NEP@shsR>i!yj4jRNSctSi;dNNshzMpN}1 zAU~1&NB)n9$n(5o54{3AEGH6~wQ|UDiUI@R#4 zGren#A4u`8w07rqU$00V0$3+H-A<5vO;g37ERRY4a5i{C7bMz7^<0eKZW_i_+0u|$ zazpJ{z`PviFxSk_Ru%l_xsYz;ZSppMDyoKPfTMAW2zf(jod1gBgwaO$m_mNfwkn=$689bBTIJ&82yVb4jD(nMJu}sH@25b(} zIK2WU66Ww~?2qGc6#68dMnOCZ7bFf&<9Qqe)9HLVA<=xYh{EY42*Pbr*}4TP!yK>!bicj=zTeo5 z@gCR=^C-mQ$$S_EvoRjcM-drElj&maM?-(M2v7ZRG9CtG9*4msUJUUxo}A7{!|{9; zjZWvGzaLg+OH^X84{Zp$@u#WBJr7@t99L^(eeUSO)?CJ_WJR%L} zKqYL!Z{|23s<;7k81`prDWoa|9_$no!pn^{>lhGD5gN&jdiFnqc~eOp)Y-Dy8K{~H zUL}ZrGx(E4?XPU{SFs|0RUN;*IVqx4f}yYaU+Gg1ZbP4MM0Gu_I|NSBJ+hszhIEdW z6C6V#Tnks4?M@f=q#9|UNW$n#W8FClr~jyN!fZDCffiZFSS<`&6pvw;$>ikk8^T2~ zBWq8Hhvrs!^r+2A)nlm!)j~f7>{knjeo98@-<+U$o8mQ%)Xh##S*jmwF{w(G4#hh# zHz$=`m7+7rTS7c~32jK6t%-UYh9sOQU~r|S`mmGTbCW{Ioy6#=HS{s;Bn33xB#Cs= zn(xv`RVsnOO)9vqZjP{8X5c3OX71XM@3f~FvGi}I>H|2@Hx)^C<7pn0HUma{Gw(x4 zf~MSTfFf!Ums`51&Lo`^D2?R6uzB{I-9_fmw<&?4dE?agtbCO6ME~>U#R?NrJr8tpV1j_& z5vr+#)?3xKzs6b9#g{m2q#x-oqID-oh1_rmq)yAI4Bz=HLno+P?)u*z@^} zE8!^s5~?$=TCtZ}ji2;*vON&?pi@F6x(B+btv>RzQG*k~nB48fAcaU$E2}Z-g2)r| zF0mUU*L{?j+;zByvU7xH#Q&do1Em$y_6^tTIrf`YgAeXDU}&6dV0~}Q6mQ&kv}_a; z{jKd2K;fWWQVhb0xUkBlx9rJhCh88xid|b>9aTpwcAu&u&+u+s>rhG=@6G&I<%8Ov zXAhM46^yEJ_+2(c%W!|}ePJQ|N7x<~I=}lavBs)ymV!YZeak2d^&mr2S3hXCC#vu~ z?K!+*;MMAs-syA-Nd~1-EHVoK=9*dAJbJVT#!(?6D;)W2@0M(PXFYR;tasAO)V0m^ zwht8)2kULW`1QA6YHC^!tKjao0BflH8yHcw8M#er)o`adtqHl8EnOS;cQ)Vn3g-}* zYmZbG>8!?`GlNLaTy`xA1XfCh^H0(pFjh?SrtVPKdTSEXO>3~v9KP!of}!3UvS#_V zSMnQ1Vx28GdV2ZnO@EG~TN11A<(3PwKDNDRSUVjmF(6l1AlXYF60o=>3ZwDl^dH1z z^0&n$C4ieN`VXRT{0?wYMlruZ3xc8O?@}%S+|JaO8n%j`VuAhn1V=cCqxoVw#1lVg-g$3e zRb)xzl)-M=l}W2xvN>@YIT!NR+EVuW`^1q2=C`2G)HZ?}C50}uzE9{KNeSnD=|oZZ z7u46=WPOF22|U9eo@wqv__g^xYr(t)j%SX?TD(6{nN)ejDh5M!t^?&O(Dr&Mw&pz? z167f&ZMX+(9;$@H$|Tz0)N|Q;gPu~I7`?o{zR*3*k-fRQ3UW*SK9K*pD(=7?TS?ib zPur-xcJffKp9{Y)C{d5g$+hNXAgo!cqe3pvWRh^m+#)f$QEPJsw*qf;b$tbW#gdpC zSmySZwo7VI+vZU}o$XzpUr72DuWKsuK{F`-m@=VbUByvXV{Hlsc2Ve(#F*~GoCT!E z<<0_ZgFVXu_u|iTrfwp9UJfmXePkA`((KWAv<|j)D!&VtYT@c4(Ut!B0S?tr9+y8g z&<1y!!S>=!UYS4(l+VhSX3$6GN}E!T#*iC5PU~3ydXs8qOm^;^72O!qfRM2;#|jJ|U-mJi=iZ`#~I? z4(F!x82@t)8Dj*X@jT7`UJ4Mu+_iq^pBr4UF$uee*)MNUWY8;LzWI|^Eptwgx_`{ z$2a#gDBpb<2l{_T zS34)1ZSts5uLVjE@!r|5y(ruC&Uz!?_t(9Xo{DJo&U&Xm(B5w+J)O>KwG685#{L`H z`|US78feBexv(4!RH-BGxay=()g>26?(!^~H}MMvQ1nGb!31;q+92~gP6`_$W7#HA z@fPWyGC&IL`h4&71R^XAtcJf?7w(>t1wC3(RkoB#**&S2}F z^z5QLa%G#7t!ZbLKw7hpP+z4e z2PEM^QCc~P$ zdsw<*s(OQjYT9__Wk6fl-^jK%C+h!K@*mgd7dNonH}9Tb+;~X&bn*-B-DUVbMHpS5 zUlfcWe_aw$?o^rzlFR+`?(#MK3j5kBKecO80_RI29^%~c0Tio!&5e%fVnOnXcme{z z!@WYiN@B`V!7t!2-jo1u;68>a@U7iNo4<^B(%D0$=(l{x+S%Yu27qA^;PSTCq>@Cj z7C1%^>+=4#`~zpz#TC_Krgi~noj5%p2b*IYxMO&w1bBxU1rO{R1Aotr!`=5@3nf&9 z5sJ2TD9!6D+8}>*Q8`YwrKGM^$Io=S>r*LQ=UTWPpHyV+2`b>7lrq;su`;*Ynl}$aV!K6+=Dw!J_%OUZ-ABXmN|~d1<5HK3bQn} zE57=WLTUUono9c`nwaC{l#p1NkpfSKJ;A>CuWe8t!u{ z1WCQmF!z42WA@GxYp>E+swaY0?0*00mHWqdhH+cn)EnvjXkGt3PLer}Zm-#Ew&Xvi zFY=t_H=maDtQNPab6eYU0Mn)IvuHGrX0ydOSe!nLnTl)wJHL(n|H4PV|7}8RkN^1hgYSR){%Gpg-v1s> z$KjXvzdy&P-|ru-XiUzI5b7hrB6#rr=t&u~l&;PlCHF^1e@bY2i&i;VeA8=xs(T(espwn^bx&f=ndr+X)l$@CXG#