From 9d76e0d555edfa28f4cec2d50c8dfcf1cd53eaf8 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 10 Apr 2022 22:05:23 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/collabora-online/11.0.15/CHANGELOG.md | 99 + stable/collabora-online/11.0.15/CONFIG.md | 7 + stable/collabora-online/11.0.15/Chart.lock | 6 + stable/collabora-online/11.0.15/Chart.yaml | 32 + stable/collabora-online/11.0.15/README.md | 39 + stable/collabora-online/11.0.15/app-readme.md | 3 + .../11.0.15/charts/common-9.2.7.tgz | Bin 0 -> 44112 bytes .../collabora-online/11.0.15/helm-values.md | 30 + .../collabora-online/11.0.15/ix_values.yaml | 27 + .../collabora-online/11.0.15/questions.yaml | 2299 +++++++++++++++++ stable/collabora-online/11.0.15/security.md | 186 ++ .../11.0.15/templates/common.yaml | 1 + stable/collabora-online/11.0.15/values.yaml | 0 13 files changed, 2729 insertions(+) create mode 100644 stable/collabora-online/11.0.15/CHANGELOG.md create mode 100644 stable/collabora-online/11.0.15/CONFIG.md create mode 100644 stable/collabora-online/11.0.15/Chart.lock create mode 100644 stable/collabora-online/11.0.15/Chart.yaml create mode 100644 stable/collabora-online/11.0.15/README.md create mode 100644 stable/collabora-online/11.0.15/app-readme.md create mode 100644 stable/collabora-online/11.0.15/charts/common-9.2.7.tgz create mode 100644 stable/collabora-online/11.0.15/helm-values.md create mode 100644 stable/collabora-online/11.0.15/ix_values.yaml create mode 100644 stable/collabora-online/11.0.15/questions.yaml create mode 100644 stable/collabora-online/11.0.15/security.md create mode 100644 stable/collabora-online/11.0.15/templates/common.yaml create mode 100644 stable/collabora-online/11.0.15/values.yaml diff --git a/stable/collabora-online/11.0.15/CHANGELOG.md b/stable/collabora-online/11.0.15/CHANGELOG.md new file mode 100644 index 00000000000..3bdeef272b3 --- /dev/null +++ b/stable/collabora-online/11.0.15/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [collabora-online-11.0.15](https://github.com/truecharts/apps/compare/collabora-online-11.0.14...collabora-online-11.0.15) (2022-04-10) + +#### Fix + +* remove domains var as it's no longer used. ([#2469](https://github.com/truecharts/apps/issues/2469)) + + + + +### [collabora-online-11.0.14](https://github.com/truecharts/apps/compare/collabora-online-11.0.13...collabora-online-11.0.14) (2022-04-09) + +#### Chore + +* update docker general non-major ([#2460](https://github.com/truecharts/apps/issues/2460)) + + + + +### [collabora-online-11.0.13](https://github.com/truecharts/apps/compare/collabora-online-11.0.12...collabora-online-11.0.13) (2022-04-03) + +#### Chore + +* update helm general non-major helm releases ([#2410](https://github.com/truecharts/apps/issues/2410)) + + + + +### [collabora-online-11.0.12](https://github.com/truecharts/apps/compare/collabora-online-11.0.11...collabora-online-11.0.12) (2022-03-31) + +#### Chore + +* update helm general non-major helm releases ([#2361](https://github.com/truecharts/apps/issues/2361)) + + + + +### [collabora-online-11.0.11](https://github.com/truecharts/apps/compare/collabora-online-11.0.10...collabora-online-11.0.11) (2022-03-30) + +#### Chore + +* update helm general non-major helm releases ([#2354](https://github.com/truecharts/apps/issues/2354)) + + + + +### [collabora-online-11.0.10](https://github.com/truecharts/apps/compare/collabora-online-11.0.9...collabora-online-11.0.10) (2022-03-30) + +#### Chore + +* update docker general non-major ([#2338](https://github.com/truecharts/apps/issues/2338)) + + + + +### [collabora-online-11.0.9](https://github.com/truecharts/apps/compare/collabora-online-11.0.8...collabora-online-11.0.9) (2022-03-26) + +#### Chore + +* bump all apps to trigger ci + + + + +### [collabora-online-11.0.7](https://github.com/truecharts/apps/compare/collabora-online-11.0.6...collabora-online-11.0.7) (2022-03-26) + +#### Chore + +* update docker general non-major + + + + +### [collabora-online-11.0.4](https://github.com/truecharts/apps/compare/collabora-online-11.0.3...collabora-online-11.0.4) (2022-03-17) + +#### Chore + +* update docker general non-major ([#2198](https://github.com/truecharts/apps/issues/2198)) +* update docker general non-major ([#2196](https://github.com/truecharts/apps/issues/2196)) + + + + +### [collabora-online-11.0.2](https://github.com/truecharts/apps/compare/collabora-online-11.0.1...collabora-online-11.0.2) (2022-03-07) + +#### Chore + +* update helm general non-major helm releases ([#2111](https://github.com/truecharts/apps/issues/2111)) + + + + +### [collabora-online-11.0.1](https://github.com/truecharts/apps/compare/collabora-online-11.0.0...collabora-online-11.0.1) (2022-03-07) + +#### Chore + diff --git a/stable/collabora-online/11.0.15/CONFIG.md b/stable/collabora-online/11.0.15/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/collabora-online/11.0.15/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/collabora-online/11.0.15/Chart.lock b/stable/collabora-online/11.0.15/Chart.lock new file mode 100644 index 00000000000..9b30b2ed01e --- /dev/null +++ b/stable/collabora-online/11.0.15/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.2.7 +digest: sha256:927fec2499d55b3de8a7522d936aaf4f21f668370deb33239fb06f12051ff5b1 +generated: "2022-04-10T21:59:16.930459179Z" diff --git a/stable/collabora-online/11.0.15/Chart.yaml b/stable/collabora-online/11.0.15/Chart.yaml new file mode 100644 index 00000000000..5d0d7338b1a --- /dev/null +++ b/stable/collabora-online/11.0.15/Chart.yaml @@ -0,0 +1,32 @@ +apiVersion: v2 +appVersion: "21.11.3.6" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.2.7 +deprecated: false +description: "Collabora Online Development Edition \u2013 an awesome, Online Office\ + \ suite image suitable for home use." +home: https://github.com/truecharts/apps/tree/master/charts/stable/collabora-online +icon: https://truecharts.org/_static/img/appicons/collabora.png +keywords: +- collabora-online +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: collabora-online +sources: +- https://hub.docker.com/r/collabora/code +- https://sdk.collaboraonline.com/contents.html +- https://github.com/CollaboraOnline/online/tree/master/kubernetes/helm +type: application +version: 11.0.15 +annotations: + truecharts.org/catagories: | + - office + - documents + - productivity + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/collabora-online/11.0.15/README.md b/stable/collabora-online/11.0.15/README.md new file mode 100644 index 00000000000..1337e49f1c9 --- /dev/null +++ b/stable/collabora-online/11.0.15/README.md @@ -0,0 +1,39 @@ +# Introduction + +Collabora Online Development Edition – an awesome, Online Office suite image suitable for home use. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.2.7 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/collabora-online/11.0.15/app-readme.md b/stable/collabora-online/11.0.15/app-readme.md new file mode 100644 index 00000000000..c713550e0a1 --- /dev/null +++ b/stable/collabora-online/11.0.15/app-readme.md @@ -0,0 +1,3 @@ +Collabora Online Development Edition – an awesome, Online Office suite image suitable for home use. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/collabora-online/11.0.15/charts/common-9.2.7.tgz b/stable/collabora-online/11.0.15/charts/common-9.2.7.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a9740f24e96674d7963856d7eed72d9d8e8389d9 GIT binary patch literal 44112 zcmV);K!(2`iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X<4?loBgfZNq75n9zL;?-rdgOs;daGw0- z{-18Q+Z_%D^51T^Tl}{>-0%LSH|Y2K{los@{{COOz5ZZ0_zUPh04}9x!8oLU>E5}m zV(0!K56tjKL>VUO2rT;zm}T~70y$#55hE5+oN@W?`$Zawzd(Y=6w(!#5DG5o0!ap9 zjTxDv5twnFu~DZp#eB9Hw<9v|aJoQ|EYpEm#yXrL)R{xZ5$)*riWM6;5)By;a0xl2 ztgS#T7@`qLIZC;Ny67AZ2i@-B!9n91t!@a7*{IP1d1H;1!L%h`G+ID6bG;ZN+tqLW z<3+FC8@9Wx?l+A_e3MN|SqbBL1>!0CkiXAZbc=(GVq3Ppb%0syd}NsfM@f-0^t z;HwOc40?^F!R5H!Zyz=uYy9>6U&3U8*aHcG+WFt>^#b$%uz&D0{~zOd23jrfE<@?Z z^S6LyD8dsQfrz9NJY7&I=6d59_|F(k;3DCo@C8C(j1qFwAQ?)RS$Z~yQ#5J-AYold z7%RYM2#&!~MhK@o;i9IUG)o z&}1;_jR%K=alhXmA9W87QTMnvhTZW19ZZJ(@OI=g1nz|P9hSW9X*Tbq776;vfcz>|p zMe$+OiwFA?6!(teaop=29*z%(C>jqZ(f;AE*V`XQgI>Hph+%)f8x6XBI5;{u*r4rd z>YgMwaK$uTBN8Kq=n~OwDVx`j}DH< z{o(P!pnE(#=pRGaJwiwOV>FKY-R>ZU!{K0p&@mhjqvKu=4JHTT&%x1V&2PoUFv)O= zwxzVHRZZm+1$9FLD`@NBcx2sg_YQK=&_71;{@|z!y9f>TCx>t{JnBtQd=L*NQNMR^ z&>O<>q!$f(2*zl5yni(A596cgIO<1-2S@vBo8C_B62_+#v0t_qytZbI=*^*TDtv8? zP2l;3eA;%~hwXhs+vs@MKRAr{ zqoe)9!{fnGe=>=?`^S@m=-_BL8Fmj2`-3q&=pT0nDgh*BIQ zX;4rq37X)~fK24C$s$R_=2>sK-|5mG6j2VP98)CAfEZ11isd)~3&5?3*~RI}>sKQ% zfeAy6MnqChNs=IH;i43d6Qmay^R?Xo`a?XDwuT}Wc~KxX`EB|ABTR4%h%}@y0I5JQ zOUP=DQoaXbh~^|^hyy|ak8u3cfaNFfvD)@Xr7M(oUe>%0FFP?vB9-eEC|@y9AC=vJF^O;jVqU zWwUNa-Y({2L}UbC3t$?9_asShI{lEvkZZmaur73OE>IBIyYwYW5JzPYId}!^ zr6h#_1MoB@R7@Sr#5aS#m|D~YAznD$&uLs}X%0VwMGBV?Ct~W!TF&onz_10KDgg4Y zLRDvI3w1L{xe+KJ|7E4cdo`j02t`ZGFiF7-Ga=SNg6EjaQCA;+RPSGl*CVjsXkc%# zP%<@N7W_5BFO>^@|9z!I){C25p1=i4P{auZFiFS_lL8n)wgMTBu5mgA5X5*gK{PjX z#5m%60M9c*IZU~g*;1T>A3mI^&KSre(3HQM4c)L2!kX9TbC||EY}djuYpR$A(h%Fw zh2&HYz<_khYHEwmPSuk*RyA;HMGWA?Kw8K-1;p@=R|Zzx3;0+ObQwX459xlpY%)Q95AG({;=%7|Gi zH2|fk%wgs(R%)Ts5G)1HA)kQ-6JtF?$s8<&zBEn{lO;3AXCv@U=bKVJ(b|kKzNdKR zGn{7$8VRB)U=TzL#>pIk0ZA!z-wn31@Vk@zIA^aU1);1bbz<}|iR3vxvWBIqwMy5?(t z_1YY*@WSOmbx?VUIHGf$A_i_|NDw-oHEMc@s(>z125vB)fy>MPHr&*1aK5s-)9t`9 z9^*6zD1Z7OpvP$m%*tNi=`>RA)O*V z5{#6u6KF{H2|6R9hp`4z7_`q?3|0&1%9MK4+Tu5_K@F*|$2F(dw z)fQE~K2>WsLv)EF1fz&7QeL^+(8W$vvBG`>JA(lYM4&+eHY1B924e)2x)3*j{>u)7 zhUW0Hkd-iwjmRv(45)Ml#^p?_=2}!0vEc+Pm{v>9CLkqTN@1aOXl({Fsc`QBr~qMR zBp`~l)N!{9fTMYqK#uHDU9;(v7=qJe!8oGtNuu-{=l6Fwjd41yBs?9%$ddb&^zk=QDNMyI!g5n6#dKL<<~YN_E<8bV%o zWC<(;1fhVUxuBQsve?S9Hh7om5!6fg9zgnE{i3CQ3$0aFyp&sDF?WN|k^61H>subOIweg69c>Obi@=H;|$c zxD+tPs|+%R7`Q%ShHaQo8xc)ma%KQ9XSXW!CHr9nnkZ%aO}%Nw8Jv&w-`YaZjAv2S ztf)Jt-MXq`&x0dV0;r#7=clfAf+N35j2Oo$RGuWw zZd?9e$KoZQDdgw|u0|ewyK%51!U@Pown&r+XJWIY+J z2Bpr;kh{qhs|`vcy2`}F&Ncr%wf@L;QmUd8v8@%GII#`(Le^Rc&QC5bet!4<GFF@=Jq!L?RL9?(xsMg&%j56lyyh@S07Jae|R+l%|Jg@&1Mbm z67L;nQ?n~EdP#258%Seta(*T%3-N3meXbW{L{r2OYh%)hNyIuFvTN4CsaOwMG32lX zGpRs|(djtD+A_o1LZ36jP%9&G3#Su8=c=se<90}9cx9?uQx_W!^=9QUb6O5Ah zJ(}c`PQE#p8#pl$+9`>VphBZzhSlsY)OPU=%w&C4+juL9FReMuT6*Kr(i5&!RK2#v zTHsXe|1ydR#e4;#1TwWz&rJ$kETxjW$I7hCq8W-8Lb*5fPDQo1vI+1EuodHI-V%Lj zMHI`8qS-Ad6NaAj-X7FKmAE$SPYV{_T#LbN#W0;BN*1h@BT@w&eHH_XxfHjOhZ*8r zC@L#f$g6UN`F6&lRpH3CfN22xld4&s!V#gc$eS|#}&Q^v)V`BByV)Np_l z_h9+j-E^xr0iJkmW2P!f`PQsxDO5{n;O&M*R8r5aZY(sJ-r>G{dtvCp_Us9Y(bdzK zaHeGzn8OvIh>>K8K*|zAt``}=j4hOACw98vCp*;y)J4W5E^4U~tZ&7iT6Gj_%2pam zfaz^>v)9zy0(ER`mR^P+jb_Nz1eBuH(Mpy?+c&%fg|uXJv(yXu{I|bRH2M4AcWQ)2 zMA8UloOMjSmR9C)Iu##NAxs=O!dkju=b2h~a5`=A88WYT8)|*HP(NSe^qTn$V+>H| zl*ona149&?y#zbwAI@Ixik=Di1Q^QXHY-_)6>K4gj z-)O!t6>89eA*n41_BM4-Ny^b@-i}}f$2h@U>{H2tGaTFP;SV3q#Gw0TFg2Y|ooWJ& zn37BnAB@$j&I6+g_@<9=d-=)b) zwEI0ykdmkNBukos&rQ8oEP{zv*(?A-fwx2=ZmUIw5%I>PepC`XLD4EoP*ull0cTfr zDfKtUyri`Qf!!W}48RoN6mwf*Pbi8wor?L3=LkR!aLPDL5q)o$ot)?&-vsgIA(Sue7oF z%-|9MEClaO3a*h6HR;vYGYfvBy;4R98p#WfTaE`)WoJ|$n2kWMtG{N5V!6l`-U|sy7TkU~(C;S@Cku)$XB07k zu=tXnwZ;(Nir4Kl3p2a@{2<(Jp+B+vHtg<`?VkBP4E*=T@E2-L*qYt-S`ub<<^sKE zR@bnf7=0T?cZqh-Y#suAA530k=DvRa?3uEB&k;-+z#Pnko($&jGoCNz0;_{>_q#88 z2VJo%6m=yV2`s@P17l@q#azw`7M@Yn6KB|MG?c~)Js%x^>mkP$a&R-lk+L06u$UUe zdE;+JzG1)t3+9M1IJLG(a6>WYC~ceOl%80pCQ>8~VG(jZwqS-kV%MJ#7`G^5WI-du zIzok9_Bzk(hN#us75giVg|zfpfpM0`I1-zT8M)cKBl(H2F|fx~{)?Z)?(vf}AAR~B zCdn8^*O%lqnX-53D@qCd^c#`Ecsc3DUurQ4aGGYtR+8a4 zP9Qa>Bi{&?{KkM;i}gtQVc@j1mX(h{b&bH1me+j)ug!6ixwEm3r5?D7rb$(v(RW&^k3$Ola&v!5IJWJ5d zYXajjOkf%zy1NI&&+qilJ!3gOJKqCuNsP{wdzV?r?N?<*3VJJ7`1V$M_v#LuQ?eAD zu5cDp3&0$%q?rf(vcOb{!k~Xkz~T6oXx+-~xVlRkR84OZ&p)HIOggZ%5m~z60q1~9 zi-vV7g{YPj$my|jrvPXA$iMA!Q94b~1&7h~9yphx_T>U5`o(+I8T&@U#o708j+2$K zvN|9dzJ7)?FcC$u6dcfXiINtg9F4Q{3N$7}p}}r%rRd zJVQT2y#Z+#xa@=#Qi~QhS|JAFS_F^zfmAeYcQ8KHa zx1utaQg=N+v`2*kvOGW+9n5E%!E{to3$=5U5Z>#xLTRh7mSF0$Be*p1g7){fzc-v# zE0tAUW)p2SFM2n1Rl})PSB)##=IW{;fhSI_w_dF*HGc7T)K{%5URaizRvuhmwZyGc zSWgz5BsjfxX{Y@0T%jnKdk>5WpXIJ$Odue!fF9+wVz=PrHBPU~w6{n9#9VBGsdW(p za~#LX4W!5&!SC^B6u%K)ko;7ljGRqmqH3!$MyhcN(F9++U#^dsa#qM-gp3QeK-k`u z(2$j9vpkZ_71f*qE=)lsm}N-phy{G{TQ{AzWqsN5n(Cu&FTWOJN76g8x47mramRQQ z?0V=39La(M=?10!L*}M+l*X+E)9di0NLww#T4MI&v^9ndM=rzUZT~5#K6ly59I^jC zH%Dgi@)s*J?W9N82&7Y-ey%9W6V`%}blw*esQCxqZr$@n&1}OpL8YtQCZhG3**G!R zp-RR3e3B~Eev^fh7z#0|Bm-g*>1UV!&LI%cp^OJ{fV`7-iYWI^&wTc`-tZwNE-JX0 z;1$LNg=_GBXu9)PI|n9ZCRIB zEmW%VoAvaekSnwv#L#+3Z?MyF%HDRXp+I~Ch`di!z1Oh!dgHDAx}RUwi+2FlT^01}hBO5Uz!n2Bmc)lk%Vh^Bs##b*f-O~%+ zUOwgaZgU zC*Zub7j!NBpQWXO6SY_=zX_5o=E&^W{3C5cVD}Ehr_R3%bgszciqFuMs{S9J_H3Ag%xT{^HY~=lWtnAQ~_t=zf*qi8;+@@-|MwkODcyOOyhpdZjv5uD?j7 z#Tdn4$3bIv52VDaDwR;_#v_kY#blWgYo7?AuNrY-sLfN$|X~@|MdR;)V({5|I~p^-XTdBwCS|+OfK!IVUl)b0#2)suy{+VKq-U)>@@BZZs0jQ)QnOGc6FT_fNSbk(t zNgIa$iALb~`1l8Gfh$u2ky{tVkwU7f>oFfs!6G9m_#^|wEK+?};**wCqF^z0!KvMi znAOH`h8T<)q(V#KHwdKwCa(K`!=dsvM7ETb?Zuex*84>Y6ylMu=s&Ig0T@+ANzY+D9{Az98W9Y{J0K`;#}VF^sOoIN1w0yJp5{pw??o4Y2_%Mq1Qm z_H0QnLh`$uRjOfM)X2lH3;a){K7J=#|EMVT2}}^=Vwy~Kj15hXJt?6gn3}~hKN7_M zRP%2x!2#VHJp?(A>F`$I8R#ia`$MqC64HcB*)4fv328@Ef8vfu<_;zF&^#kDHHD^4 z?MRE#w;X0Z&whsktVj3HH@J^C_30uVRqcE?nEG^)KJmroe9>?Y1Ef+ZiINel)M9xX zHMdm?oI49fJ7b)J2}xo^mH&x4osCI!jc7}3Mu`q|cNdnKX`Jd=<{7wr_wpUkAu{Ej zi%1K~e@Tz`aY7^^O1KH=tp%g4F)lKkl|d(E+{F^Y0DVzgYd0Nf+-W3+TOx5lwR8aFaT=a?~R&{OxIq8YhKRXn2EoTw#% zA%310ELn>lZ9JRc8R*PcFWvrJxPe$q)yq{TO{NS$5Y13@ZLa!oy3(dNA6J8w7%1ng zIwp|})vAr*gc|FoPh%T9tjZuK$+3kw&Uo>ZSys8b|Aw5a%)A>gu(1c$i4!`+O3R~gMQcfq>kR^tCorNRKZu~z!c*p3-JM?;;w2@c7JN!C{%-s*1UanSz2{QJ=C8ys=%RI`4#b^N%^##$9#KhV1M z4M({M^=X8w1XP?0DC-6-X*74wW*mBYqT}%JFevNvXeqyo@?gpLxgX&*T8+ShA!<*Y zf%V3luUb<|7FlP$YS|)3ECMTSbOWbgf6?t$gVo1U0>rpr-t;PH&|7Uujskgf2olV=6DocT zqw7UhYQ=eNkK*_YU8ujeXutmhR=>P+&S-{U*3$1<(!Ezx{jJ~&bqXg49+8xB3b71q zzSSb8!ZPA?+Cod^fYX7D;b|&EETtqyooA`cfu}C6?l#1)3-21M!*>k8iM%FOdAQ}XnVn3{X(@;bV@lWrPlG1)>Z zCx%cIs+wmugym z8%{s$xZ=!-#@uW7x?Lp&ET&45wLsH2vqogzH1BS1Zra{^KkB3ji(rnf8R)1~IjkZW zV7p->DU2H68Tc821zX5eArwVqK1XRR9gdukG*tq)5ng zNLMPJwGM->wih&6fiabrPT+(i3ckr{{7qYihZ7^B*4-#ujKHAV?auW9!(3*qJNg03 z*jj27oua)$!GrD_oJUpE$MfT1O#FcDLuB{sn(0Hbnuv9a@F>BOTQooc-- zVI12C=Cv(b-_DQcZ*}u+aK<-i8t7zN@>U&ACuC1s1jvGezmWwMn|!7w^Qa?dZ~OX) zwIFZJ$Xw2j4q4Dv9&O*`#BZ4#_L>}>XEtGTYni2C!;lksyaB*6bFU$~y0Yk}%u*N1 zP^Z1P_H4pyLV=qs+GeNI1>Jjp^-0B5x$2wgy1{(!sSXcglyVG}+oTSMYwS9ru?sJF zhn#gSxNBhuMONFOOsI8rwnY|Gb8Erqiq^~mY}wp9@fs(|#SP}s%rVTP&oWO$tV1QU ztF!avz3tllmfR6|<}AGv6TMOi#3m};nDsD}80+oc(lbKXWLdvsggqx@0G_#C z$S7UrCX#Z#CQx!E&J%OQ67jOjx84>>4jnTUmjTsty~&!9 z=MgUl52TAUEmI*@5)Y=UngHr9d~5c62r=O%T)&O9aOyv((C}#IG^%qX zO8qa-V`wZ=V#kIB>lu4fOIk%#Vu~13b$#A(7fpzc*TD(MsA|L;3WbI9>n@TL#dB47xO~{ z(;3F3uefrvhFNBUU8`wfu3$??1UR$Vh%psH(ejjIkCU)9UN13K0U=$bNZk`jR@$FI zOAH8pz}(63DFnOFI;1zf%$rB?5^@ACE`AhpW3Bo$#oSY!-oqPN*T69_fWGb`cjs2& zkyXBf3=Ib@lnM&Q#oBF^(n3a8$mf|*8l{W8+}r6kuaVfLUn3^?C=x212~Fg*u39VN z@X9#5YrCMHkm60aH!6y`(&^FXOs4n3#_XG^9Mo0@Bk&2wSCqj|MizT0UFb|bM(HbD zzjei79(W?ZJW*UA+G|&2KiHWRI1abliw1>2QbtL2Lpha&cV1`&dj0)=&v_fd2zc>< zOgvSMZ65c=X~!w>?Ae1vz>$C{nvCkw?%W~*j@N+uBaes!_J_Uhq2dE4yi17>QX7tB z3r5H->s8?sz%~IC3U@LKx9@?@4yJ~#U3Zs0a6?|y4&8Q_0(INV?v>Zw%{}hzbh3<+ zIfpoL6tY|=OUP82eb@|Vzyuaa$Ti+VQLERNO#5}(lEraTRS9gaDOuP-HR+aGkp+4y zoygXHJdMbqa7Z7@)fDI2sA8}W?_Y~vzb4mMeh|#zJ6l}ZcoLF#ruNRL(g1WVAGYpA zLd=yw8!kdCIif=6+qNhW+^_47JBetz+s%s`b$k(Y&?IiOo-C#bG zI>$MQ?`>`v9O~wV#q%My5f=D;P7Vw7R+GclepnmBvu6z*iJRp|Zz>SEyniQ@GS#HO zU?NSpDL3JqVw9m&sB9Q90ZQjZA&iUl=a(ceuqx$AskrcN>jo1uo12GL`-;aAMKNm{ zo{#*jQZil{OjXW$CF~_%rGz7W5BtOW*B3guu(KkFA$a+nVBQ5yoCCM_D8_92Zc$Nf zvmVK!kK3ua;Olt2eYbSQ%{rzFKXTVdIwiO2nyR>A*Hq!h>e^o(=~0VE$7VGr$*!Tw)B_n!M2 zd=`vD`j_sV+bVYM5AuBZ()qR_7Y7?xMebGff#^6{pp4>F1>~9KY4|gu!r&?9&`wl3 z@ED|dI{7>&yRW9S8{c-merT=u)3fs z`h1o_d0Bt-!sP6>P}PyT$qU~EZNH}4(QaP(>(@rB)oQ>D>mAMrIM{WT{W0RO*SN-M zJOULnsxe0#Do-HeJo)8I-U*4G-pW}-invlPWltY!32eW7spx<18zpvZnhF3oxQ7NxQ5O7a%@;1MC4f0j-y<0wm{me?$~d5U z8UXyf9zb5k0kE$DAWm`Qk~z$D3iH$R4<9&A@IU41a*k*u6uT)h{;chxx)6Auot)>_5AV>=4e;{1YJRk| zq%nX0)t>qF0)^}l=2@A~V1Z_pb)t^bem$n{_6ndfw+Zd>N2OV6^P zvXp`|ea=FWv;v4NtF#9s>Xg>z*&IWm7Hb2Ej-nD9vq0tY50k`Q{yX1-A5`FaW7UUg z?5g@Yu>Q9lS7#`!UouU!Ua$giDVpmu1*68)LKFMf3m4)aS+tbrzr7f7Z&F~*{O|R9 z`-S;`uzxUon*WdS$ocDERnu7IT5v*SLZ=OH=24hV z5qK^t?1AU`jh)d8t0d$vedQ)EUD_&WmERUnkOWYtiPqPz4O_bNtqL~g9KyMg)JoAU z)%_Dmpu9nSDpG8>?Lo?M)L32#yhP(Ae4B2?rlOM9M=O&WL3p6~P7bgF*91E;j<^^_ zJAB0^cMBve3PyPp<&H@cJg?Qu9JTBZC_4WXPg(xkIG2wl|NH%6QU5#GKRkGn|Bvz1 z+JA&l^DRKqP$?PY!rrM1Sbg*n(l%xv%XZD6aYdUcl!?M(5H_J~WWKqBZN*fO?#0eR zWNwb>z^bPY}&IB;Am^4j$EbI#?Rx5=AQF<&T(g zLRUJnkF$k$+6$FcfNg$3iNqZ8X!hC}n!3Sho4T(9V>MLZ4PR^U4#NOYB6n4DA(FQR z8T=-X{6Y67g%`{WJ~C}sf2@iL(U}`i35Z9 zq$E7p6IlOk`0M*p0M@Mk`-8)S;`%@A9zL!AkMZ1Q{kIHqzY2f_yNL#13qPpL*qVb$@3OSmt#D3On%A4Uz3EC}^_=rmB=8y-1yl;BQr`X?e*TcZSA$=p zNB9sGHZH6S@n!=kf#a~8+E2>plQQ}*q>PsJKjT<_e`kPe^}qd+{il1_ebWCP$3INWfL@cqB<3$&%md1 ziFei=%Y@o2H7Q%IgSZx>g5Faa!JLL6W~jq_{SgqN{6`s8x#_eMBwLXY5an%kRnIy5 z33jPY2@9VOHMFea3!0XqycM%y>u_&tB6nZnrenP9fV$+atH}9Ppj6&};LN5yP zYHd%<$*HdIIc{2**J#B8UHDaB)-40~0sO1Fh?Vs}eH-YUBsf~#ixya~|Mj}V-k_lW z4f}_^C;jg+9%=vku4LnT>oS3jojHT{GMJY9vALlo<11Ag_cT*w5?<5JHpdIqXFDSw zwINU${XC>R<6wTnw|#viug5NXo?-9~hQ94=ie`J6k@&(fCDeA-DO+K*TT@=u5V-5j zaHZwW5rYY{){~N%<8DR{cgz64QKbyIGts(%MQs-@6Y z98?SGzIms_OP*e$A`IwaPUM+NJ!Dv^humsW^UQxvJeGCKnpdv{CX~!eE1P)vw6;C1 zZBJ|4#**o2ZF^eV{>W?Fqb_Zpo$s;z`B%vwJ;WMviaiaSmPMB&c%Hk>=36j`cVUh@Bk6 zJmh>WW`f8j;Ci!&=Q2xW>Kgy>CWziLOE<%-7+7x$vYD!z6V24v47Flxvn^0FRX0b? z)L4VscMF`v`HjFi%<9=Xzb@CVX5t)Ze#5%{n({L8uRND;Max*2Cs9NeDKC_rgxm;2 zgz_w(h4e|FS#augw1)yRZov{2RHcxqwcMb0ji{!*yxd)ybJ9aKL4Au}(b_gWFx8Hw zMP!sOX$7jg#e;UqI3@lqVNJ&{s^ZI1VHvt-!?K$DHZE_i{gsm5;aMFmI2VC|=9QB| z8CqagS5H}~EyAP{tMZ|de-Kvc{A25b0sU_oJ#PGuUcY--jQ`Q^KHdL+l&5t6|2&TX zuM>{S40gAT1|V0Vurpw`jMh2;8jrE_kEgDCjSW*Dp~7M$v{q5tu2nne7qDY52uO6~ zcO?|%i(T!?C#&hWf3njhW02FX<3lKrYZa{l5@M_6GYg(Ut{0H}4i{X8sgyTc9B&}yLZmY+yeA3z9bFuhi2GLt zzue)%U{woS-}fs?>oQE4d{lgvf0!eY3bLrH>kAW)d$ zA1GO5HI#3dprG!&+1e#;p@hRo9=R%b7oP1wBDn^rZ>@Oi4kO49zsuk+3shdfw3SGRD4BKorADuA+W*>ALS|8e@q75TiSc9S-0*2sL9N=>HSZW4$QFtnODB`$CRwPU!^}g zwi^TIHt`-!-HK?B`5jTO+0E~Wn$B!`N7V1#1I3551MD}qshKFR9@K%u;Q^A?Z+F$t z_TcHJ-))}C^&hH@)_te}>-7J_()rJDu>TbQ>roy@|9AJ-TkivWSAw$b&M(nc5ZCM* zJQG21|6o?<($ZPlNbFW&lHNVnO2C*K&;1ncX%Dbw{tx#1 zy`uhqIDESQ`zX&X;{RP}2D$GDz@CGQF7kY7RdqeJ>=&wxd?sg;XY>mR7C(TX(}~}a z3HiPv2-X3oc^BxVuXa)pa>fluz|yqMd6B`}t+$s*8bIp#ly8S|x^Y^Zpq?mVhq3fX)>9 zhQ!FbJR>jV?Wm^nB2J3C=6eL=pDE_(o%Hb81;2t{7Q_t$nx}2^K+8nHUgCI(6(G>6lzFHLc0kA{NepCjnvgL}n&5fKll9MHivLZXlK!up z<2%k}iO!XC_u)1>f_3_TzgLL=*zffRPxpTw-QT;hFS=|bkWk}jEY2VBg?f{(X zus|rc;#Z`9o8l!(*XMpK-I@t_0af3}F}A+Wx8Nkpggj8&kGv;&VtH-ChjA=b5SW~r zPd41+7o8Hn2?s`KMg#YW4>*m0aNs%|rzSa@3nkmsVIO?Xn>`F1}@99?*NZ*jE;p3ey5 zZtP$UUA$(MXM8(qMGstHQbax%@)ZD82V(HNocr->KX4~Iqlzt?@z{~zVC=YO7xfMXQFg1Rh&elkRB z4+85nVlmBi%6t30f#=eg(DV$3=IfdG*rq5W40A$P;Oo~>O+gN);Op0>f_c735*75R zV2$+aWVVpk#%DG6Eb`*onhOSh9@(~u74VjwwO z2y#{z>#WBy+iDFGwTu!@B9e^2<>`3?(kXNKq#Cp+DG#qytgUdDTAwm9zSjhk0@9rP&Kdt|d@!0kMU53(+=Wjto zkzgAP6Q<29%&z__n0ix~|8)nwr~4m|@>uz=&DlE?O%O$C zgwrXQVxB8EyM;|4z$qur0g5u4Z*jU4wzxmW3bD1WrxwCMB8M%sMFqn;oZJF}zi}(T z+r)vzTf98y1g+V>Au$?({=rZz0vyft+SUTsXl3xB9r~4m| z@>KbMxp8$L)A=h8v0Lr>RSMi2cKotkco46z&@%VHK3_R)YCXQTQpT(1zlp*u^*!Jt=~|HG&J-;eTG{m;huR^z>;&DVzcc7j<~PvB5c@Jf^Isf73jX1Bkm)iMow zHruT%wx(T+`U=jI5%^V|=*W$`(Ew+hXIF{z`n$^HY2tDBsH;CtX%_h()fcJjy7xgQ zI6 zevLcs|F_uGJL}vZaZ_(u;=VTZE}wEyJUpSIXOhV4J@j`sfTKOr^ef$cvzZMMGgXSe0mcm47r z8}&I)Syk$&2IF-!f4%i(zoKR0?zjGIKb8-5)vvJ9Klp{eTkl@i%l|t%|7>9Y-|v_9 zf8GAm{f|d^YW;r{^WKx=PjJ$;L=5YI$Ga0X->b`RFqAUp;Toyy>(*L90Uj}D7LX1Own`! z>7DYhx|qPXZ}aBjzb~%dynFfK^{XvT zjRp1om(_2;&3A8`PLcQT zK3u-K>Ukx4hy8YM*zUHwonF5gPIRq^S-}*al{4O3l|!Cgot-ZSK4z-fFJGj(rK8yP zLv*Paayukpf`l*_=GC8@?>fspTMku98e1ZG62GQz)v#Xxu;T;_`?tR?o56Bzuv_fo zy%2vGApWpG{oZY;U(Kb2f}Ie0M(i#aqH?g7xiZUo&eox6<`6?(qPA3Tk z>oao}Y_dkiJII&)Asnv<*H0%mXtdc3QWUpsK|@A`jQU!`sgA+J8zXBbDLG#VO~=&S z#MwcVP4E(>h_Q1@#o8O-6r6o6%2a zuU}vMe0F*Iqc_6R4Y1ODGLYsI-){6Ewv@q!wv<8GmQwEI)vNzHef{C(tCw$IUH<&; z{ZAKHXXhUWC3Y&qFVOzaZ-?5DcEbYgHm1sYX8uE%XAqAZh2&=1{TDOTJkV3p|8%(j z`?&XSo^}2ohx-Qw|G&d-|7rjCC{JzvS6ImY3KQdm{|09Fn)}rxnJ9!0&?0xTND`AD zWW5c#RlL*i24<#q4$3K2$}!vaFEQl$l+K9X4(GXWujISm+vPhEe#bL7`;gE$l#lVI;Bv#!Crm`=A!BCpA(Yrx%O z5?w`%QVZgBUY2JG*fHRCJtJn-8nW3EQZ4_{XO3tJle3f~I)M>l4`%-xl>Gk=yHEb# zkMe9K|6ggA0G21J7l8%C=~U$lKRtQ<3jFZlY`yp|^IYx`UO218vUx{lSve(oyORLc*oWp1)Hm5I^^iq4Qxxz&&`W>XT7hOWbb#N^|@3j>wNCl4KzLn!RHypb4XVgI@jOm z1(-T#ASMN1>A=M%s8Q7m$1Km`f|J)cy}oC#I^6X|o&>&%MT&$kbh9)7{`Z=J2%u0N zk3gXfS|~D8sWp=rQIN6-Pi6`V#0~K?V(NrKmc06U^HR@?0?^&vTk!Hum;>DphC4tZ z_hXT3!c4P%vINJ-nGC6P6a3kYc%6-{3e- z&<&(YKsUpuy7L~g;oNtT$EplNP=T#$E9F}=-MCMx##(cAJ znAZ)#{0`KwZoiW7TQpauc|n{8hF{9cx%a}#t9A4Wb8H!wrG*%kx=B>iAPY6NTk3Cd z?-pHx8ob>8Wmk${Y2$1_2#=RUOq;>4Ay zIZPJ81f3$2%@Tl8x|xD_bN|1vk7)8lWtokFQ{vg)iZ0V!} z447)&@HbA_pn6+vg{8I#3sl-_eP1BYE$Df+jJ7jX-;ZfmLrDn-JLs2i$!4orFp?Q$ z%T`D8rMAf;5%S(xiwdEhHd1IcTr7tsc6(~07G$}ipFwyRXPR^AM5t|>A`Wr7<*B~Y zMP1+Qj%FyCx7n;?T)$eGbTDp?z%@cyDAB^*_dj)N>n(F#tlh3|y(5EBgcy56Vq`N) z$~}bbwf*kyKi?x5|4cDQ@6rf0<<%)ir}O;lfQ&?joZS-Rgi7~vXCue(KfMNykB@)A z&Ek%WJ$&NVq;70c=T;&lyDM}#2<=X(ERc8^8CVDXzLBMhU_X~6=Ts1 z2|CR<&sc>?Q(&YNpW1{k6Oui|8KDjGWY z?>yu~#p^8crn8q6P9`|YZ~o;3@;(JA6{uX-ri z?JjjYTZ|LTW^V}>o14{191AIJSfc8yN8Nf5b&ccfdpO6*%H?1Goqy~VC|*xFT>~3r z^54bbTSqpj7ZeU$#G0fA7!{EAt3!ia?x(e^ZAO87nNTxPtP6i0P}tXE>F)JArpRHBJX?v+2T1^5Q5i6 zULn`E0`%FDs;;+4yd|+b9uUi_vRbLNRU((_kGs3JljfDv1@p>T^TRff(1cL_5-F-& zPj{<6iv@63OQ{4!oX}B7wy94Qv&8?brAhVujw-3*j!?B8Yg>C=uhv!_x~$OzDwXnA zX{;O#?prM{k%leC44I3o(27iZ=UywDW$A9&+sK+NrA?i@QB8+rPA*K2y6)Lm^&ASH zP~X$x*joF~mD-}+#R|0U{^x!%|7Y*;aIpVm|9Ol@+JD|7zM!d2wj{Tll695MN9S=>iWTcX5_w3HbH1$m7b>VKPmW&hj!KTYfZAS7e8hb%=*h!EvfxsGOj zhYK|Gz1u~NrWveVt1c*>C=gWR@IsSt8v=?&-_-XEa2Dn@TCoD+zk&&-j8{9kI{@#+ zHvX^hl;yvwz`9C;3EZ+Y*>>fPX{~zTENpKtZL5+ViH+eh3Jk&Q( z4%4EU#!-j9-1GgQI`i}6-Dde>u2U)7e~dntE|Kj>DOP-|<(LCSx(Nzd{#I^`UC9f4W=p!dp?&!xSguIOvH;S(meRq2>`sOkb#+W5=59lo zKJJ{^(ITK+Ohs~Vd*tbf1%z$^r-r@s?p@A>;!JS97lbDFjWiy%8cpwL%D2T-93q7q z37#KSHk5@M2{m&bvbXvAtNp5_XtQdU?FF^7h`HldmY&@AmMJyHDg)dBo1e{EstQ~x zhtpUGi(~6BMM3HYfIKgWf{MwM*$`izNDKki{?{eItyZhCeQ+2BwBXCM&6#b;?V<(p?vP>m|^3efKQP;cdJQAz(#@VFBp$~#x$zZZ9l{H~sL{=dC`uc-g``%m#- zALR+@|A=xgc)Rg-u{UWpc6PDS#1DssDF2Zpu@~vs@#Co~?EA-rl8wU4%$Y#-}OC>wxe!SBB(l% z_oj5;Yd7durJYVndp5zAa0zjuuC$9KMrToP*(K9p_P^<0+5e_Z&}_9@a;4om`M`7U zhFR;&7f`;O<{n&ZwJfPqc;7dNC(JH8JYnrfuOMMU$W!3xC$v(8_!V$+!6{Csd42(J zVG$6o(W(w2#Y@Q1rXasOMs)J0=b@i9>;HX(e_9*=y>~Dy<^O)l|N1zOIsc&;EfEmn zv@?Nv%PSZFPjCb|0+{KbWebYp>cgLcjCLGeH(1L8UcWm+bj}xyzeFfICE3ccn&qpS z@t;*#2w3kjsquRY+)rqwPWR1O?ploU#;kL++taIzB8F0)d;hoGEu;CN=vkDL-oZ%2 z9|k4d!8KX|;tfMR;hi<%cSlOlbg&a_X4n4EVw6*K9i`NwwLPhv#qM`Ut6P$0i>Yj< zD8MPepHK6ztd?#$$A>)h?MvUUJrB_6wgYyo^J|fOZHH`*8nU}~-nhM-P%^jK1f*J5 z+p{%2dahBD%yE0f^G!}YZESO1`$Zr74ePqj$R&*JtTa3)tG8WBmSvhQq$iP>do{xC zNjdyIKVkiE289CXn9d&3|ED|bm*T&RS5NxiBRn$4)~ULux96#%`&7faBpOCEf}8HhVzwSv_!@0Bi3H_ydb_N=Z0+Z9|WhMxd)oJfL&ob z-INAfcK`A)*S)V%juUO~7hZA7s#X96MCWj3nj7RhtaHJS z5m+#RCj(F-ud%IXncPXpVVktpuPBh-MGe9CI%CH@@mdL7ncqr93Or|ex1R6R^>9o-?YH)XvrjN3G`;Yz0n79f_m=&NWktvPAmV|Gy?^ zUNyIuFQ!*Tv949tlPDsKlnap{BuITvm{;d*VfH#^Tfbmi1qJg)&+ux=NKkSi+^vF| z`ava2tZQQw+4~e50;)8acsFE8hG?<^5fn^en8d7^B;}MO38FI8$~p$Ir7u@mz>wnP zBh}@!-+YX+gskTFD7IhuOmGZ}ZSMS)?KZ103Q6V41zL=2Q}N{g1I@Pluf6}$1e0IlblsBoOPuDj zG?xNxAq6&?2(Cy}_ipYcA&mZ4r~fm=7kAJ8yx#uP>zCp`4*F02Uyt$xSXK_Z~*%fPpt+!3L`=jMK88#qm!EI65>6j3qrGQ#+j zBKAuHGRW8sp)r&9#}SHATn9Tw8A@Z6Mp)iVF<{y_{fD%s)U`@cjM<$Uln^#*YYr)f z@%T=yX&9TeN75;|YkLYtvAril(I4=slm8|F=)>Co`}^I)V*Hok!Qqqr|4|;P-QG#O zhxMLiDF&~zNzkCYovenKXGDs%>t$`N1w%AYWrxf$&v*Q)W-$Q%T=Y85YtI*qOG=2{ z@eRcs6|r)g^FUdj&^Bo1S8EJ5UP~d(vmxPhz6G)%$VhyWJCnS|jH>`*{(D9G{JO0B z?In)54XKlt(m93fea%uc4#3>aH2_*|oYWvYmGT?81}B)NMABAvEZlOig%BooJpJ+> zsdbyX6?9dHC>}}Gs}eQU>x~HM>@AWUeibbpz#Ee>f#Wh2OU)L+*U-?Z44UQ$&nII7 z$3ZIQHG@nV{OnUVSY%sD!%bMXx~0uXpVtpFau}bwb~hapSi#>uMr#JB$nC{1Rm1Wy zydQ+W?Ko^Y6M~J^3YEYt@S4@MR#B{SnUW`g$muK-mZ)Shn!;)#BU+~EmvUl2%+b6e z(T!}QYytLSeU-+4A=<<=_jhh||4P^;Ktz z=j%QVW3QXWym)u4*2!~q6YeAB8ty58EdcDWJMSJ^+eXL!y$;Xq-o_! zQE1F6zh&HQ(2+_eD5*`wPmebA8!Sx<%vwz>2=f+W?PY-|qU$YJrBPn9H0c2jsb^jb z8w{;Cu-XALA5IgQ%w4Q-I=$6mZsS;`5cHqr7yC6EsCJkU{M*Ux}Rp`pm)245h93BU!z} za#j0O)owe0OQ)*=J-1rk6d}u)z8ZA1=tjRmZJE92+<= z%Mvt4DTm1qlq@m^I05qPa;75tn0vbZ5;Vb|QLHPBUI4LNfP>+Y({IUKQ@=$1HAc%H zs=iILMfsb-I$LltY_x?^j;I)Brw6(@oCbSPG13`{FA9Slph~!7FK!E^z`Z9~Cf>+I ziK0_eI}`yR+c9!pFhqSbbfDJ-{VwR2(+=DoMR{rdhw~5XW|}D$;sA}`U;ujE!%EyD zG9Tkqc?K!#FiesP-Zsm=%gt<&#w)RIlDEsYo(z@Nak_N z!R|UinP-IYx9aM$hl4M(w9IH0C1^PebiKamPQ@xsGZ&MdnyFuVf~SC`2g3-vA`toB z7ac_r>8<3Ymuokip1=W3F&&#ZoQma4H|2L@%a&jqH!YO%t~NBwOV(^7n0PVMDf$H% zZ)iNv5_JCYv>8MdG`aK!Z)VG=%paBTemq|TPH^fuWBVu+>?{R1rlX0uE`qcI8ylx z=LBYyrZMj%xoi)eFlpS%E14zajlkN^Gg#KiW!I|Cs#`?`T@|-B3jNbx5^Jw(?x;7O ztwKX7U3zr3`-LuPi-W?w`dZW1uZ@-tZ(bmA0{}dSQyu?7_Z%h}PSKfo-=-)d40A$P z;Oo~>MIjDt{%&tbbk>bUdcr<1L`R@2U*rc8Beji^Z>tU(+%m4pX41S0718_+Knt9_ ze%%0oA|?~1+f35Z5@wLMUtOEdhWV)l+rl(fO}0R@GsbC$&6?(SE3$v0Xhy&{C!Ree zB9x+tixGEaYrFl;zkT^q&iex6SbSb)COO;pI6;>0WU^wyRX&(N6@9S}Gg-U|WM1WH zMs8BjdJhhUN27z`5$G(lv}0QMHxSL{Bo^PN|L?~C27dh&s6MGO6NpVR%Vn18DA9ZJ z*7=Go#K5PbpKrgvSPsC+>1+1?$xbR#s*reM243xf=d(myS(-W{a`^QNPFmlu87!f6`v7p0)a)jsbw^?e78A z>wmr8!LShjtKZ!pJjH)}l;?}OBX}wFI*3zXhud5Mi~&xIH`|?yg4KGQ0C#GjDJ{+s z4D0g;$?2QxCB+KzOCBA|uW`Oel5>*aXyxfN@>@HzAM=IXQw;Rt9$4wMWHNS4CY3hZ zw2*wFHBa(*sVTpFsZlW2ZNZHh(x8bxa|%!BlzHYzs9wlg;_sm9BMbRwVz=zmoqFWq zly~R1N6h}<+~*+9HPbL2h1VyXJ7|QI=yF=zeNln!r zZjKleQ_QZp&c`?Tw~;eC+XHu|X8^o2vqLsClrBe}B69xW?4_Q8(roRIn;wR?DCI{4 z%prWZc=i73&Oq)A;LXX!PwPR*Vzn@?E?!;U5zhG!HNC0Xm{)-N;r+W0=XDgm1<3n= z781P0GX#oY{4Pya?+M{TZD%XS(cF{Dr7B`O{FbDm3MeV-7sIRfuTEZGy?gumzpviE zdsi5%X0I7`SJavHcgk*0r6%5fJbQU|a`o}-;_SQEudZIc`gnHw>Y~ujlHfRR$`P&w zC@h$FN6UGOG-J6L z2BPGsI1rjiRW`?;(CR&!xa4);kDRfw?c_c3V5pf{?4y26qQ$DZ0`*{3cjD-Zkx7nR zK-_)54so~awupOm*CSpOirAz53=rf6PC&4q$>rcAB=9f2FTz2w` z2ROR`p+JN3?n8$vYo4oEnk+*Ro~&ep9R*@SC2v{k{Sek*Ia(sP?UoQi?;&rc^rbyAcppTUULy8%2uru?HhwQI^aw$jnJq~iW+ zkJV&R*A*)VWW8$hR~5%W;j^RXw?8!ceHx$F+J9$+@eJ~4_E7fUZtvirc>dqrf6D** zIL{-W|6jg)`ECSalpu~kOrmQj2D|7QlQH=K;&DzQNhP z{>_iNIbEQw&X0EhTd{~IpmhT#tc_E`@nqGW!_QX>hUnFe=oVrx4*G-s(UCpoY$8et z1q^X{%B-t3cftStziUC7d=Tu#L9f3dM19u!8FU1#I}1i-m(&oq%n%n~B_z5Qu>4XL zAa4&YxIVVLBTyIVhN~Kg53L2GE%PBzFIY#s{C$di?^!GVGZNo50^pkSzwV%0jQ@Jr z+uwhZ|Bvyg^S{RBOom5Ok`+rSTz&r6ZftY_n333x|K}O)>?z%a)XAkbReV=_Y*D^j zRSr>Jqu7VynYSwpjDee#vboJqZ>lbW`OQ#FB)|kRW|HreUT%J@!lD_97YU*UmiJIA!^9kp1B;;9e1bV_MM*2hM4-U>wo!F=hN`%x6EU zl7)R|MTN48?`L(0Q=M3}O;p0=z!%ApLg%8PuM9yd7I=+>dK)~{Ew?49p?}={5HO6f zEbF`&fxrFz9-DHzFZ3<-Yx_o=Kb2F}g}IBI>NK&r{iOJLgLBI%g%LVO6iZn_(pXk< zO8ihNP{IE~{93mOyZNl!sh1pPD@0En3`cL?w03obZOm^8B@bkMdk{7@bqxq17fe9? zGj^tSC_&+)cQ5&XxZD2c<*(k|P|tX2?pa^!B=Xm2#cG=Q6)aNx3-}cVTKH;czOmdn&d8zo9><{Ub)2`Sb0L(0mJUq<6nX)m3i1&6=Clzqf$Hg=C1A%K z6_sG@O5@?Wg}1cUsOA&xSnUmP`~F9;)}Npb^L!wKpSK^*5SY!T>xL&K#X}PPHrIpm zb~fI_oFo`BrHnd1@4oj-NsMf=*sot3?(e%phZDJ}mvh(reRrswWF#Te)kQ`Tj893* zIE7eW1E~CXAMGZH<^lhlpIgHI16b!C{@K9(NBJFdfUGJ3~L;ipE-nG4L8*3EpXa5Rp zWo9>?ZONpltKaGD?bvDRGil;uJL!3+)2D$*NWz#RSOT)6X?lM9esCi}kdQ>$Nz-|v z4~Zp$3v1!BZdhx9u2V5AyuV1%B8~`iU_J0OZvp;HkBmn^Ud|^=gw}R%q*^NVfH#mN z8gPnJe_02nq{pWjVI(AF(_Vz~qF;=so$qdLE;}M#xBB~a-GiGm(OyP@s9#UO&Dmuo zTBUf(5w9XtEuZ5CS`u590CWAlYya=&{~`|LK>}b`{{Lv)xB35Q_~rhmPx6ucU(7L( zxm1`WASMeO?#K02m{6W?pJsRkvyJkfYCF|t_7(MAJ?N>|#if@vOkH)WQ*W5GkY&M zeqArtmDmo5Lile-w`9ayKURs?642>VZYi%MG(G!2Z z>uAbSnL}Sm({ll!;SzC$rvM?4bwY5CwxEH9=`{&&w^OloNK12Ws3$eOiFxyrfD(9JSKbV=f<3fpe6 zCt!wGh^(0tZhN0_K@rE7GH2f%sHr!zp^Huv|x4#@O%%i`Qb04-@8McI&(Zwf2*SZqSk)1mE9 zK);x!1)plOQP${_9ho=7*Yu<-Hft!Q9*Qgk!)Gbm7ZA39?p2_b(HDA7sr>fS1eqW@ z-Oi!(1z1&9tO_ed%8RU?UP8&hx>Q%ith&ZT3##gm3^Fud#}u*7mLtEru#~FgE;y-H!(GVowC+m`Gm94X+9 zvb@^Zz6)RJTP1d70{*F@S(H(Ik14~+LNNL=n>+psIF0Y&hJrLhbCdy?fO2y@&l71V zV)^Y~Hk#jT>#}QmOu9A_uh|l1_n0Ce(O^W(_T}3%>8iK7wJGFnUf-cC!%=M^0g)yz zoCvO$gsM{Y%NX?K8r`3%yx3!pS#kDvSS?PF*ylBAs?2|1%E}&wDH%QfU8}wYNYAtx~o*$60xQ>0e9bSIe5732KER zysmf(i^IGeTt~L-)M(G!d!YE==p|lZ`&6&Cle}?VKjN!ydt#AWmX;SK$yc$_K%C_vnciozVqvH8rLLE8sq+GWvu9P) z!uaJ+pkk73B|1L#d7YDKbL z0Qo5AW`Ou|Vl2m+IF^xHHQu^0t>XXstL!b+I(kvQCO2}``miKv{&*{Oy46iyt{wo6 z&X$4NO^G~5C@~lvRAx4o+Q_v$Sg4Bvsw>x!Z;)4n0SNA3j3ZD%;i)*iuF)*^^V~hU z6Yl|^TK(UQs6YN$Mde>4n6mOcUoqvq(^=M{icqOkLmQR)#@hpt{Po7xPzyU1o@)gw@HH*6}|M{{Jr#kK9}a?BM^yp>O+t{PCCj zKR(T;hX3ojJrqEY!6YIppqYa>h0yW=Gp!j>0K<$>3f5^P77>atquQ?^!UmhlhJUH5 z&P6E9f-_2P&g7Q(UH8v-og#NjDDxc!q62iC%nr%Y?H<4szvYCG4FS<5(CLT=Y7=-l}o(2)pO^wAWC z1(5s&L*5mKzDCBaZ0}jCl zFdGdb6dITL75(o6tR#tQAljV@JE9qmB{-%2_5@bJQFGiMVTzw?)F+`pn(Xh9M`(O+Vj;xERyW(_>fDDl3!LanMpLO%Ee z2q@rnD5yst5eexcd7Z*v*685Z+IuXuNv7xXGG|Cn4Hh9G<}7MAm@CC3a!>}>*cVuD zoyDLdRwW0~XhF8b}|ub-Pe*AgrL&v}(3=0DSkC(AuX zvtG7N&Lp6x|LmkVS^Tqe*a08paD#4FI1B#tt2u+efo@mCzxT(UKQm3Idn4`96r0p->(0OF1ttl>|y`u+P z04vp^8(Vn=gbt{B5DoY>PQ>Er7C&OqXuB)XZdZ5{KYIt9a$*Cf&UV2w9bE!AMKC&X~h3qIskX@|B*i$ zS^U56kG{nJeUi`T<^L-QhSn}XOE~N)9X_Qa@G*RV`?>$p#m8{|86tF-|4$*XFEsV% zHn26F?{M8Y(5*nTJ8uBC4)4~E!F zWB#q_65^qrxIZds4oB-po??>o(9cwVezed>TBRK~I*lh-U zxxo%2y9%w1SzXiRHgkE0y(^%ZDuMiA6pW`OZNM1j9XdchVUK4wsjcuhCev16dl)I= zeFdhaX(9)+nJHnQ-5CD92E;@9aG4E!B|UmaE@PoVXJ7QW|Flo7{oodaRB)>Dz|9U0iADOzwQ+GqdXONWObgMUUm4t z|LCY2Qe0Z3qld1zLLbdhmZ9i;o#AA0EpNfc$>L&>ko@Q8?@_oGWuy-P=&AypC<&21 znO{K`E}y?oGbFFsHc#wDGS9ESf?nx@RQ@3;SEWgI0xlBcXGx}+EM!)Y?#ahxNW33W zG_54X%dZ>N=I#+*EZGV0OMKdz$0f|72hAe~@Nwr+_P}4!rRnycM)MZU8lE)XPX-FP!JQ*fG9f#lS3JnuR**1W5i}iwDx&RKb1~|CQ|pZdN|(6Hxy4^%1^=hco^Dccx>c4#-vRc@H3z1#H+WeH-4_AoilUpkT1 zR*M0ybXR*fk1Dc#i#A8#Ph!`Ky8tQ!Zeyfw^H!z##e22vsM2ww{ShU;$@!TYwHnVw z1+u;%`0t$EmIs8}DZGz{a_sSTV@az0KD)6Hd!KGMHW#qn`d#;Udu{?;<;AycxQB1I zn$6a7tL?qftS+mYtl<{hXM=6oQjfNqK8>m&dwK*-!;poKr)U^kdY7K@sqMdQ_P>bD zeW30C)gJeMjeINq-yaRf!!P##r}*q=|C_vlEfGjFZVbubZJ=05Wdo??BmV1vr?T*W zM|`~^gc*nCkS%+R^w<)~)}XV9$qdFqY;Iuy(k6R$etJ#p#iJ7e(eREux8*^hVCb64Jk;O%AGfx7usD(@IOj;;os&0?w8xG#Y)( z8C1*voP@V110wMQT%iS~EZeB#Lm&h*cp9NJLm^}+Ist2nKzWknrSO;QIF@fwfD_6P zj1IS~gS2RFZL3^{I(L?TXn|S-4w!HSN@q)avOX%tfqUDvT z1HhZtK0#sibjG+rfk8YfImXdV77= zwyGb99YeA0)w=bd?#6R~v4-l<-H?hs0o;4)F?N7`OL3V2l-6#`)n4N+e6Yf?P5!eq zmL}H&HGp0E|HvEL@jt=fi~j#fK8@r*H(;r}7H^H@O|{$xhBzrq^4`H43K!_4P8%o| zlr)A5g+TmVuL_8t_BOVwU04i-lXpS+uFG(;=%@e<`y_^?v3{bDT!2&D6|X$)>GK^~ zi{r5V?awHHa@+pDhgpJ?#e+QnJNCct1p|Bk`@{a1{r@RG4fg*JaybAvBWtEy*BOap z;lhTCZ5uydNviz~Tx@awUlGE#?eSV@riw0(h;0w>2aur!djBm>BGBn(|NLk4zy9=r zE@6K-I+54s{&0Hr>f+Ul6L3{f1tP?xm-^|izXH?stm**Cf*NETt#M z#}Nr>Z-!X{SGX6F)v@BnD5J+qa^Gd-crAD~gGtm?y>xjmU8AMxeE&R{(wEOC`zZe3 zTcUV{MWDyy_p#gmYoGu2M_IoPD25E*A#tg+@jFbSgC`(C3nP54G>Tit2T z@A-qy-~M_G|90@?$rJEn>A_D=wKlTAY`LBZJ%nXzB+`EAF-%h`g6?33j?FiNUawbz zbO@gIy?(#z1>OGW@PPNlvEw`T;4dn*7)0{KSmr3lAR$S21^-1d)%;uho;POMhO@Id zeh)ekj)X!u=ZYVCpGs}6)9nD9L^yzKPx}4wa4%XgrE5fwdHch|1J{5Bt^o^L z4_MzCu)rL!LGuA~VBU9O-fxY$Z(-iA#azwZX%qqTf^I&M%B0`GRjlS}KV*uz>Tj7V z-$k+CnqtqQ*xyDm+oXi6{rWOKZe%Dj_rstd)89g-=OWWL>m-{lul7w9-x(qO2SA0-N~-k3h87 zZ~=LI0m+WeNk}zsd4{v-8O#vpDo`9+WO%mbsvqaSv-Lvs=1uk!g}OIy;vHH%Jwq#U zhrm0My_04%(MB!I7V8yCB=7P^4Hxfd%i?uuZ0!}c@;sXAn%9mIc!Os2dV?+WI`y@- z^xE2*NpEh6e2X9x%PEe@Jy?+pfy*}+=f`g@&c&gUaG=ml5=w{03;yiI#knLuXr|S8 z!PHH@OOI=*#(DO1dt1q$tyigtu1g^cmul9#B8!S5ph}G9!$g-bLlMBK8ixJ&OECeA^#VxG3HYAxdZDkNQ5+#a z=KME6k@V+_f!I^$&IiKx>IXvNT{9B$LF=I~Y)uJi+gNZj`{o~DhH$a~_v*Mqp4mj) zu2E_YUo?t6Vn#t;VS$2qMpkn0GPHtNoHCuJDV1a8HIsXu=a74nFxObMVwU1f-x{le zUG}^ENgH@OWbdM@??U{5BD!ei#;cYFkd@qC<;tPR4mb{dkf%&U}?qt=r@H0>h^ z$t2dV=m}8-;F^&bC%2qxl5+0P2*AlALzGII`;8n~yuFj=VXYM-AGD@9DA7DL44Hn{ zZ{_0gC(}j@owwgYvqSg|TMNITCH#hl@auQ|#*Pk2^SF`z%iC|E*&)P+t%caoVr;{b z5cApzvB{{B(#zX#q1nN_hOL>`&|+T067y48h}f1HUoN>Vb%`67=^QZq&ZR z6qU%j=x-~829^*S7(&RTU$1fLKYsV>?Zx@U>CbO3t}mXweE#$K^S2jg&#zBF=Z@g0 zqdZax0WU7!089a-6fd}uCPu_>xYc|&yB@ei)S$J98dxG~V2CKcLqW;eEn2&0OQWy|AFrd*N6!FWBYsk9Q=%dJPw#=hkleu1(i(z3KYart6nC zU1bbq{&l?J3x1sfQGu=tvqc`9tB7v6a6I?I>AN;dzx8J6Tbrd{-Yk8K0YoH}2dE+e zon#EgT#K3G#R|$JDRCn;W*~(bMIs@KuQAz149IBDAT~W9Bj4?A>$`SRzx7V?D+A)y z4~VgoZf^ej2wdNsU%V1SaB=x9Tw%U2O6#EEp7Pws3H9fX@x&!YD;(Fs9F3D zZ@-0RhXiRIyD{zc#}>^>f^hNC?N93jrxuW0MSw>jLkYR#;~=0jJd4qhD%Gec#_pI^o&GBfb zDGZxsW$^Y}Xs*{3_=C1I`%{Z%Q&aHUdG3dPGmUWQJ2gU%po8W;&*$oBo|I|!r?oVz zg{&1L5s(?-xd_u_;zoS1&f>4B*!4PDO<&gPB&RM7Nj`W`uEE$MX=0M(JdCIu2#e`! zDC&pa7B=m>R64)4O6OZDoo}jip3SCNwozq8AfQOxS%nJic9D^FDkd<$cy|L>265sf z$fd9Ot@SnE(%1Y^EkW+d9(HMXK~91588_M@*K1xw3&K1aAh|M3`|w2^t*vrH6claro%Wc&c@9kbwUA4Pw1M0W;sc`y=n1Sz#0Z_4F=O~z?$imgF&zbSVIGT&>wFD))2FP z2{ScUCH^f|VT4jD3X||d*z?V8nFzkABG&AoM_gHtGAb?w zvR%@9J}QM*Qz<-T4nmZ%E>)MfkVFrP9ExU#&I5Oj$JB8WHf?(lHtkt%uYoxfwrL?l zrj<6K4Zs*Dx5#P!xtvz*eO6_B0~24T$D+J8gGsYMyI|rBw3|B4tfp;`tfsbT>DLmd zCPXoGyMi=WAdz61L?}a%k$)$tZ>DJn+Z?e@rK2tNmPg7rsdqYO?CEV5?GU(=C#R01 zs%hJks);?lUM+$8oa$ng#z@4x2xkn%t2D-Q9EuWpDsT3gtp6!VZ+PMyxKErXj=7z* zo!d!yZYSlr^($PL5|u+PY#v#k7$*yW6F^aRhePAiGzSIslQ(HQc~+|Lq&#`m1i&2o za7`Im73YZZ3K=dY6eYB$rmrDm8an|NE9ul3lPl}Db<(eu^E=)?eL56fEL$@kT?S)) z4^yy&NffIIRU$=x*Mhf1nyLTp+l4o+lo@F$i%QD zO5I_p*2H=ZSBbY}mGqmH+2ieP->r;{kT)j@=ZS19vr$z}A5IpoA+DG5t&3V%H7$lE zDQ}#n=2|=@f_dCDs2G+6`MyVP z{c$r*r9XCRDz1_gtt(Pk1u2FlL0(f!;96S7n>?{dUJ%Mn=cAHNtyFDsc&2X-6N52n z#uWOKEli`jy*((-xhC7Kj#}<(jlgK>}ocawzGyCq)%)k}n z6ts?U3al8Xz>IM+iPRx#g*gL~h%j*!>5JXXm5nH&B$X~wBL%cSYNi(TM^3{va79H0 zt)rp>D=I25qoTYmHzKI}pN2$FrE)aax@yAK=#Wq727kP z`a#1j6>Qs5^*VOYIyNh?VzUA>Hf!5ZTU#n#1JL4IUbsO1_%fh%?@Xc;>t-n2KKUr&tE&A33zFYeZxO3JqiQCwS9v86ahpMc7b7ujX3_XVr$rMu0=R;<0bD`PQeda%FjW23+_Jla8Rsc#SxAe9 zWeBcfoFEX*z&eX5fD30xci@PK3fe|QS;6>$5fP=Rs7J%4MYdKVEgf=PJDB;F(=G!; znys@~rFiIcPrqT}tM5*H4IG}(psgp=DyJ3nOoh>%zT+;6=Qs5D`)-fFtLRqinp;-M zt)OSBZ0@`rOKvvwpZo4mELVlC)&;h#`dUHHRMkW_emxp4wWzgLWGO|#erUM#f%fV^ z8IAsaXgDQ#TQqDrz8@Mcf!R`C_U%dW_Cdo{r>J$ABCASKzdR`eCmQvW(z^g5M1AHB*)bAIswNc|)MvZ3}H9JtLpB}HZ%I%d^ZqHD;w_{ST@_Ox5 zUgekY%bJT<=)D}5i4&K4#no%8xO!#9)hiTNj>gD|M!n+dwN+fL`d40|xNb+IUY%@R z{K~T@Wwaj}^?Fe2+DukyCa=(gI2tZ%!c`xsWqG80oes*l1pDFQ;v??+DRDAog*A=`)Kt%1^ z&I*bc70I14N1NOyB6ZV<-Jeby*=N(K!#o?i#O}DY*d1G9cWjGY_hlg^6K&e;{CVm+ zejdBT`M9+>A6w#lY>RW>k)CmnGqhO4EE4yCiMzoTh^hO3YC}e3S1#;ZZC~-GXJKz{ z;7T2cWPK}h|K47{Qt^U(eL@EA5r|0gH4_I0PdA7i0Ll*%c@E(<|O0e;i9lkSsJ%hmd0fTWo+q5 z74j5KBzDA>n>VgWGE}=`8fG}H_m7Vq`p&qmzB4ZCJ7Y`VshKo+P;r+gcI1u=-#W!; z+*UCfmldP2r5HKNlZv+-XteTx@fQbWG=|%TP4OO>B!r1{p_iC4xxz*IiTo!$2t_KMrO~;D&!v{M*GkI6SJFv5dyy75mC9GFp(E>ztDdF%LB#u4Xbxqv z-CxwvwknSq!wr}IjA((G7aNk>jB>?*;s}MD2ss~(!b7I6i>$^D8)w|s#u=AwoUvu& zR0mU39Or_RYeGBLGAxok~LGXukQ5!TpY^^MzFeIx5KoUvu`71fH(WqO4u%hn;2MK8o+ z7kA%qUTFl#7DH7mPqJtxo*@MwZ2hjB<`0mHvh=DQpXyWTttzKaoY3r z;oAxALe^ap6)qu%i4)$epvTlzEF*rW z%_@&fU4=&!f=;U2Px#a(+A-nf3IXd>Ws<{KxED(CTQ3D2sYz^ah!xxFX8Eo1t z;cqJP{l5D0`9pl^WG}@7=3u2=Zyvf@xSMJ_W%Ac=zrx8`u%=?+#d(Q zSDxSZ`rcQ-`xwaBpEYGL`^tN8Up8@nkk1ovq0%I{Fg!T;cAdyLz!=Xmm~Dh6bCa#n znTnv>)!-V7G#d~T;Sl0VQ1MjW>dwWl`aUN@6M=x@6^>yBQpgy}k|V&DnC5-lLkebV z91GE$A(7Ovf;eF)fxNqrPzGj*-6NDpy-R`@-YTw|DWT7@4S?YiqdSh`g20&LC@-!* zzxwYU=bhk6UMR(xB|SL!`+A151TjQUz`MVF}oE4~@ zV;YhyDq2VKhu&gw%-+(=o9}+OVHtnvb&3)I!H+^fH4$YAx<3w=giv&N(Cu~)PU9F{ z;l+|su3Dn(4n?2~Zpuqs1quH_B%tE|OBAoV%60JQLSQTZ_q~BX99#T92>ihp{{JaH zoQKIcW6oK+Z^aTgI55^TrXbDm3T8Oo2qqkHCM*=njac`uPOnuwGUx8SgYU>axc6ZwDK*yRti4ZsYoXb(Jx;j-RDrc1Jp^Q+dV z@D<&nO;1XuqLxGm6EKs9Cq0cdH#!YGIoF>dF8@CWCaV2WV$xKZ1_~%&Ofcr}cS%Bf zys5b8Pr#S1ly!z8uudYB$ps`3Dmv|jB$E6(v->yQr6nx1>XG9Cg#ZH(a9~{pO(G>+ zDq)By1#=uDzLMD<2!2a4>Bhv#oE+t1mw_Mo>WoOJge{kCB&0pVR2Ncc9^m##AhzA3NPHT(f28sFRQcb$-$-(ilkIo7f{bK>%h8 zu{~*zFItKtRNTec?XD@xx)Efs8{te0R*`PYKulykGr1Kd_|hP2K+@|-9VAHSV+1~c z86kW!-_2o65y$+w@=LChq&kJg(#DCpS}<~UaaXs`L~(!(K*=4>NFun@9n3KAld2mC zi|)jpbAo>r9&Kj3~EbK26HMXOO9tEzMHp;459- zcvE_J#q~(BzG+dj+r`?QDF?X9FZT-sFE9gHp*PPqqL_jz3 z>+krkarfMlDgTl?8w^!&(<^u{AZTcNLV5-%8VzdT$p>AO@HZnHbPxQnLaq$0yo-H0_c4z zj`^^#ux3bZ#DwKM3xRhy`Z=TU-4^EB!^t8;l&Aj^QqbZa{Cx&hwsZUT#8uBu<|9)sT?h zS1&oBm!d`S>Rp=bz2q&!Bwz4vFJI-d-^C_}@szujpZu zD@&Z5ON~UE@O%lpy?oVklhezO;md-%ggi&$hb0b|Vv*^!#oyE>?o7$uvH|PrOZfwg z{={e)x`JFRrS>q2xC$&6zzog#nqZk|$%yP-?kvcbJ+U|oceJ$!`EFB1Pb%ovGo9v) zL4@En;|Y9k?8y!krjNwLK0dBoyQ^Uzg~fvs4pAW+S}VIASdW{^i99&4x!768%>#yE zOjUqK!h2Qp@~*Cxvinr*6>*727aoGwNvy8~({<_qrT`^my;$0a*wG?enIo55x^u%t zq$#ezDtE;yTSkW+R#a@>0dL*|Z()ohz0!qErC&M%dPYcQ#9WI`=X0E3wyD_#=V*=- zZk_2SAxWsX5RHLsEu1+&{+OZpPsPE(ZN3M4mAZ^ zd@+AT*rhb}Dr0^syO2AALjb7)VL{K#Q!fMhVi{(9gv`?w@!IyTZ14;&%5d*Qt)%|{ zp-b2wj!ybh6a|Bc2R(!a!F&woqlrI9(J&g!!@fTp`Xe}-`{BSxFhZkgFq!p7(IlLP z{ct>-1lzF@y>pD}bj;UxD9gAQ6UG~Fq3uj2TmpN5lRULT`d5!3@o!zUK`hI2sM+2u`WoJ11bxWnoO36Cg z6gsbQWN?c%`SHCHMqf)1Un`t?Wn7i|)GK1s>y9r@ji=mxj12FlzC)lEYy=ssfmggG z8i>H%gjwenDugw1V7${dq@W0%r~4qQu7aqd`%*sGK{?Av9HVTzYp#vEvA$6-g*!TY9P0(u5gn6drwek8Tg2iZxcFqTAc=JBOE}T3o}?1~vKiKI8DP zeljFt&N&fWC;0&0`Mi%;Yf*@p%t3@G=2m7(B3ga<4pU5$?=a<@_9b2k7rg=$2-moT ze=QP(WNWaL%|R^NTQG@;PkAGPDSIi*7?!fc;I9de^*|Uzf-Cb?V7$7m2fEG{$OXL^ zO$+!6z6a{fZNS$Fyn{FvYpG2arT5DnaV?Ue#l{720`HlW>h{0liMnQH&U>zFvUtfpf7$IS7CkiLh0d zm{#^&jar{m(Qy#()a{Kj&czNPS!q>?{)HFe45n~~W6UtJHhl+1QRn2xpN=|FMpFKl zU;}5xDYb}d;On()wDdv~CRsCXRBDUy#hVMht;1;Kgx%lla8p?+Bxco#n(CM_?_Q=I_gjavv7%MJ}>&X5S+id*5|+U zC|6!}c$}>LD!TzIxB(fWB)&r+p)n!1>r|gdkVK}u8155_*g93KH%e%Y#;f+~xsC{7 z1a!{gHDxIK7H5=o0G4PWLq8P(L+btdHt!kA5*S}3 z3}tf|qN;uQh9VUag;h>6WK4wShyw-@Ng?+=)18Tf}4r_Un6@nKG>W?D7l{6mpYVzw*_UTnx(R_@NZEhFHagH686yR5iF)m)v% zF}c^yVBs@I?>Q&Jtawd_4slp`n|DLOtan}DZ4Qgln`WE*McesMdPDmK#J6jGLtsgL z5|4!DB)vU(D=0^RFH!{Q2BbK=)#mwJBp&PYUv91+0lZ2{#$du6J5xtw?DQq@S5;%Q z)16Q>Z0k)}L7aT8;q**Yd;HN3>o-4Ys<%w<#UT(^9%g+0MC^Z5*U6d@E|BY%{^^>L zm_IWHMsjBze`e@`h&xweK5ONemn$XY~W5vp|DmF^cMkqD%$jAe1rgG0Q$U>oJpx%DQX&4B1vjm#lh)|t6|Wp?Y_Ku zRnKO$604#9ftgH&fI|Hwh-d*8q+T%~9Y?l6X@*7H`4q7DZfgs?KZB zXK{5&6pGBv%j;Zy$%o(>m(VhL_LaWtU+U(Zcd0@-Iu}p#wNlqx9Y1E9U8++nMK3N|>dEEn&^ou%mytR& zZT;A|SfzSys~YvzS)CgqEPFP^UV@3V6QplO=!kq%DmMG(>g6?Wx~9ko*yIG9KkJ!2 zZas6(uUT~;IGbSFoi^)E>dmzh{07I&>b)JkReGqNE&E8Za5(DE zCi77MXHgK%VSg~{PbcAMG@gWWG@GLFa5xP|!~SSEA9|xvFd5Fn`Dh0|+JMv%zguUg z2q$(=PYIB7eoo_ixS za}@cLXcqbYcsv`AP&gaS!(cq}{a_Xj{3sYiupfBg!0W@oWH{V~kTE^?B)iRra)*Uo zZeAxQDnNTkTkmCQ$JG{+=@M3|k(d*#6blPXb0g3qt^%@fEIbS~xss~3K&J{!dzdyU zqCItbgmGLe#kIGuai(ZK2M95xl6vtAe9*b zJ!z0ggMp|WDoit}$*f3(a_dJ$@yp@bkad<{sHC#Nv;Wa-JIl9^3#_`TWUM|4>+=5T zp>r&@2Sahwvm6k0`SvVtRu8fTBR6ML=<6=fD#`FHhImzHeqPLlyZ;_0s%DEQke2}c zA_)1LM}>8&j#l#LoV=2&$Pjxq2+c_rqKaoj3I_2^$JL1fzyiAH_6KepBr>l}SVH=w zC)4(_qeG`RgHKhQ2XF13C2?9`$yQLq_=B*-O1S_k{YCjL%C<$XbXfiF_^+JCpUM1Z zwnRV67ytI|C_fcp1bp57T16L76Z&k;$_vBDFm%qrBfBK@u6Fd6AsC6s_L}9b*)pD+ zL{;)S0Ef{njJ%p&DE_y#q^8s93!JAFK{+vGp7Re)Ooo10Bg%4$YB`pxSM%b{I#-?Q zOExGMo6KQf%*AONUkKfIM$Uq)Gtqgzd( z35k*wlJ^s$m?8;GB)pa{7d78pC*p_~Mc}E?^`Y335@@oH<0Fue>fMN3ca<@9`Rf~CUa4jL5DN1@?7SvQ2%qdr%99?sH!wuZDiZ- z3Z_-N(~zRYII1z1DRi3c?Z)6^Ggq-_x@wa5Sr~GaIaY-M?LT5cnDl(YndnIX9I7)> zN-i%s8*f#AyuBFMHVU)WlBhaWd6$vhvx{<9BI^t% zE%H}ud#K+o9TAIU^i$b3N}BE5G-6%CcrEtvJ5A5KdW0f$w--0ahehJ^I1}f>$TbNO zx_gXCFne$~wtk=d;aW@`%jHwAk~*%aPbDp;C{Sp`67x z83z|G$$cVkl@S+J*LEc}ue}%lwP^kc_dtPPzEBkoA7w+-boY7h3j^WLVS5%@w+NKDgHOo zIkI&}8XUm8Yy58{aeO9lk!CP`2j&Qht7aB_3PgbwRhMK#*5WLK>WC{K+{z+XPXGdn zDm9{2{1{rfQ~X=cx!_i4l@eLWO^sV!-*q#nC+ahrMuF;QJBfENQ*X(_d=?b!N**WTn z+xN`(#1C&M%G7uB0xr?6$aOD=4{PLr#!jz_%bb9W!Pr%@QK*`~nHyBc<*WCqr?v&q zZ4o1?-by*mTn?;&Yg8f<@F-hki2hP3D66^NWzk}5lyd>;69zgLoo)@ZGpO7WYi9v# z7j9>CRUc|+_tGHRu6T8Kw{>0B1VERnYx#qb9|dqW8hi6F9Qf0I5KjB^An?Lz(Dx?& z`Dio@kQev}%_Bby{l4E1U^Mgl-rNhT1==cD$=-n&|M~2l!&N(*LjtMLnE_Jzf;#M zwGK}0`%T32IY#n+c0Sj%@OV{A2bPAbrz7fQSR;zSJ2^KeqIk$Vbzz!>z9ex(H7s2$ zL9uHKY8@SRa7pLp?2?Zk%|lDX@QG%kwtYgF^4{hr^_98F7qDxDu22N=K8rJl^th`t z2U}U5MTdK>&w^6-Abi>tT6Fu!OSC*@kG4i_u(hOolvS#jt80j^)#Dv2R6%*%^{IeX zR;TW4ueC`_1k^zJr0Y_5`pB!&9H~cJlVzYaL_GR>6eaDq>z{d{{w><438 ze$by!qRC(s_|wT~4q?9^3`c!fliFb+q}9!A2A%6xdv$=SZ*xUrnMrJXe}e*J4{*SbmsoRK@Ej?^N}j$s()r=J;$@HSNp)9q%tc>fbxKNcUXlq%(PeJHH)uR5ZTP(l56gdf(&DZza!( z?o)^IQ*bORqEbg{w?s8J6&Lk}JcU7l&g6q$FL(lHaKIc@YXF zB!vu=J@&veRU1zFSeeL}H_Cx>$%K+H+oUQ%N=eou8J8hWD@ExB5mZIP^C!#_wGkk|*v_Q{k2xGC#l`rk6V-^7A%cojN^r(~S_oMtZ zeGYs@2>Uj7dh1J3gn#fA5q?DZTN7VkO+^7+7iO>8U3vY#9WLj*-NPz(=?XU{q93<% zSE-X-nsJr!=Ywg3!s)kgg=1V(XND`PI0bY4Tx_l4XkVtcW3)d4mm=rnd<|pugDT&X|5C-}af|kpKtFQ2m~+nLZB2Xa zi)*vE5>DnMTS<{u*%=aO+ikIAEZw#(1oXCxSJsi*0x}^Hx^xtqDh0&ob}}SO^NN=Q zM$cdjlMrP>AiUD;^c1M1`-c{(%xlSVcp@X76LGkeHdhg?8$B?Ited_SM#G9n0`87- zN6uy8_@lkz}Z^p;Ar+bA4&{qypp$ zS#5Y0tmE%@sQ@e{K@?9?`V}9dNHH9(ofYZpIsX$b4A-hCpO@A%K!cO-;DgmZ8txcc zx~Qr}jj$cNM#JB8<4||8k6Z}l&ZWGq4W*issm!#C%TmOI$t6uey-H*Blrz_vVy=fr zC0=_3a(G7t&o$6E)%M+1k3@|zSbo3ty)5~zcY{`i?46;JTyeTzB0lG4@l*w{(5AFy zThoQ(_OzQygl8GHv_5tr$xqXh`0wO(Kx36IpUpK`LE+BO!=s?kzGHqDz!v5jsJV$h?ch zdzYVhZWHu*wzKiD3sZc|g?&t5)XgpYN@~)I6|meK|3&WqD^@T!NDb-{EKtV{WS4>XPN6 zlq6*^zw?5C>T#?qxob$9?d6cKA8Kn!FVw1_xrPnHyk5x>d&Az z8=&EQ)SphLJ28`|AP1*$46g8E$tbvz*S|!dE5z+hwnk@yUT~QaK9L7seffM|A9;23 zv38O6R?*}4;d!1n8Vtn$p6A*BdxO#VD}T`M_xt1iI0(M-{Qh|0eFeP7N2U5%QwFoI zya)GX6ZZ%Cbi3VyC63U^0RUaVNO-`1Ie1d|p1B2dhtd7P!C%D{2g?l2zv*bfTky0V z$ri^ya{++EW0v8&O)sRhBg~v{It;yM$Krd2;%_>XZDK^12(b=0{@cO9lP99~Z&$Dj z{`JX|C*V4S3Fj&6n9+lSgM$y?6#?I4T4MHGmaLOV-`&Ic$DXaE2J literal 0 HcmV?d00001 diff --git a/stable/collabora-online/11.0.15/helm-values.md b/stable/collabora-online/11.0.15/helm-values.md new file mode 100644 index 00000000000..43295225af2 --- /dev/null +++ b/stable/collabora-online/11.0.15/helm-values.md @@ -0,0 +1,30 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.dictionaries | string | `"de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru"` | | +| env.domain | string | `"nextcloud\\.domain\\.tld"` | | +| env.extra_params | string | `"-o:welcome.enable=false -o:user_interface.mode=notebookbar -o:ssl.termination=true -o:ssl.enable=false"` | | +| env.server_name | string | `"collabora\\.domain\\.tld"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/collabora"` | | +| image.tag | string | `"v21.11.3.4.1@sha256:9b47f08cf750579efed8a76be0b867259d2ee4262b36d332b508a7d535bfd30c"` | | +| podSecurityContext.runAsGroup | int | `106` | | +| podSecurityContext.runAsUser | int | `104` | | +| secret.password | string | `"changeme"` | | +| secret.username | string | `"admin"` | | +| securityContext.allowPrivilegeEscalation | bool | `true` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| service.main.ports.main.port | int | `10105` | | +| service.main.ports.main.targetPort | int | `9980` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/collabora-online/11.0.15/ix_values.yaml b/stable/collabora-online/11.0.15/ix_values.yaml new file mode 100644 index 00000000000..d9d51159c58 --- /dev/null +++ b/stable/collabora-online/11.0.15/ix_values.yaml @@ -0,0 +1,27 @@ +image: + repository: tccr.io/truecharts/collabora + tag: v21.11.3.6.1@sha256:8952af7ca7ba57a99c8a81d985b9d62176ba12aeb7452036ef7a05bd37675f91 + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + allowPrivilegeEscalation: true + +podSecurityContext: + runAsUser: 104 + runAsGroup: 106 + +service: + main: + ports: + main: + port: 10105 + targetPort: 9980 +secret: + username: admin + password: changeme + +env: + dictionaries: de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru + extra_params: "--o:welcome.enable=false --o:logging.level=information --o:user_interface.mode=notebookbar --o:ssl.termination=true --o:ssl.enable=false " + server_name: collabora\.domain\.tld diff --git a/stable/collabora-online/11.0.15/questions.yaml b/stable/collabora-online/11.0.15/questions.yaml new file mode 100644 index 00000000000..dda3f2c9255 --- /dev/null +++ b/stable/collabora-online/11.0.15/questions.yaml @@ -0,0 +1,2299 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/" + admin: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/browser/dist/admin/admin.html" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "RollingUpdate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + additional_attrs: true + type: dict + attrs: + - variable: username + label: "Username for WebUI" + schema: + type: string + default: "admin" + required: true + - variable: password + label: "Password for WebUI" + schema: + type: string + valid_chars: "[a-zA-Z0-9!@#$%^&*?]{8,}" + private: true + required: true + default: "REPLACETHIS" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: aliasgroup1 + label: "aliasgroup1" + description: "Comma separated hosts list." + schema: + type: string + default: "" + - variable: dictionaries + label: "Dictionaries to use, leave empty to use all" + schema: + type: string + default: "de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru" + - variable: extra_params + label: "Extra Parameters to add" + description: 'e.g. "--o:welcome.enable=false", See more on /etc/loolwsd/loowsd.xml. Separate params with space' + schema: + type: string + default: "--o:welcome.enable=false --o:logging.level=information --o:user_interface.mode=notebookbar --o:ssl.termination=true --o:ssl.enable=false" + - variable: DONT_GEN_SSL_CERT + label: "DONT_GEN_SSL_CERT" + description: "When set to true it does NOT generate an SSL cert, you have to use your own" + schema: + type: boolean + default: true + - variable: server_name + label: "Server Name" + description: "When this environment variable is set (is not “”), then its value will be used as server name in /etc/loolwsd/loolwsd.xml. Without this, CODE is not delivering a correct host for the websocket connection in case of a proxy in front of it." + schema: + type: string + default: 'collabora.domain.tld' + valid_chars: '^((([a-z\d](-?[a-z\d]){0,62})\.)*(([a-z\d](-?[a-z\d]){0,62})\.)([a-z](-?[a-z\d]){1,62})|((\d{1,3}\.){3}\d{1,3}))$' + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10105 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9980 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: true + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 104 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 106 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/collabora-online/11.0.15/security.md b/stable/collabora-online/11.0.15/security.md new file mode 100644 index 00000000000..127286d5891 --- /dev/null +++ b/stable/collabora-online/11.0.15/security.md @@ -0,0 +1,186 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: collabora-online/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-collabora-online' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-collabora-online' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-collabora-online' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-collabora-online' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/collabora:v21.11.3.6.1@sha256:8952af7ca7ba57a99c8a81d985b9d62176ba12aeb7452036ef7a05bd37675f91 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | UNKNOWN | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
| +| ssl_client | CVE-2022-28391 | UNKNOWN | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | UNKNOWN | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
| +| ssl_client | CVE-2022-28391 | UNKNOWN | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/collabora:v21.11.3.6.1@sha256:8952af7ca7ba57a99c8a81d985b9d62176ba12aeb7452036ef7a05bd37675f91 (ubuntu 18.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| bash | CVE-2019-18276 | LOW | 4.4.18-2ubuntu1.2 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| coreutils | CVE-2016-2781 | LOW | 8.28-1ubuntu1 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| dbus | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| dirmngr | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gcc-8-base | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gnupg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg-l10n | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg-utils | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg2 | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-agent | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-wks-client | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpg-wks-server | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgconf | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgsm | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gpgv | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&amp;utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gzip | CVE-2022-1271 | MEDIUM | 1.6-5ubuntu1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| krb5-locales | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| krb5-locales | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-locales | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| krb5-locales | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.12-4ubuntu5.1 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
| +| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| libc-bin | CVE-2016-10739 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| libc6 | CVE-2016-10739 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libgnutls30 | CVE-2018-16868 | LOW | 3.5.18-1ubuntu1.5 | |
Expand...http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
| +| libgssapi-krb5-2 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgssapi-krb5-2 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libk5crypto3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libkrb5support0 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://access.redhat.com/security/cve/CVE-2018-20217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| +| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libnghttp2-14 | CVE-2019-9511 | MEDIUM | 1.30.0-1ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4018
https://access.redhat.com/errata/RHSA-2019:4019
https://access.redhat.com/errata/RHSA-2019:4020
https://access.redhat.com/errata/RHSA-2019:4021
https://access.redhat.com/security/cve/CVE-2019-9511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9511.html
https://linux.oracle.com/errata/ELSA-2020-5862.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2019-9511
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.synology.com/security/advisory/Synology_SA_19_33
| +| libnghttp2-14 | CVE-2019-9513 | MEDIUM | 1.30.0-1ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2019-9513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9513.html
https://linux.oracle.com/errata/ELSA-2019-2925.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2019-9513
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_33
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-9 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpng16-16 | CVE-2018-14048 | LOW | 1.6.34-1ubuntu0.18.04.2 | |
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/security/cve/CVE-2018-14048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
| +| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.7-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.7-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.7-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.7-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libstdc++6 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| multiarch-support | CVE-2016-10739 | LOW | 2.27-3ubuntu1.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| +| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| openssh-client | CVE-2021-36368 | MEDIUM | 1:7.6p1-4ubuntu0.6 | |
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://nvd.nist.gov/vuln/detail/CVE-2021-36368
https://www.openssh.com/security.html
| +| openssh-client | CVE-2020-14145 | LOW | 1:7.6p1-4ubuntu0.6 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2021-41617 | LOW | 1:7.6p1-4ubuntu0.6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| diff --git a/stable/collabora-online/11.0.15/templates/common.yaml b/stable/collabora-online/11.0.15/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/collabora-online/11.0.15/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/collabora-online/11.0.15/values.yaml b/stable/collabora-online/11.0.15/values.yaml new file mode 100644 index 00000000000..e69de29bb2d